1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Romashka [77]
3 years ago
7

The man-in-the-middle attack means what

Computers and Technology
1 answer:
Tom [10]3 years ago
4 0

Answer:

<em> where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other.</em>

Explanation:

You might be interested in
If you write a toString method to display the contents of an object, object1, for a class, Class1, then the following two statem
kolezko [41]

Answer:

True

Explanation:

The two println methods are equivalent.

7 0
3 years ago
What type of computer system can be found in the computer lab at school?
Hatshy [7]

Answer:

B: micro

Explanations

a small computer that contains a microprocessor as its central processor.

7 0
3 years ago
Designing a medium to large network requires a combination of technologies and there isn't one "right way." Think about the tech
allochka39001 [22]

Technology allows for easy accessibility, communication and information technology could connect student and faculty computers and servers.

<h3>What is computer networking?</h3>

It is the ability of computers to communicate with one another. It makes use of a communication technology that would allow different computers to be connected to each other.

Technologies that will be used include,

  • Communication technology
  • Information technology

The different types of networking systems that can be used for communication and information include,

  • Local area network
  • Wide area network
  • Computer area network

Local Area Network (LAN):  It is a computer network that can be used in a small confined area such as a school, laboratory, office, or group of buildings.

Thererfore, technologies you would use to connect student and faculty computers, servers, multiple buildings include communication and information technology.

Learn more on technology here,

brainly.com/question/23418761

7 0
2 years ago
Who is your favorite<br><br> A. Jacksepticeye<br><br> B. SSSniperwolf<br><br> C. Markiplier
Korvikt [17]

Answer:

C

Explanation:

he be looking better than cashmoney

8 0
2 years ago
Read 2 more answers
Ashley is the record keeper for a bookshop. She gathers and maintains an organized collection of information. What is Ashley usi
maks197457 [2]

The answer is Database.

Reason being is because because the definition of database matches the statement.

- Collection of information that is organized so that it can be easily accessed, managed and updated. 

3 0
3 years ago
Read 2 more answers
Other questions:
  • The ____ is the point in the past to which the recovered applications and data at the alternate infrastructure will be restored.
    15·1 answer
  • There are three main components to economic growth. Which of the following is NOT a component of economic growth?
    7·1 answer
  • Missing slot covers on a computer can cause?
    9·1 answer
  • Your _______ can help block inappropriate content online.<br> 1. web browser<br> 2. Password
    14·1 answer
  • 1. What type of malware is triggered by a specific condition, such as a specific date or a particular user account being disable
    6·1 answer
  • We _____to separate the code in sub programs from the main code<br><br> Please help!!
    10·2 answers
  • Write the code for the following problem.
    9·1 answer
  • Can someone answer this for me will award brainliest lol
    11·2 answers
  • "Automated Deployment" is one of the prerequisite for DevOps implementation.
    8·1 answer
  • What does a black box represent in the system input/output model?.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!