no idea either lol, I mean school forces you to learn
..
Answer: An attack where the attackers will interrupt a data transfer happening between parties and in which they will pretend to be the legitimate parties.
Explanation: For example think about two people writing letters to each other back and forth. However you, the attacker can intercept the letters and effectively change the message/contents of the letter going to the other person. This is probably not the best explanation, but simply put a man-in-the-middle attack is when an attacker interupts a transfer and pretends to be the legitimate source.
Answer:
A light bulb produces light from electricity
Software piracy is the illegal copying, distribution, or use of software.
The invention of the micro hard drive is not a driver of wireless growth.
What is Hard Drive (HDD)?
A computer hard drive (also known as a hard disk or HDD) is a type of technology that stores your computer's operating system, applications, and data files such as documents, pictures, and music. The rest of your computer's components work together to display the applications and files stored on ones hard drive.
How does a Hard Drive (HDD) work?
A hard disk drive (HDD) is made up of a platter with data storage compartments. This information includes your operating system, applications, and any files that you have created. There's also an accuator arm that keeps moving across the platter to read or write the data. The platter spins as the accuator arm movements across it to speed up the process.
To learn more about Hard Drive (HDD), visit: brainly.com/question/27269845
#SPJ4