Computers can help organize the workplace and it can also help communications between work members. This is the vague explanation of how it impacts businesses. However, different businesses have different uses for computers and other technologies.
I think it’s A. Leadership
Answer: An attack where the attackers will interrupt a data transfer happening between parties and in which they will pretend to be the legitimate parties.
Explanation: For example think about two people writing letters to each other back and forth. However you, the attacker can intercept the letters and effectively change the message/contents of the letter going to the other person. This is probably not the best explanation, but simply put a man-in-the-middle attack is when an attacker interupts a transfer and pretends to be the legitimate source.
It can be written with
192.168.6.0/23
255.255.0.0 means /16 which is class b subnet mask so as 254 is in the third octet which means /23 so you can write it as /23.