1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aliina [53]
3 years ago
8

How does a passive attack differ from an active attack?

Computers and Technology
1 answer:
larisa [96]3 years ago
4 0

Active and Passive Attacks are security attacks. In Active attack, an attacker tries to modify the content of the messages. Whereas in Passive attack, an attacker observes the messages, copy them and may use them for malicious purposes. ... In Passive Attack, information remain unchanged. Hope this helped :)

You might be interested in
write a function that given an integer Y and 3 non-empty string A,B,W, denotingthe year of vacations, the beginning month, the e
chubhunter [2.5K]

Answer:un spain please

Explanation:

4 0
3 years ago
To define constructors and member functions outside of a class's original scope, the operator can be used.
Artyom0805 [142]

Answer: Scope resolution operator(::)

Explanation: A member function and the constructor can be called within the function easily but for the execution of the these components outside the class , a special operator is required to call the functions. The scope resolution operator(::) preceding with the name of class is thus used for defining of the function outside class.This operator maintains the cope of the function and constructor outside the class.

8 0
3 years ago
Is this free? do i have to pay to use this app??
Virty [35]
No i don’t have to pay but there is additional stuff if you pay but i don’t pay for anything
3 0
3 years ago
A user cannot connect to any devices outside of the current network. Which device should a technician check first for problems?
tatiyna

Answer:

DHCP server

Explanation:

The first option that we must check is the DHCP server (The Dynamic Host Configuration Protocol) server because this is the protocol that gives us the IP addresses to connect with the internet if we don't have an IP (Internet Protocol) address,  we can never have an internet connection, if the DNS fails we cannot connect with the internet, but regularly the DHCP is the main issue if there are not physical issues.

4 0
3 years ago
What would this look like if you were to write the pseudocode but for c++?
makvit [3.9K]

Answer:

when make a task list you would not include commands that are for any specific language like C++

Explanation:

pseudocode should be universal. So when creating the task list, you would not include commands that are for any specific language like C++, java, C#, or perl. The point of pseudocode is to design a program that can be translated in to any language.

5 0
3 years ago
Other questions:
  • Emma opened a new document a Microsoft word and typed her assignment. She is now planning to save the documents for the first ti
    11·1 answer
  • I need a idea of a origami for my coding class and it needs to be easy to make
    15·2 answers
  • The two variables causing the point of difference between the time codes are the frequency and the count
    6·1 answer
  • ImmuneEarth, a research and development company, has "eradicate all diseases" as its motto. It has numerous departments that res
    6·1 answer
  • . Suppose that name is a variable of type string. Write the input statement to read and store the input Brenda Clinton in name
    5·1 answer
  • ______ is a type of computer software that is installed into devices such as printers, print servers, and various types of commu
    5·1 answer
  • What is the name of the advanced warrior race of robots in Doctor Who?
    10·2 answers
  • Can anyone help me this is due today :) <br> Thank you so much
    14·2 answers
  • Which bug type would you suggest for the following bug? The button label "Add to cart" is not fully visible.
    5·1 answer
  • 7. Which cipher is based on the clues of the physical factors, rather than the hardware or a software cryptosystem
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!