hopdesV6ilAm2and
hopdesV6ilAm2and hopdesV6ilAm2and
  • 03-03-2016
  • Computers and Technology
contestada

Question 9.9. Encryption is BEST described as
a. back-up command. privacy control. tool for hackers. spam filter

Respuesta :

LexCon
LexCon LexCon
  • 03-03-2016
A. Back Up Command. They can use it for hackers, but it is mostly used to protect your computer and documents from any hackers, but the hackers themselves can use it too.
Answer Link

Otras preguntas

Hi can I have help on this question with a simple explanation as I find things difficult to understand. Thank you :)
Cod fry often settle under the bell of some jellyfish species, whose tentacles are poisonous. Name the form of relationship illustrated by this example. Assume
Solve the system of equations by graphing. y = x − 6 3x − 3y = 18
state three problems associated with the use of moderntelecommunication​
pls help. Dr. AT is studying the effect playing music has on plant growth. To do this she sets up three greenhouses each growing pea plants. One of the greenho
Find the jacobian of the vector valued function F(v) = [3x*2y, 5xx, 9yy]
ABC is an isosceles triangle, with AB = AC. find X​
The figure below is a scatterplot for paired data (x, y), with x values on the horizontal axis and y on the vertical axis. The tick marks are spaced 10 units ap
From this diagram, select the pair of lines that must be parallel if angle 1 is congruent to angle 8. If there is no pair of lines, select "none".
Consider a triangle ABC like the one below. Suppose that B=129°, a=7, and c=42. (The figure is not drawn to scale.) Solve the triangle. Carry your intermediate