hopdesV6ilAm2and
hopdesV6ilAm2and hopdesV6ilAm2and
  • 03-03-2016
  • Computers and Technology
contestada

Question 9.9. Encryption is BEST described as
a. back-up command. privacy control. tool for hackers. spam filter

Respuesta :

LexCon
LexCon LexCon
  • 03-03-2016
A. Back Up Command. They can use it for hackers, but it is mostly used to protect your computer and documents from any hackers, but the hackers themselves can use it too.
Answer Link

Otras preguntas

REALLY NEED HELP!!! PLZ
I need help on this question
(3a2 – 5ab + b2) + (–3a2 + 2b2 + 8ab) Which of the following shows the sum of the polynomials rewritten with like terms grouped together? [3a2 + (–3a2)] + (–5a
Which lengths could be the side lengths of a triangle? A.22 cm, 13 cm, 8 cm B.6cm, 18 cm, 12 cm C. 13cm, 22cm, 7cm D.18cm, 6cm, 13cm
When the speaker in edgar allan poe’s “the raven” hears tapping on his door, he hesitates. why does he wait before opening the door?
How did government shape ancient china?
I WILL CHOSE BRAINLIEST AND ITS WORTH #) POINTS PLEASE HELP write the expression in exponential form. [tex] \sqrt[3]{(27x)^2} + \sqrt[4]{256x^2} [/tex]
what do you call a wave that is made up of electric and magnetic fields? wave made of particles electromagnetic wave electronic wave magnetic wave
In high region of the us will you find he great plains rocky mrs and inter mountain west
What is 9.54 divided by 18