1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Romashka [77]
3 years ago
7

The man-in-the-middle attack means what

Computers and Technology
1 answer:
Tom [10]3 years ago
4 0

Answer:

<em> where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other.</em>

Explanation:

You might be interested in
1. Landscapes are the one type of photograph in which you should always use the traditional perspective.
Julli [10]

I will attach the answers below. The number of characters is beyond the default characters required.

Download docx
5 0
3 years ago
Read 2 more answers
Write down the three part of a computer.<br>​
Nostrana [21]

Answer:

1 system unit 2 monitor 3 keyboard

5 0
3 years ago
When using Microsoft word, what would happen to the text of a paragraph if the "Justify" option is used?
Bond [772]
Hello, and thank you for asking your question!

When you click on the 'Justify' option on any type of word pad, it'll make all lines of words perfectly aligned. Here is a quick few-sentence example I made. 
(Photo)

Hope this helps! ☺♥

3 0
3 years ago
When a user modifies the fonts in a message and immediately sees the effect of a font change without actually
MaRussiya [10]

Answer:

Font view

Explanation:

4 0
3 years ago
Read 2 more answers
Which of the following is NOT an example of written communication?
Veronika [31]

Answer:A conversation between co-workers

Explanation:

4 0
3 years ago
Other questions:
  • Which of the case studies that you read (Walmart, Target or 5 Big Data Industries) caught your attention and why? Before reading
    11·1 answer
  • Database designers typically do not add spaces in field names (LName), but can add details in the ________ field of the field pr
    9·1 answer
  • Technology will not? A. change the way work is done B. process information faster C. slow the pace of work D. link companies and
    8·1 answer
  • Which of these is an off-site metric for social media marketing?
    8·2 answers
  • Shawn thought that the screen of the block-based program he was using was
    15·1 answer
  • Many Web browsers allow users to open anonymous windows. During a browsing session in an anonymous window, the browser does not
    14·1 answer
  • Write a recursive method that returns the number of 1’s in the binary representation of N. Use the fact that this is equal to th
    9·1 answer
  • Which feature do we most likely use to quickly change the background, fonts, and layout?
    12·1 answer
  • A class researching the world’s population would like to include a graph that shows historical changes. They have information fr
    7·1 answer
  • How does abstraction make programming languages easier to use
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!