hopdesV6ilAm2and
hopdesV6ilAm2and hopdesV6ilAm2and
  • 03-03-2016
  • Computers and Technology
contestada

Question 9.9. Encryption is BEST described as
a. back-up command. privacy control. tool for hackers. spam filter

Respuesta :

LexCon
LexCon LexCon
  • 03-03-2016
A. Back Up Command. They can use it for hackers, but it is mostly used to protect your computer and documents from any hackers, but the hackers themselves can use it too.
Answer Link

Otras preguntas

what movement is evident in pompeii?
Express as a unit rate: 2400 miles in 48 hours.
how can you rounded 2605 to the nearest hundred
what is the names for plants that survive a major disturbance?
Solve for w: P=2L+2W
what number is 100,000,000 more than 5,438,724,022?
solve 5c + 4 = -26A. 6B. -6C. -4.4D. 3solve 3x - x + 2 = 12A. -5B. 4C. 7D.5solve 3(x + 1) + 6 = 33A.10B. 8C. 8.7D. -8solve [tex] \frac{y}{-6} [/tex] + = 9A. 24B
Name one reason why Sevilla, Spain is famous
a fast food restaurant sold 24 burgers with cheese If the ratio of burgers sold with cheese compared to without cheese was 3:2 how many burgers did they see tot
Which of the following organisms lacks a coelom? (A) roundworms (B) segmented worms (C) clams (D) grasshoppers (E) people