hopdesV6ilAm2and
hopdesV6ilAm2and hopdesV6ilAm2and
  • 03-03-2016
  • Computers and Technology
contestada

Question 9.9. Encryption is BEST described as
a. back-up command. privacy control. tool for hackers. spam filter

Respuesta :

LexCon
LexCon LexCon
  • 03-03-2016
A. Back Up Command. They can use it for hackers, but it is mostly used to protect your computer and documents from any hackers, but the hackers themselves can use it too.
Answer Link

Otras preguntas

Please help this is my last day to get my grades up before report cards go out !!
what is the sqrt of 4x^2/3y. ive seen it broken down as a problem on here a lot but there's parts that people dont explain how they get.
The density for potassium is 0.856 g/cm3. What would be the mass of a 40 cm3 piece of potassium?
Which of the following mental disorders is not considered an anxiety disorder?
I need help with vian?
Which explanation justifies why the theory of evolution is a theory and not a law? The theory of evolution predicts an organism's ability to adapt to its enviro
If there is 13 bundles in a bag, and 17 sticks in a bundle, how many bags will you need to hold 794 sticks?
Which elements are recycled during the processes of photosynthesis and cellular respiration?
What is the difference in between translate and rotate
Whigs denounced andrew jackson as a tyrant. what actions did they see as a threat to american freedom and why?