1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kodGreya [7K]
4 years ago
6

An intentional action designed to prevent legitimate users from making use of a computer service is called

Computers and Technology
1 answer:
MatroZZZ [7]4 years ago
4 0
Denial of Service Attack. If multiple machines are involved, it's a Distributed Denial of Service Attack.
You might be interested in
PLEASE HURRY! Match terms in the first column with the order descriptions in column two.
zavuch27 [327]

Megabytes gigabytes terabytes - from smallest to largest

Petabytes terabytes kilobytes - largest to smallest

Exabytes zettabytes megabytes - in no apparent order

Explanation:

5 0
3 years ago
Need help with this please
Rasek [7]

Answer:

4. let eggs = 5

let bread = 10

let soda = 6

5.

let total = eggs+bread+soda

4 0
3 years ago
The * key on the number keypad is used for _____.
12345 [234]

Answer:

multiply

Explanation:

8 0
3 years ago
Read 2 more answers
In python, what would the following code do..a=b=70
Afina-wow [57]

Answer:

It would assign the value of 20 to the variables a and b

Explanation:

7 0
3 years ago
Data that can be used to identity a single individual is known as
lys-0071 [83]

Answer:

Fingerprint Recognition

Explanation:

3 0
4 years ago
Other questions:
  • Write the definition of a function divide that takes four arguments and returns no value . The first two arguments are of type i
    8·1 answer
  • Editing and sorting the data file are steps performed during the ________ stage in the data processing cycle
    5·1 answer
  • 6.6 Write a function named timesTen. The function should have an integer parameter named number. When timesTen is called, it sho
    7·1 answer
  • On a camera,what does focus tracking do?
    6·1 answer
  • Write a function that, given an array A of N integers, of which represents loads caused by successive processes, the function sh
    15·1 answer
  • Help me out with this .....
    10·1 answer
  • Which network device regenerates the data signal without segmenting the network? modem?
    15·1 answer
  • Q: If a program is invoked with "python program.py -r input.dat output.dat", what are the elements of argv?
    10·1 answer
  • Write a program that prompts the user to enter a Social Security number in the format ddd-dd-dddd, where d is a digit. The progr
    12·1 answer
  • Tim is a project manager. He is brainstorming with his team about problems that could arise during the next phase of the project
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!