1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nataly [62]
2 years ago
13

Question 1 of 10

Computers and Technology
1 answer:
Mila [183]2 years ago
3 0

Answer:

D. Government and law enforcement want access to encrypted messaging apps to help fight criminals and terrorists.

Explanation:

The explanation is simple: if a messaging application has encryption implemented into its functionality, then it means one of the purposes of that application is maintaining the privacy of the end user.

If a government and the law enforcement under that government want access to encrypted messaging applications with the intention of fighting criminals and terrorists -- which is an altruistic act to maintain security in the country -- this defeats the purpose of maintaining the end user's privacy if the developer(s) of the app were to hand over that data to a government and the law enforcement under them.

This is a famous example of security vs privacy, actually.

You might be interested in
Whats the overall mood of the song Rags2Riches by rod wave
Makovka662 [10]

Answer:

9.5/10

Explanation: Because you can vibe with the muisc but i just dont like the name so with out the name 10/10

5 0
3 years ago
Suppose you have 10 image files, each taking up 300 KB. About how many MB of space do they take up
Orlov [11]

Answer:

b

Explanation:

porque es la única a la cual puedes poner ssi querés sabe neibw idbe

5 0
2 years ago
Read 2 more answers
What does the Auto Fill tool do?
ki77a [65]
I believe this a microsoft tool it <span>It automatically populates data into cells that reference other cells :)

hope this helps</span>
7 0
4 years ago
Read 2 more answers
What are those jackets called the ones with lots of straps inside, like in movies where they store there ammo etc?
sesenic [268]

Answer:

Tactical Vest | Tactical Ammo Vest.

Explanation:

6 0
3 years ago
Help! Computer Science Discoveries. Hurry its timed
VLD [36.1K]

Answer:

1. categories

2. character

3. code

4. portrait

5. conversation

6. stage

7. Landscape

8. backdrop

Explanation:

I'm not sure what "a visual programming language for children" would be, sorry about that, and sorry if these are wrong .-

7 0
3 years ago
Other questions:
  • What component of a computer system holds the operating system when the computer is not running
    6·2 answers
  • I'm a number less then 40000.all my digits are multiples of 3.my first third a d fifth digits are the same both of my thousands
    10·1 answer
  • When is a wrecker considered to be an emergency vehicle?
    12·1 answer
  • Create a SavingsAccount class. Use a static data member annualInterestRate to store the annual interest rate for each of the sav
    10·1 answer
  • For as long as you can remember, you've never been able to get a taco on Tuesday at your local taco truck. The lines are always
    8·1 answer
  • Which of the following letters do the most reliable websites end in?
    12·2 answers
  • WILL GIVE BRAINLIEST
    15·1 answer
  • Where does an antivirus run suspicious applications?
    12·1 answer
  • C programming question
    6·1 answer
  • Why must the image be reduced when the field of view is widened to take in more of the scene?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!