1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lina20 [59]
2 years ago
6

A(n) ________ attempts to slow down or stop a computer system or network by sending repetitive requests for information.

Computers and Technology
1 answer:
andreev551 [17]2 years ago
7 0

A DoS attack is known as attempts to slow down or stop a computer system or network by sending repetitive requests for information.

<h3>What is a DoS attack?</h3>

A DoS attack is known to be a form of system attack that is often launched from a lot of compromised devices. It is said to be distributed in the world as a kind of botnet.

This is known to be a form of denial of service attacks, where there is the use of  a single Internet-connected device that is the use of one network connection to drown a target with a deadly form of traffic.

Learn more about DoS attack from

brainly.com/question/13068595

You might be interested in
Html quickly evolved through specifications that are the result of the collective work of the organization known as the ____.
Archy [21]

Html quickly developed thanks to specifications that came up as a result of the World Wide Web Consortium's joint work (W3C).

<h3>What is world wide web consortium (W3C)?</h3>
  • The main worldwide standards body for the World Wide Web is the World Wide Web Consortium.
  • The consortium, which was established in 1994 and is now chaired by Tim Berners-Lee, is made up of member organizations that employ full-time workers to collaborate on developing standards for the World Wide Web.
  • In order to create Web standards, member organizations, a full-time staff, and the general public collaborate inside the World Wide Web Consortium (W3C).
  • W3C's goal is to lead the Web under the direction of Web creator and Director Tim Berners-Lee and CEO Jeffrey Jaffe.

To learn more about world wide web consortium (W3C), refer to:

brainly.com/question/11397745

#SPJ4

7 0
2 years ago
What are the uses of DVD Ram​
Verdich [7]

Answer:

Like ordinary random access memory (RAM), it can be repeatedly read, written to, and erased. Intended mostly for removable computer storage, DVD-RAM provides the capabilities of Rewriteable CD (CD-RW) - users can run programs from the discs, copy files to them and rewrite or delete them.

4 0
3 years ago
Read 2 more answers
Which resources could be used a lot when installing a desktop app for synchronization purposes? Choose two answers.
Sergeu [11.5K]

Answer:

While installing desktop sync app such as drop box following two resources will be used a lot

  1. CPU
  2. RAM

Explanation:

CPU usage has been increased while installing desktop sync application, because it depends on the number of files that need to be synced. If the number of files is high the CPU usage will increase.

The need of memory such as RAM is also increased while installing the desktop sync application. As the number of files that need to be synced increases the RAM usage is also increases.

4 0
3 years ago
Write a function called quadruple that quadruples a number and returns the result. Then make several calls to the quadruple func
valentina_108 [34]

def quadruple(n):

   return n*4

print(quadruple(3))

print(quadruple(1))

print(quadruple(2))

I wrote my code in python 3.8. I hope this helps.

7 0
3 years ago
The /home/gshant/smp directory contains several files. The directory and files need to be removed. The current working directory
kherson [118]

Explanation:

Whenever a user types in a command at the command line that is not built into the shell or that does not include its absolute path and then presses the Enter key, the shell searches through those directories, which constitute the user's search path, until it finds an executable file with that name.

3 0
3 years ago
Other questions:
  • Why is the Vigenere cipher hard to crack? (select 2)
    6·1 answer
  • One metric ton is approximately 2,205 pounds.
    6·1 answer
  • What is a file that has an .iso extension? What does this extension indicate?
    8·1 answer
  • Which of the following sentences is written in a passive voice
    5·2 answers
  • Create a program named Reverse3 whose Main() method declares three integers named firstInt, middleInt, and lastInt. Assign the f
    9·1 answer
  • Which of the following is considered a white collar crime?
    13·1 answer
  • An administrative assistant types a document, saves, and prints. The assistant is using _____.
    14·1 answer
  • Several programmers write individual code modules that are used for different processes in a vehicle. Individual tests have alre
    13·1 answer
  • Vẽ sơ đồ lắp đặt gồm 2 cầu chì, 1 ổ điện, 2 cực điều khiển 2 đèn mắc song song
    9·1 answer
  • Part B How could installing new technology, such as scrubber machines, affect the factories required to install them? Name a pos
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!