1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Romashka [77]
3 years ago
7

The man-in-the-middle attack means what

Computers and Technology
1 answer:
Tom [10]3 years ago
4 0

Answer:

<em> where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other.</em>

Explanation:

You might be interested in
Chang investigates ways to improve the interactivity of computer hardware. His job title is best described as ✓ Computer and Inf
xeze [42]

Answer:

B, D, C

Explanation:

got it right

3 0
3 years ago
HURRRRYYYY
Mandarinka [93]
An example of revolving credit is C
8 0
4 years ago
Read 2 more answers
What is the answers please
Gre4nikov [31]
which question are u referring too
6 0
3 years ago
How many conditions are needed in a while loop that should run until a user guesses the correct number or until they have made f
Sonja [21]
<h2>[] Hello! []</h2>

Answer:

2

Explanation:

MS Coding 1 A ED

---------------------------------------------------------------------------------------

  • I hope this helped
  • Brainilest appreciated!
7 0
3 years ago
Which technological innovations along history allowed the appearance of the computer
mihalych1998 [28]

Answer:

The first major effect the Industrial Revolution had on the environment was caused by the increased use of fossil fuel, first coal and then oil.

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • What attack cracks a password or encryption key by trying all possible valid combinations from a defined set of possibilities (a
    12·1 answer
  • Computer networks make setting appointments easier by _____.
    9·2 answers
  • Jill is setting up a presentation and wants to use a built-in equation, such as the area of a triangle. To insert this in her pr
    14·2 answers
  • Three variables, x, y and z, supposedly hold strings of digits, suitable for converting to integers. Write code that converts th
    13·2 answers
  • Select the answer that best describes the activity
    5·2 answers
  • Create a class named CarRental that contains fields that hold a renter's name, zip code, size of the car rented, daily rental fe
    13·1 answer
  • Do word provides an undo button that can be used to cancel the most recent command or action
    13·1 answer
  • Write a paragraph about ICT in personal life?
    12·1 answer
  • How does the autosum command calculate data? Need help ASAP​
    5·1 answer
  • The technique that allows you to have multiple logical lans operating on the same physical equipment is known as a.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!