hopdesV6ilAm2and
hopdesV6ilAm2and hopdesV6ilAm2and
  • 03-03-2016
  • Computers and Technology
contestada

Question 9.9. Encryption is BEST described as
a. back-up command. privacy control. tool for hackers. spam filter

Respuesta :

LexCon
LexCon LexCon
  • 03-03-2016
A. Back Up Command. They can use it for hackers, but it is mostly used to protect your computer and documents from any hackers, but the hackers themselves can use it too.
Answer Link

Otras preguntas

The ostwald process is used commercially to produce nitric acid, which is, in turn, used in many modern chemical processes. in the first step of the ostwald pro
What word rhymes with into ?
The difference of the measures of two supplementary angles is 30°. find the measure of each angle.
Which shows you are sticking to a decision to abstain from alcohol? being able to say no around people who are drinking never being in places where other people
In Spanish, summarize your weekly routine. What are the typical things you do each week? Be sure to mention at least five different days and at least one ty
Complete the hybridization and bonding scheme for xef4.
What does a verb do in a sentence?
On a large piece of paper, Dana creates a "rectangular spiral" by drawing line segments of lengths, in cm, of 1, 1, 2, 2, 3, 3, 4, 4, .... as shown. Dana's pen
Which word best describes the result of 1848 revolts in europe
WILL GIVE A BRAINLEST Phytoplankton are _____. consumers decomposers producers scavengers