1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KonstantinChe [14]
4 years ago
12

Which type of network attack uses a fake IP address to send data packets from an unauthorized user to a network?

Computers and Technology
2 answers:
liq [111]4 years ago
6 0
D. DoS. DoS is a way to potentially lag or even crash different types of servers ranging from as small as a simple website to bigger websites and video games servers.
Harman [31]4 years ago
4 0
If im not mistaken its DoS because it gives a fake up address and it can't be traced which is why your able to hack software's without the person knowing
You might be interested in
Which of the following statements about functional programming languages is incorrect?A) In pure functional programming, there a
omeli [17]
The answer is (C)
In pure functional programming loops are replaced by recursive calls
3 0
3 years ago
When a window is displayed in front of other windows, it's said to be
Dmitrij [34]
The active window

is the answer
7 0
3 years ago
Figuring out why your computer won't turn on falls under diagnosing.<br> A. True<br> B. False
igomit [66]
The answer to your question, is true
hope this helps :D
7 0
3 years ago
Read 2 more answers
Co to jest podprogram (procedura lub funkcja)? Zaznacz poprawną odpowiedź. a) Wielokrotne powtarzanie tych samych poleceń. b) Wy
ale4655 [162]

Answer:

  b)  A separate part of the program that performs a specific task.

Explanation:

A subroutine is a portion of the program that can be invoked to perform a specific task. Typically, it performs that task and returns execution control to the point immediately following its invocation. It may or may not maintain "history" or "state", and it may or may not throw exceptions.

A well-behaved subroutine will only operate on data passed to it, will not maintain any internal history or state, and will have only one exit.

8 0
3 years ago
Terence creates software requirements specification (SRS) documents for various software development projects. In which phase of
Flura [38]

Terence is involved in the <u>design phase</u> of software development life cycle (SDLC).

<h3>What is SDLC?</h3>

SDLC is an acronym for software development life cycle and it can be defined as a strategic process (methodology) that defines the key steps, phases, and stages for the development and implementation of high quality software applications.

<h3>The phases of SDLC</h3>

Generally, there are six (6) main phases involved in the development of a software application and these include;

  • Planning
  • Analysis
  • Design
  • Development (coding)
  • Deployment
  • Maintenance

In this scenario, Terence is creating software requirements specification (SRS) documents and as such is involved in the design phase of software development life cycle (SDLC).

Read more on software development here: brainly.com/question/18369405

5 0
2 years ago
Other questions:
  • Which Windows feature captures and stores copies of folders and files at specific points in time, allowing users or administrato
    10·1 answer
  • The distance at which wi-fi signals can travel ranges typically between ____ and ____.
    15·1 answer
  • To change the size of a field or record by dragging its border a.resize b.magnify c.label d.enlarge
    11·2 answers
  • Using-R,-create-a-linear-model-to-represent-the-coefficients-for-the-objects-fw2-and-fwe-data..
    10·1 answer
  • You have been asked to implement enterprise software for a manufacturer of kitchen appliances. What is the first step you should
    11·1 answer
  • Maureen downloads three pictures of cabin sizes for her siblings to vote on. She inserts one picture per slide. The third pictur
    10·1 answer
  • Plz answer me will mark as brainliest​
    8·1 answer
  • the penalties for ignoring the requirements for protecting classified information when using social networking services are ____
    12·1 answer
  • What is the available vector for each resource and the need matrix for each thread. Note that an available vector depicts the qu
    11·1 answer
  • Which key doesn't relate to keyboard A:return key B :enrollment key C: delete key D:tab key
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!