1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nataly [62]
2 years ago
13

Question 1 of 10

Computers and Technology
1 answer:
Mila [183]2 years ago
3 0

Answer:

D. Government and law enforcement want access to encrypted messaging apps to help fight criminals and terrorists.

Explanation:

The explanation is simple: if a messaging application has encryption implemented into its functionality, then it means one of the purposes of that application is maintaining the privacy of the end user.

If a government and the law enforcement under that government want access to encrypted messaging applications with the intention of fighting criminals and terrorists -- which is an altruistic act to maintain security in the country -- this defeats the purpose of maintaining the end user's privacy if the developer(s) of the app were to hand over that data to a government and the law enforcement under them.

This is a famous example of security vs privacy, actually.

You might be interested in
Look at the graph. What is the meaning of the point shown with a star
RUDIKE [14]
The answer is B. 1 Box= 1/2 Pounds
4 0
3 years ago
Can someone start me off with a short 2 or 3 paragraphs about the pros and cons of Microsoft Word, and if you can recommend a si
Romashka-Z-Leto [24]
Microsoft Word is an overall very good application. It can be easily used with other Microsoft products, such as PowerPoint and Excel. However, there are some cons.

The spelling and grammar check is widely considered not very good. It does pick up many spelling errors, but many grammar errors are either not noticed, or are incorrectly noticed - it may say that you have made an error when you have not.
7 0
3 years ago
Which tool allows users to share code and also serves as a social networking
nikklg [1K]

Answer:

D. GitHub

Explanation:

A P E X

8 0
3 years ago
What does an IT worker do
djyliett [7]

Answer:

they get horney

Explanation:

lol

4 0
3 years ago
Lorann sends messages to Aiden that always go into Aiden's Junk E-mail folder. Which process would best correct this problem so
BaLLatris [955]
Go to settings and find out.
7 0
3 years ago
Other questions:
  • Which of these printers would be the most suitable for printing a large number of high quality black and white printouts?
    15·1 answer
  • The         provides access to the Internet; may also be internal
    5·1 answer
  • Assume that an array of Integers named a that contains exactly five elements has been declared and initialized. In addition, an
    12·1 answer
  • How long is the latency time of a typical hard-disk drive spinning at 360 revolutions per second?
    6·1 answer
  • Methods inherited from the base/super class can be overridden. This means changing their implementation; the original source cod
    5·1 answer
  • In excel online what is it called when you join connecting cells together to span across more than one column and/or row?
    7·2 answers
  • A computer screen that is contained in its own case and is not part of the computer system is called a
    5·2 answers
  • Explain one rule the company must follow when using cookies on its website.
    13·1 answer
  • Genres are useful for many reaseons. What are some explanations you can think of for how genres can be useful to players, game d
    10·1 answer
  • Add definitions for the following keywords to your glossary of words.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!