hopdesV6ilAm2and
hopdesV6ilAm2and hopdesV6ilAm2and
  • 03-03-2016
  • Computers and Technology
contestada

Question 9.9. Encryption is BEST described as
a. back-up command. privacy control. tool for hackers. spam filter

Respuesta :

LexCon
LexCon LexCon
  • 03-03-2016
A. Back Up Command. They can use it for hackers, but it is mostly used to protect your computer and documents from any hackers, but the hackers themselves can use it too.
Answer Link

Otras preguntas

PLS I NEED ASAP WHICH GRAPH REPRESENTS AN EVEN FUNCTION?
Supreme court ruled in the 1857 Dred Scott v. Sandford decision that enslaved African Americans were not citizens. In 1866 congress proposed the Fourteenth amen
What type of chemical reaction will occur when iron (III) hydroxide is heated and forms new products?
7. In which step does a mistake first occur? 8 + 2 + (3 X 3 -2) Step 1: 8 +2 + (3 x 1) Step 2: 8 +2 + 3 Step 3: 4 + 3 Step 4: 7 8 . In which step does a mistake
Setting up a desktop computer for anAutoCADspecialist who needs a minimum of 125 GBram which operating system would be the best suited for his needs
(40 points) A. the silver star trucking company needs at least 3 55 gallon barrels of brake fluid and 4 barrels of oil to operate next month. They have at most
WILL MARK BRAINLIEST!Charlie is watching hot air balloons Balloon A has risen at a 50° angle Balloon B has nisen at a 78° angle. If the distance from balloon A
oxygen ans hydorgen combining together to create hydrogen perodox is an example of ?
4d + 7 = 13 Is this an equation or an expression?
I need help with this assignment I will mark you the brainlies if you have an understanding awnser???