hopdesV6ilAm2and
hopdesV6ilAm2and hopdesV6ilAm2and
  • 03-03-2016
  • Computers and Technology
contestada

Question 9.9. Encryption is BEST described as
a. back-up command. privacy control. tool for hackers. spam filter

Respuesta :

LexCon
LexCon LexCon
  • 03-03-2016
A. Back Up Command. They can use it for hackers, but it is mostly used to protect your computer and documents from any hackers, but the hackers themselves can use it too.
Answer Link

Otras preguntas

Read the excerpt from chapter 7 of The Strange Case of Dr. Jekyll and Mr. Hyde.The middle one of the three windows was half-way open; and sitting close beside i
a meal cost $15. we gave the waiter $18 and told him that the difference was his tip. what percent of the cost of the meal was the tip we gave?
(slope/y-intercept form). then,give me the slope (m) and y-intercept (b) 6x+7y=-42
What is the correct way to list the author’s name in a citation of a work by Dr. Alba Garcia-Lopez
Caroline and Sarah win some money and share it in the ratio 4:1. Caroline gets £48. How much did they win in total?
Which nineteenth-century director of the irish prison system created a four-stage system of graduated release from prison?
Ms. Stratton has 12 students in her Pre-Algebra class. On her desk she has a can with 12 popsicle sticks, one for each student in the class. Each day, she choos
Why did juliet pretend to kill herself?
The apperance of many new life-forms during the first period of the paleozoic era was probably aided by the development of
can 57 rows be divided into equal sections