hopdesV6ilAm2and
hopdesV6ilAm2and hopdesV6ilAm2and
  • 03-03-2016
  • Computers and Technology
contestada

Question 9.9. Encryption is BEST described as
a. back-up command. privacy control. tool for hackers. spam filter

Respuesta :

LexCon
LexCon LexCon
  • 03-03-2016
A. Back Up Command. They can use it for hackers, but it is mostly used to protect your computer and documents from any hackers, but the hackers themselves can use it too.
Answer Link

Otras preguntas

How much does 3000 kg = to get tons
2+3=8, 3+7=27, 4+5=32, 5+8=60, 6+7=72, 7+8=???????? SOLVE IT IF YOU CAN
You begin solving the equation 4 – 5x = 59 by subtracting 4 from both sides. Which is the best choice for Step 2?
All living things are either Eukarya, Bacteria, or Archaea. These three broadest categories in the classification of life are called _______.
You work at a fruit market. Bananas cost 50¢ a pound. A customer hands you a bunch of bananas that weighs 3 pounds. How much should you charge for the bunch o
a video game is on sale for 25 percent off the original price is $42. what is the discount? and what is the sale price?
__________ means to move from one region to another. When animals regularly move as a group from one region to another and back, it's a ______________.
Evaporation: Large amounts of water evaporates from the Earth's ________, _______, __________ every day. The water vapor (evaporation) becomes part of the _____
Force and Motions: Pushes and pulls of all kinds are________.
Which of the following occurs during anaphase I of meiosis? (A) Formation of tetrads (B) Separation of homologous chromosomes (C) Crossing over (D) Separation o