B because this words degrading, humiliating, hurtful, insulting, intimidating, malicious, or otherwise offensive to an individual or group of individuals causing substantial emotional distress
Answer:
Encryption Keys
Explanation:
In order to make sure only the intended recipient receives the information, encryption keys rely on a unique pattern, just like your house key, except instead of grooves and ridges encryption keys use numbers and letters.
Answer:
A white hat hacker, or ethical hacker, uses penetration testing techniques to test an organization's information technology
Explanation: