hopdesV6ilAm2and
hopdesV6ilAm2and hopdesV6ilAm2and
  • 03-03-2016
  • Computers and Technology
contestada

Question 9.9. Encryption is BEST described as
a. back-up command. privacy control. tool for hackers. spam filter

Respuesta :

LexCon
LexCon LexCon
  • 03-03-2016
A. Back Up Command. They can use it for hackers, but it is mostly used to protect your computer and documents from any hackers, but the hackers themselves can use it too.
Answer Link

Otras preguntas

Chromosomes that have their centromere near or at the center with two equal length arms are called ______.
What kinds of transactions can be entered in a general journal?
18=3(3x-6) multi step equation
foil (3x-5)(x+6) need the answer ASAP
What is your average speed in miles per hour and in feet per second if you travel a mile in 16 ​minutes?
What type of move takes Figure A to Figure B ?
Total contribution margin is an important assumption in multiproduct CVP analysis.A. TrueB. False
I really need help with this section
Simplify each expression. (a^2b^-3)^2 (a^-2b^2)
Consider the borrowing rates for Parties A and B. A wants to finance a $100,000,000 project at a FIXED rate. B wants to finance a $100,000,000 project at a FLOA