Answer:
<em> where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other.</em>
Explanation:
There are six basic functions of IT.
1. Capture: Compiling detailed records of activities.
2. Processing: Converting, analyzing, computing and synthesizing all forms of data and information.
3. Generation: Organizing information into a useful form.
4. Storage: Retaining information for further use.
5. Retrieval: Locating and copying stored data or information for further processing or for transmission to another user.
6. Transmission: Distributing information over a communication network.
Answer:
The answer is open source
Explanation:
hope this helps
# look it up on google
Hehdhdjdjddjdjid iridium chi jo j o j o j o j