The results of a psychological research can be used for malignant purposes, such as fooling individuals through their emotions, using propaganda to change beliefs, and manipulating others through the media.
But it can also be used for good – which is what the question is asking. It is clear that from the available options, only (D) improving communication and relationships are an example of how psychological research is used for good.
Answer:
It is .com because all the others are school-safe. And .com is snatch-able.
Explanation:
Answer:
AI
Explanation:
The answer is Artificial intelligence.
In the case above, the type of hacking attack is Amber perpetrating is option b. A man-in-the-middle attack.
<h3>What is a person in the middle attack?</h3>
A man-in-the-middle (MiTM) attack is known to be a form of a type of cyber attack where the attacker is known to often and secretly intercepts and pass messages that occurs between two parties who think they are communicating directly with one another.
Hence, In the case above, the type of hacking attack is Amber perpetrating is option b. A man-in-the-middle attack.
Se full question below
Amber is a hacker who steals information when people enter their personal details on specific websites. She intercepts the public key as it is sent from the Web server to the Web browser and substitutes her own public key in its place. This enables her to intercept the communication and decrypt the symmetric encryption key using her private key.
Which type of hacking attack is Amber perpetrating?
a. A denial-of-service attack
b. A man-in-the-middle attack
c. A drive-by attack
d. A malware attack
Learn more about hacking attack from
brainly.com/question/7065536
#SPJ1
Answer:
This question is incomplete, here is the complete question;
If a stop-and-wait protocol is used, what is the fraction of time, in seconds, that the sender is busy sending bits into the channel (the utilization), given that the round-trip-time (RTT) for a router is 20ms when sending 2000 Byte packets ( a byte is 8 bits) at 500Mega bits per second (Mbps)? Answer to the nearest tenth of a microsecond. Recall that the formula for utilization U is L/R / (L/R + RTT). Be careful of your units. Provide the answer in microseconds with one decimal place. Do not label your answer with the units, just provide the number .
Explanation:
The Answer to the question is given with proper step by step solution.
Given that : the round-trip-time (RTT in abbreviation) = 20ms = 0.02 micro seconds
L = 2000
Byte = 2000*8
bits = 16000 bits
R = 500Mbps = 500*106 bps
Now,calculate L/R = 16000 / 500*106
= 32 / 106
= 32 micro seconds
The Utilization (U) = fraction when the time sender is busy sending
= (L/R) / (L/R + RTT)
= (32) / (32 + 0.02)
= 32 / 32.02
= 0.99937539 seconds
= 999375.39 micro seconds
= 999375.4 (nearest tenth)