hopdesV6ilAm2and
hopdesV6ilAm2and hopdesV6ilAm2and
  • 03-03-2016
  • Computers and Technology
contestada

Question 9.9. Encryption is BEST described as
a. back-up command. privacy control. tool for hackers. spam filter

Respuesta :

LexCon
LexCon LexCon
  • 03-03-2016
A. Back Up Command. They can use it for hackers, but it is mostly used to protect your computer and documents from any hackers, but the hackers themselves can use it too.
Answer Link

Otras preguntas

Write an expression for the calculation 3 added to 6 times 4 plus 3.
How is the graph of y = negative RootIndex 3 StartRoot x minus 4 EndRoot transformed to produce the graph of y = negative RootIndex 3 StartRoot 2 x minus 4 EndR
Why do i want to be in NHS
A fighter jet must reach a speed of 62 m/s to take off from the deck of an aircraft carrier. Calculate the speed in miles per hour. (1 mile = 1609 m) a. 138.44
In Act 3, Scene 1, how does Tybalt's interaction with Mercutio move the plot forward? The interaction between Tybalt and Mercutio moves the plot forward by
(4ab to the power of 6) (-7a to the power of 2, b to the power of 3) =
The single most important thing you can do to improve your chances of surviving a collision is to: a) Wear a securely fastened helmet b) Be familiar with the mo
Area model of 1/2 times 1/3
If you determine that a patient is in need of CPR, what should be your first response?A. begin cardiac compressionsB. run for helpC. begin mouth to mouthD. call
Solve for y -2=y+4/5