1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nezavi [6.7K]
1 year ago
8

A ____ attack is much more substantial than a dos attack because of the use of multiple systems to simultaneously attack a singl

e target.
Computers and Technology
1 answer:
GarryVolchara [31]1 year ago
7 0

Answer:

ddos

Explanation:

DDOS (Distributed Denial Of Service) is more effective becaause it utilizes many computer systems for the attack, mostly botnets.

You might be interested in
Procter & Gamble regularly monitors trends and information posted about their products and brands by consumers on several We
Shkiper50 [21]

Answer:

The correct answer to the following question will be "Web tracking".

Explanation:

This is indeed a business operation to keep an eye on the subscribers or visitors to the business. So what web trackers do is much more than that. They check up on your web activity.

A tracker generally seems to be a database script programmed to extract sets of data on your interests and how you are when you communicate through their database.

There are four types of Web trackers such as:

  • Embedded scripts.
  • Cookies.
  • Finger printers.
  • Supercookies.

3 0
3 years ago
All of the following are search operators EXCEPT _______________. a. AND b. OR c. NOT d. GET
ella [17]
D is ur answer. Hope this helps
5 0
4 years ago
Read 2 more answers
Cloud architects have been largely replaced by ScrumMasters.<br><br> True<br><br> False
Kitty [74]
True much larger than scrum masters
6 0
3 years ago
Read 2 more answers
What is one problem you should keep in mind when researching information on the Internet?
shepuryov [24]
The answer is A due to the internet being a plethora of information being accessed by anyone and everyone with internet access. Any person of no background to certain information could claim mastery to the field and sway his/her audience to ways possible. Ensuring that the source of the information being read is from credible and reputable companies. You can do this by ensuring the information is from newspapers with names known all over the world or there are also sourced footnotes from the author where they could have cited some information from other articles. 
5 0
3 years ago
Read 2 more answers
Elena is starting a new nonprofit organization that provides professional-looking clothes for women who need to go on job interv
frutty [35]

Answer:

Excel is a multipurpose program that is useful in many different ways and not just in payroll. It has uses from Accounting to scientific research and everything in-between.

Elena might not need it for payroll but there are other ways to use Excel such as:

  • Database of Donor details - Elena can use Excel to keep a list of the businesspeople who donate their old clothes to the organization. She can also add details to these names such as when they donated, the frequency at which they have donated, what they donated and the like. The donor details will therefore be organized such that information on donors can be easy to acquire for whatever reason it is needed for.
  • Inventory - Excel can be used to keep an inventory list of the clothes that the organization has in stock. This will enable them better serve those they want to help as well as ensuring accountability in the workplace. A well kept inventory list will enable all sorts of analysis to be carried out such as which types of clothes are most in stock, which clothes are needed, which clothes are preferred and the like.
3 0
4 years ago
Other questions:
  • Different units of CPU ?
    12·1 answer
  • Analysts use _____ to show the objects that participate in a use case and the messages that pass between the objects over time f
    12·1 answer
  • How and why do engineers use models?
    15·1 answer
  • A _________________________ can use SOAP headers to carry meta information in its messages. A. Web service B. REST Service C. Co
    14·1 answer
  • A computer program uses 3 bits to represent integers. When the program adds the decimal (base 10) numbers 5 and 3, the result is
    6·1 answer
  • What is the most significant issue that needs to be addressed when ensuring the proper functioning of a computer?
    7·1 answer
  • Assume that sentence is a variable that has been associated with a string consisting of words separated by single space characte
    5·1 answer
  • What describes a relationship between edge computing and cloud computing?
    6·1 answer
  • Dora has inserted a text box into a Word document that she is formatting. Which strategy will not format text boxes? Create a li
    6·2 answers
  • Which of the following is an example of a directory path? Check all of the boxes that apply.
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!