hopdesV6ilAm2and
hopdesV6ilAm2and hopdesV6ilAm2and
  • 03-03-2016
  • Computers and Technology
contestada

Question 9.9. Encryption is BEST described as
a. back-up command. privacy control. tool for hackers. spam filter

Respuesta :

LexCon
LexCon LexCon
  • 03-03-2016
A. Back Up Command. They can use it for hackers, but it is mostly used to protect your computer and documents from any hackers, but the hackers themselves can use it too.
Answer Link

Otras preguntas

A company says that the probability of finding an all-star card in a game pack is 12.5%. A student wants to determine the probability that, if he buys 6 game pa
BRAINLIESTTT ASAP! please answer
what brought an end to islams golden age?
What strategy can you use to keep track of the interior and exterior angles of the triangle?
Keegan is a police officer. she was recently placed on administrative leave because she was shot during an armed robbery. since the shooting, she can�t stop thi
Read the excerpt and then answer the question that follows. “Will all great Neptune's ocean wash this blood Clean from my hand? No, this my hand will rather
Which of King Henry's children established the Church of England by law? A)Elizabeth I B)Mary C)Edward D)Henry IX
In what media forms do you find propaganda? List many examples and examples
Ted researched the price of airline tickets and discovered a correlation between the price of a ticket and the number of miles traveled. After recording his dat
High SchoolEnglish 5+3 pts When reading an informational text, how do you identify the author's thesis statement? The thesis statement is the first sentence o