Answer:
D
Explanation:
because it is a administrative procedure
Answer:
Encryption Keys
Explanation:
In order to make sure only the intended recipient receives the information, encryption keys rely on a unique pattern, just like your house key, except instead of grooves and ridges encryption keys use numbers and letters.
Answer:
C. a registered Microsoft Account
Answer:
the answer is
c. Trojan horses enter a secure space, while an infected file proceeds to be downloaded and run.