1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kodGreya [7K]
3 years ago
6

An intentional action designed to prevent legitimate users from making use of a computer service is called

Computers and Technology
1 answer:
MatroZZZ [7]3 years ago
4 0
Denial of Service Attack. If multiple machines are involved, it's a Distributed Denial of Service Attack.
You might be interested in
A hacker scanning a web server is likely to be identified by the target's web a. Because of the FBI's Carnivore scanning program
eduard

Answer:

C

Through the target's web server's log.

Explanation:

A web server is a server software or a hardware that is fully dedicated to the running of that software. It satisfies a user's request on the www that is the World Wide Web. A web server can, contain just one or more websites.

It processes incoming network requests over HTTP and several other related protocols.

It also stores the webpages the user have visited in the past. Tracking the target's web server to know what enter or left can expose the hacker that is scanning a user's web server.

5 0
3 years ago
The term used to describe an electronic device, operating under the control of instructions stored in its own memory, that can a
nlexa [21]
The answer to this is Computer!!
3 0
3 years ago
The part of the computer that provides access to the internet is the
mariarad [96]

Answer:

The Answer B Modem

Explanation:

That is the only way that you want connect to the internet no other part can connect.

Unless you use a ethernet.

Please rate and heart.

thank you for posting this question i am glad i could answer it.

Please make this a brianliest answer thank you.

7 0
2 years ago
I’ll mark brainliest if correct
aliya0001 [1]

Answer:

I believe the answer is B

Explanation:

5 0
3 years ago
Jim, your organizations IAM, has been contacted by the Program Manager to assist in implementing the DIACAP. Jim is not required
padilas [110]

IAM stands for<em> </em>Identity Access Management and includes processes focused on control of user access to critical information.

DIACEP on the other hand stands for DoD Information Assurance Certification and Accreditation Process and it is a process which ensures that companies  apply risk management to information systems (IS). According these explanations, the statement that Jim who is IAM in the organization is not required to assist the PM in implementing the DIACAP is false. In contrast, it is required that he works on this process.

5 0
3 years ago
Other questions:
  • In three to five sentences, describe how you can organize written information logically and sequentially
    8·1 answer
  • apple and adobe are in disagreement about the use of __________ to create apps for the iphone and ipad?
    10·1 answer
  • Your desktop, internet explorer, and the media player can be started from this area on most computers
    9·1 answer
  • Given the following sets, for each set operation provide the elements of the resulting set in set notation or using a well-known
    5·1 answer
  • Define get_date() function.
    6·1 answer
  • Who is the intended audience of a pseudocode document?
    14·1 answer
  • Write a method that takes a RegularPolygon as a parameter, sets its number of sides to a random integer between 10 and 20 inclus
    10·1 answer
  • Help a brotha out..................
    10·1 answer
  • You are trying to sell a new product to a store owner. Which method of presentation
    10·1 answer
  • If a friend gave a used Wii disc to someone, and they put it in their Wii, could they play it? Nintendo Switch games can only be
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!