hopdesV6ilAm2and
hopdesV6ilAm2and hopdesV6ilAm2and
  • 03-03-2016
  • Computers and Technology
contestada

Question 9.9. Encryption is BEST described as
a. back-up command. privacy control. tool for hackers. spam filter

Respuesta :

LexCon
LexCon LexCon
  • 03-03-2016
A. Back Up Command. They can use it for hackers, but it is mostly used to protect your computer and documents from any hackers, but the hackers themselves can use it too.
Answer Link

Otras preguntas

Find the volume of the cylinder. Use 3.14 for pi.
evaluate 6÷3×2a for a =2​
The formula for the hypotenuse of a right triangle with legs of length a and b is shown. What is b in terms of a and c?
Which choice is equivalent to the product below for when x>/ 0
which choice is equivalent to the product below when x >/ 0
list four rational numbers between -2 and -1?​
Can someone please help me on this problem? I tried setting it up but kept getting the wrong answer... Please help me!
can you explain how more life-forms were able to create because of cyanobacteria​ PLEASE HELP
Mr. Roshan will buy 12.5lbs of beef . the price for the first 3 pounds are 4.99 . after that, the price is 4.49per pound how much will he pay?
FIRST ANSWER = BRAINLIEST​