hopdesV6ilAm2and
hopdesV6ilAm2and hopdesV6ilAm2and
  • 03-03-2016
  • Computers and Technology
contestada

Question 9.9. Encryption is BEST described as
a. back-up command. privacy control. tool for hackers. spam filter

Respuesta :

LexCon
LexCon LexCon
  • 03-03-2016
A. Back Up Command. They can use it for hackers, but it is mostly used to protect your computer and documents from any hackers, but the hackers themselves can use it too.
Answer Link

Otras preguntas

simplify (9x^8y^3)1/2
The first five terms of an arithmetic sequence are shown below: 20, 17, 14, 11, 8, . . . Let n represent the term number and f(n) the term in the sequence.
New battery powered electronic cigarettes are quickly becoming one of the largest U.S. exports.
Teresa sold t-shirts at a festival and made a profit of $75. She made $4 for each t-shirt she sold. Her total expenses were $25. How many t-shirts did she sell?
What is the greatest common factor of the terms in the expression 21x-18x+28xy? A.3 B.3x C.x D.xy
Answers please!!!!!!!!!!!!!!!!
MATH 4 QUESTIONS PLEASE HELP
How many orbitals are in a d sublevel?
A police car begins at(-2,8). It travels 6 blocks east and 10 blocks south to the courthouse.In which quadrant is the courthouse? Which direction on the coordi
RATE FROM 1-5 1 = totally acceptable and appropriate 2 = possibly wrong, but no action needs to be taken 3 = wrong, and school authorities or internet services