menu
Qamnty
Login
Register
My account
Edit my Profile
Private messages
My favorites
Question 9.9. Encryption is BEST described as a. back-up command. privacy control. tool for hackers. spam filter
Ask a Question
Questions
Unanswered
Tags
Ask a Question
Question 9.9. Encryption is BEST described as a. back-up command. privacy control. tool for hackers. spam filter
asked
Dec 9, 2017
72.4k
views
0
votes
Question 9.9. Encryption is BEST described as
a. back-up command. privacy control. tool for hackers. spam filter
Computers & Tech
high-school
VIISHRUT MAVANII
asked
by
VIISHRUT MAVANII
8.1k
points
answer
comment
share this
share
0 Comments
Please
log in
or
register
to add a comment.
Please
log in
or
register
to answer this question.
1
Answer
5
votes
A. Back Up Command. They can use it for hackers, but it is mostly used to protect your computer and documents from any hackers, but the hackers themselves can use it too.
Lavanya
answered
Dec 16, 2017
by
Lavanya
8.5k
points
ask related question
comment
share this
0 Comments
Please
log in
or
register
to add a comment.
← Prev Question
Next Question →
Related questions
asked
Dec 14, 2017
19.5k
views
all of the following are examples of real security and privacy risks except:a. hackers spam viruses identity theft
ZeDonDino
asked
Dec 14, 2017
by
ZeDonDino
9.0k
points
Computers & Tech
college
1
answer
3
votes
19.5k
views
asked
Sep 8, 2024
31.7k
views
A cybersecurity firm is building a team of hackers to take down a network of cybercriminals. a. Develop a Python script to identify vulnerabilities in the target network. b. Create a secure encryption
Pholz
asked
Sep 8, 2024
by
Pholz
8.1k
points
Computers & Tech
high-school
1
answer
5
votes
31.7k
views
asked
Sep 23, 2020
226k
views
Because of Moore's Law, widely-used encryption programs currently employed by banks and ecommerce sites are now easily penetrated by brute-force attacks that can be employed by hackers using just a handful
Simon Halsey
asked
Sep 23, 2020
by
Simon Halsey
7.5k
points
Computers & Tech
high-school
1
answer
4
votes
226k
views
Ask a Question
Welcome to Qamnty — a place to ask, share, and grow together. Join our community and get real answers from real people.
Categories
All categories
Mathematics
(3.7m)
History
(955k)
English
(903k)
Biology
(716k)
Chemistry
(440k)
Physics
(405k)
Social Studies
(564k)
Advanced Placement
(27.5k)
SAT
(19.1k)
Geography
(146k)
Health
(283k)
Arts
(107k)
Business
(468k)
Computers & Tech
(195k)
French
(33.9k)
German
(4.9k)
Spanish
(174k)
Medicine
(125k)
Law
(53.4k)
Engineering
(74.2k)
Other Questions
The book shows how to add and subtract binary and decimal numbers. However, other numbering systems are also very popular when dealing with computers. The octal (base 8) numbering system is one of these.
Seven basic internal components found in a computer tower
Please help me ! All you do is just put it it all in your own words ! Please this is for my reported card!i don't know how to put it in my own words because my English is not that good!
Twitter
WhatsApp
Facebook
Reddit
LinkedIn
Email
Link Copied!
Copy
Search Qamnty