1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Neko [114]
2 years ago
15

A __________ attack is a bot attack on a computer system or network that causes a loss of service to users.

Computers and Technology
1 answer:
PSYCHO15rus [73]2 years ago
4 0

Answer:

DDos or Distributed Denial Of Service Attack

Explanation:

:)

You might be interested in
What is the best approach to testing a website
Ronch [10]

A vital part of any website project is the quality assurance stage. Prior to launch, final QA testing ensures that your site is working according to your expectations and that your site users won’t be frustrated with any non-functioning pages.

7 0
3 years ago
A hacker successfully modified the sale price of items purchased through your company's web site. During the investigation that
Korvikt [17]

Answer:

By modifying the hidden form values that is in a local copy of the company web page

Explanation:

In a situation were the hacker successful change the price of the items he/she purchased through the web site of the company's in which the company web server as well as the company Oracle database were not compromised directly which means that the most likely method in which the attacker used to modified the sale price of the items he/she purchased was by modifying the HIDDEN FORM VALUE that was in the local copy of the company web page making it easy for the HIDDEN FORM VALUE to be vulnerable to the hacker because the hidden form value did not store the company server side information or data but only store the company software state information which is why HIDDEN FORM VALUE should not be trusted.

5 0
3 years ago
E-mail is an temporary message medium.<br> a. True<br> b. False
Volgvan

E-mail stands for Electronic mail. It is a method of exchanging messages ("mail") between people in a telecommunication network with the usage of electronic devices. There is a sender and a receiver for any given message, and they switch positions in turn.

The statement that E-mail is an temporary message medium is false. E-mail can be kept forever and are not temporary.


6 0
3 years ago
Read 2 more answers
Which of these agencies main goal is the promotion of consumer protection?Immersive Reader
sattari [20]

Answer:

FTC (Federal Trade Commission)

Explanation:

However, it is not just the one government body that works to ensure consumer protection. The FTC is certainly one, however, though the others are the Food and Drug Administration, Financial Protection Bureau and the US Department of Justice. And all these bodies together ensure that the rights of the consumer are protected, through enforcement of various acts, and each of them deals with a certain type of good.

6 0
3 years ago
Discuss the purpose purpose of of network attached storage devices
valentinak56 [21]

Answer:

A network attached storage (NAS) device is a server connected to a network with the sole purpose of providing storage. NAS devices often use a RAID configuration. An external hard disk is a separate freestanding hard disk that connects with a cable to a USB or FireWire port on the system unit or communicates wirelessly. External hard disks have storage capacities up to 4 TB and more. A removable hard disk can be inserted or removed from a built-in or external drive. Removable hard disks have storage capacities up to 1 TB. A disk controller consists of a special-purpose chip and electronic circuits that control the transfer of data, instructions, and information from a disk to and from the system bus and other components in a computer. A hard disk controller may be part of the hard disk on the motherboard, or it may be a separate adapter card inside the system unit.

Please Mark Brainliest If This Helped!

5 0
3 years ago
Other questions:
  • Raymond has to send a number of large documents to his charterer accountant for filing his taxes. Which email etiquette should R
    15·2 answers
  • Make a class Employee with a name and salary. Make a class Manager inherit from Employee. Add an instance variable, named depart
    14·1 answer
  • Allison needs to graph the yearly average snowfall in Alaska. She should use a:
    13·2 answers
  • Write a method that checks whether the input string or a sentence (a string with spaces) is a palindrome or not. The method shou
    13·1 answer
  • Mark for review (Will be highlighted on the review page) 3. Which one of the following word processing features saves you the mo
    14·1 answer
  • A digital system has been developed to measure temperatures in the range -10˚C to 100˚C. If the accuracy of the system is such t
    11·1 answer
  • In python, sorry if it’s blurry
    13·2 answers
  • What should you do when you are working on an unclassified system and receive an email.
    10·1 answer
  • Web résumés allow you to include extra graphics and images that you would not include in a traditional résumé. please select the
    13·1 answer
  • Travelers should keep their profile information up-to-date. which is not an option for a traveler to update their own profile in
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!