hopdesV6ilAm2and
hopdesV6ilAm2and hopdesV6ilAm2and
  • 03-03-2016
  • Computers and Technology
contestada

Question 9.9. Encryption is BEST described as
a. back-up command. privacy control. tool for hackers. spam filter

Respuesta :

LexCon
LexCon LexCon
  • 03-03-2016
A. Back Up Command. They can use it for hackers, but it is mostly used to protect your computer and documents from any hackers, but the hackers themselves can use it too.
Answer Link

Otras preguntas

Marco made 2 errors in solving the following inequality. Identify the mistakes and correctly solve. -18 - 4y > 20 -4y > 2 y > -1/2
A__ is an area where two bones meet and where one bone moves on another
I'll give brainliest. My group has been struggling to answer this. We just need a solid answer with work to pick up our grades at least. How many grams of Al(OH
what two gases are being attributed with global climate change?
3. The number of sheets of paper available for making notebooks is 78,000. Eachsheet of paper makes 8 pages of a notebook. If each notebook contains 192pages, f
12. Tomas y Paco béisbol en la escuela. (jugar)
What are some nonlethal solutions to the problem of wolves attacking cattle and sheep?
In the Trans-African slave trade, other things were traded besides human cargo. The Arab nations along the Mediterranean Sea and the tribal nations of Sub-Sahar
ill give brainliest to who gets the answer right​
Use The Cruise Ship room price Table To Determine The Percentile Rank Of $6,962