hopdesV6ilAm2and
hopdesV6ilAm2and hopdesV6ilAm2and
  • 03-03-2016
  • Computers and Technology
contestada

Question 9.9. Encryption is BEST described as
a. back-up command. privacy control. tool for hackers. spam filter

Respuesta :

LexCon
LexCon LexCon
  • 03-03-2016
A. Back Up Command. They can use it for hackers, but it is mostly used to protect your computer and documents from any hackers, but the hackers themselves can use it too.
Answer Link

Otras preguntas

how to solve 0.01x+0.07y=0.22 and 0.03x-0.05y=0.14 by substitution
What is the definition of popular press source?
Write the name of a shape that has no sides and no vertices
How do I write an equation in slope intercept form from; Slope 3, y-intercept at -4
Estimate 46/6,725, then find the quotient.
What is 258/300 written as a decimal and a percent???
Estimate each quotient using compatible numbers.
what are ten facts about Henry Morgan
Express 230 in scientific notation
Sam evaluated the expression x2y for x = 7 and y = 9. He got a value of 49. Which of the following statements is correct