hopdesV6ilAm2and
hopdesV6ilAm2and hopdesV6ilAm2and
  • 03-03-2016
  • Computers and Technology
contestada

Question 9.9. Encryption is BEST described as
a. back-up command. privacy control. tool for hackers. spam filter

Respuesta :

LexCon
LexCon LexCon
  • 03-03-2016
A. Back Up Command. They can use it for hackers, but it is mostly used to protect your computer and documents from any hackers, but the hackers themselves can use it too.
Answer Link

Otras preguntas

least 5landform of a desert​
What distinguishes effusion from diffision? How are these processes similar?
What was an inspiration to those in the French Revolution ?
Solve the system of equations
Bonnie had 5 cats that each weighed 6 2/5 pounds. How much do the cats weigh?
Why did europeans first arrive in the americas?
don’t really quite understand this question.
How do limiting factors affect organisms in a community
In what became known as the Iran- Contra Affair, why was it an issue that the US government sold arms/weapons to Iran, and used the proceeds from that sale to f
Given the discussion thus far of commensalism and parasitism, would parasitism be an accurate way to describe the relationship between the strangler fig and the