hopdesV6ilAm2and
hopdesV6ilAm2and hopdesV6ilAm2and
  • 03-03-2016
  • Computers and Technology
contestada

Question 9.9. Encryption is BEST described as
a. back-up command. privacy control. tool for hackers. spam filter

Respuesta :

LexCon
LexCon LexCon
  • 03-03-2016
A. Back Up Command. They can use it for hackers, but it is mostly used to protect your computer and documents from any hackers, but the hackers themselves can use it too.
Answer Link

Otras preguntas

what was one of the outcomes for the first Great Awakening?
Are stars luminous or non-luminous? Explain your answer.
Repost. Someone please help me! I’ll try and give you as much points as I can.
Adana has 4 skirts, 3 blouses, and 3 pairs of shoes. How many different outfits can Adana make? A: 7 outfits B: 10 outfits C: 12 outfits D: 36 outfits
What advantage does wind and solar have over coal and oil?
4) The returns on the Bledsoe small-cap fund are the most volatile of all the mutual funds offered in the 401k plan. Why would you ever want to invest in the fu
What helped the English defeat the Armada? a Many of the ships changed sides and joined the English A large storm b C The invention of steam power d A surprise
Can someone plz help meeeeeeeeeee
. On page 1 of the Passage, the speaker in the poem repeats the phrases “O thou whose” and “To thee the Spring." Which statement explains how this repetition he
After a project has been accepted, the decision to lease or buy is determined by the present value of the lease's cash flows when discounted at the project's ri