1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kodGreya [7K]
4 years ago
6

An intentional action designed to prevent legitimate users from making use of a computer service is called

Computers and Technology
1 answer:
MatroZZZ [7]4 years ago
4 0
Denial of Service Attack. If multiple machines are involved, it's a Distributed Denial of Service Attack.
You might be interested in
Which is an appropriate strategy for using a workplace blog?
OLEGan [10]

Answer:

a

Explanation:

8 0
3 years ago
Running the disk cleanup utility is a quick way to ________.
Likurg_2 [28]
Clear out unnecessary files, for example caches, caches are a collection of items of the same type stored in a hidden or inaccessible place.
8 0
3 years ago
How would you describe your experiences with social media, either for yourself or for people you know? Good, bad, or in the midd
horrorfan [7]

Answer: I would say it’s both good and bad. Firstly, it’s good because you’re able to communicate with people from all over the world, whether it’s a friend or family member. But on the other hand it’s bad too, because there are manny dangers of being online, such as having your personal information stolen, or being cyber-bullied. So while it is good for communication purposes, it does have it’s downsides.

5 0
3 years ago
How is blockchain different from traditional database models?
vekshin1

Answer:

Centralization

Explanation:

The primary difference between a blockchain and a database is centralization. While all records secured on a database are centralized, each participant on a blockchain has a secured copy of all records and all changes so each user can view the provenance of the data.

6 0
2 years ago
People who score high on the Big Five trait dimension of ________ tend to use more adjectives in their e-mail communications. Gr
Gemiola [76]

Answer:

conscientiousness

Explanation:

4 0
3 years ago
Other questions:
  • Write a program that reads three whole numbers and displays the average of the three number. Sample Run #: java Average3 Interac
    15·1 answer
  • Who would like to join a team devoted to decreasing spam and bullying?
    5·1 answer
  • Which of the following Google tools support collaboration? Docs Sheets Slides All of the Above
    13·1 answer
  • What will be the output of the following code? <?php $foo = 'Bob'; $bar = $foo; $bar = "My name is $bar"; print $bar; print $
    8·2 answers
  • What evaluates variables that search engines use to determine where a URL appears on the list of search results?
    12·1 answer
  • Name two materials that we can burn in order to get energy from biomass
    9·1 answer
  • I need help with cisco please
    12·1 answer
  • You want to calculate a bonus if the sold price was at least equal to the listing price, and if the house sold within 30 days af
    6·1 answer
  • PYTHON 3 CODE HS HELP PLZ
    14·1 answer
  • A eclipse occurs at a full moon when the moon passes between earth and the sun
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!