1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sauron [17]
3 years ago
12

A man-in-the-middle attack or impersonation are likely to result in problems with

Computers and Technology
1 answer:
Ivan3 years ago
6 0

Answer:

Data Confidentiality

Explanation:

A Man-In-The-Middle-Attack (MITM) is an attack when a hacker gets between a communicative situation and digitally eavesdrops.

You might be interested in
pLZ PLZ PLZ HELP I HAVE SO MANY MISSING ASSINMENTS. why is physical security so important and necessary for both personal users
jeka57 [31]
Physical security is important because a physical attack is perhaps the most fundamental kind of attack. ... Using a floppy drive or CD-ROM drive on a machine that does not support good BIOS security. Damage to or theft of important machine components, especially those that store data. Theft of an entire machine
7 0
3 years ago
A_______ to show the working of an object before it is built or made. A. Prototype b. Test c. Evaluation d. Plan
tresset_1 [31]

Answer:

A. Prototype

Explanation:

8 0
3 years ago
When you use the keyboard to scroll to a different position in the document, the ____ automatically moves when you press the des
FrozenT [24]

Answer:

Option C i.e., insertion point is the correct option.

Explanation:

if any user or person scrolls the following contents by using the keyboard from one position to another position in the document of the user then, the insertion point moves automatically without any implementation when the user presses any key they want. If the user clicks on the arrow keys then, it also works like that. So, that's why the following option is correct.

8 0
3 years ago
Design a class called NumDays. The class’s purpose is to store a value that represents a number of work hours and convert it to
stepladder [879]

Answer:

See explaination

Explanation:

#include <iostream>

using namespace std;

class NumDays{

int hours;

float day;

public:

NumDays()

{

hours=0;

day=0.0;

};

NumDays(int h)

{

hours=h;

day=float(h/8.0);

};

int getHour()

{

return hours;

}

float getDay()

{

return day;

}

NumDays operator +(NumDays obj)

{

int h=getHour()+obj.getHour();

NumDays temp(h);

return temp;

}

NumDays operator -(NumDays obj)

{

int h=getHour()-obj.getHour();

NumDays temp(h);

return temp;

}

const NumDays& operator++() //prefix

{

++hours;

day=float(hours/8.0);

return *this;

}

const NumDays& operator--() //prefix

{

--hours;

day=float(hours/8.0);

return *this;

}

const NumDays operator++(int) //postfix

{

NumDays temp(*this);

++hours;

day=float(hours/8.0);

return temp;

}

const NumDays operator--(int) //postfix

{

NumDays temp(*this);

--hours;

day=float(hours/8.0);

return temp;

}

};

int main()

{

NumDays obj(2),obj2(10),obj3,obj4;

obj3=obj2-obj;

cout<<"'obj3=obj2-obj'=> Day:"<<obj3.getDay()<<"##Hour:"<<obj3.getHour()<<"\n";

obj3=obj+obj2;

cout<<"'obj3=obj+obj2'=> Day:"<<obj3.getDay()<<"##Hour:"<<obj3.getHour()<<"\n";

obj4=obj3++;

cout<<"'obj4=obj3++' => Day:"<<obj4.getDay()<<"##Hour:"<<obj4.getHour()<<"\n";

obj4=++obj3;

cout<<"'obj4=++obj3' => Day:"<<obj4.getDay()<<"##Hour:"<<obj4.getHour()<<"\n";

obj4=obj3--;

cout<<"'obj4=obj3--' => Day:"<<obj4.getDay()<<"##Hour:"<<obj4.getHour()<<"\n";

obj4=--obj3;

cout<<"'obj4=--obj3' => Day:"<<obj4.getDay()<<"##Hour:"<<obj4.getHour()<<"\n";

};

3 0
3 years ago
5. In Access, data is stored in a _______ once a form is completed. A. cell B. page C. record D. form
guajiro [1.7K]
Cell dosent make sense at all, page also is completely nonsense, fourm also has nothing to do with stored data. Your awnser is C. Record 
3 0
3 years ago
Other questions:
  • The use of computer and special software packages to create and edit documents
    11·1 answer
  • Common input devices include the keyboard, ____, and integrated video cameras.
    12·1 answer
  • Describe IT infrastructure. What is the role of business intelligence in determining the technology needs of a business?
    11·1 answer
  • What is computer software
    8·2 answers
  • Write a function that receives three StaticArrays where the elements are already i n sorted order and returns a new Static Array
    11·1 answer
  • A city planner is using simulation software to study crowd flow out of a large arena after an event has ended. The arena is loca
    15·1 answer
  • Question 13(Multiple Choice Worth 5 points)
    6·1 answer
  • Draw a flowchart and write the algorithm to find even number between 1 to 50​
    7·1 answer
  • Which three IP addresses may be pinged by the Test Management Network feature in the ESXi hosts DCUI
    12·1 answer
  • A designer wraps up a final prototype of a language learning app in Adobe XD, and wants to share their work with the development
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!