hopdesV6ilAm2and
hopdesV6ilAm2and hopdesV6ilAm2and
  • 03-03-2016
  • Computers and Technology
contestada

Question 9.9. Encryption is BEST described as
a. back-up command. privacy control. tool for hackers. spam filter

Respuesta :

LexCon
LexCon LexCon
  • 03-03-2016
A. Back Up Command. They can use it for hackers, but it is mostly used to protect your computer and documents from any hackers, but the hackers themselves can use it too.
Answer Link

Otras preguntas

at a zoo 3 pandas eat a total of 181.5 pounds of bamboo shoots each day. the male eats 3 times as much as the baby. the female eat twice as much. how many pound
How does the setting of a small town during the Great Depression affect the characters and plot of "Gumption"? a. The characters face difficult problems with f
hinduism has its roots in
Find the area of the four walls of a cubical room whose side measures 5m. Find the cost of white washing the room at the rate of `23 per square metre.
How do some human white blood cells help destroy pathogenic bacteria?
I need an example of a chemical change involving water.Pleaseeee.
A package of ground beef costs $6.98. The price per pound is $1.86. How many pounds of ground beef are in the package? Round to the nearest hundredth.
The human nervous system includes __________ of individual neurons that assist with __________ communication. A. millions . . . external B. millions . . . inte
What are the numerous small structures that function like organs in a cell?
Monica wants to join the swim team. She practices 812 minutes in 4 weeks.She practices the same number of minutes each week. How many minutes does Monica practi