1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
galben [10]
3 years ago
9

In a(n) ____________________ attack, the attacker monitors (or sniffs) packets from the network, modifies them using Internet Pr

otocol spoofing techniques, and then inserts them back into the network.
Computers and Technology
1 answer:
Tasya [4]3 years ago
7 0

Answer:

cyber attack

Explanation:

You might be interested in
Blake is on the fast track and hopes to get a promotion soon. he wants to make sure that he is always able to
sergiy2304 [10]

Answer:

D

Explanation:

7 0
2 years ago
What is the primary language used to write web content and is the default format for Outlook messages?
iris [78.8K]

Answer:

HTML

Explanation:

It is the HTML format, and it is the default format for Outlook messages as well. However, the Outlook messages support the Rich Text Format and Plain text as well. However, the default format is certainly the HTML format. And the rest of the options can be selected. Hence, the correct option for this question is certainly the HTML.

3 0
3 years ago
Read 2 more answers
Al E
zzz [600]

Answer:

A. Fit test

Explanation:

i did this before, hope i helped

5 0
3 years ago
Create an image of satellite as a button control which links to the wikipedia of the satellite you displayed as button. in html
____ [38]

Answer:

<!DOCTYPE html>

<html>

<a href="wikipedia page url goes here"><img src="image url here"></a>

</html>

Explanation:

You can make the image act as a hyperlink by inclosing it with <a>  and </a>.

8 0
3 years ago
Select the best answer for the question. 2. What is the simplest way to permanently get rid of an unwanted file?
Kobotan [32]
To permanetly get rid of an unwanted file, you delete it
3 0
3 years ago
Other questions:
  • A hard drive that uses fde is often referred to as a(n) ____.
    11·1 answer
  • Suppose you find a magic $1.00 coin. Its magic power is as follows: as each day passes, you get an additional dollar plus half o
    6·1 answer
  • How many license plates are there if a license plate contains 3 letters from the 26 available in the English alphabet followed b
    15·1 answer
  • Alexandria works for a non-profit company that asks for donations to help the homeless people in her community. Recently the dat
    12·1 answer
  • What will be the output of the following HLOOKUP formula on the table?
    6·2 answers
  • Which element always appears to start on a new line in the browser window
    9·1 answer
  • Rey is recording the dialogues and sound effects separately in the studio, as he is not happy with the sound quality recorded on
    9·1 answer
  • CORRECT ANSWER GETS BRAINLIEST
    8·2 answers
  • The TCP congestion control measure techniques fall into two categories: retransmission timer management and ________ management
    13·1 answer
  • Why must the image be reduced when the field of view is widened to take in more of the scene?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!