1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KonstantinChe [14]
4 years ago
12

Which type of network attack uses a fake IP address to send data packets from an unauthorized user to a network?

Computers and Technology
2 answers:
liq [111]4 years ago
6 0
D. DoS. DoS is a way to potentially lag or even crash different types of servers ranging from as small as a simple website to bigger websites and video games servers.
Harman [31]4 years ago
4 0
If im not mistaken its DoS because it gives a fake up address and it can't be traced which is why your able to hack software's without the person knowing
You might be interested in
In an experiment in which participants sat in an office and then were asked to remember what they saw in the office, participant
Inessa [10]

Answer:

The answer to this question is the "schemas".

Explanation:

A schema is plural schemata or schemas that defines a pattern of logic or action that constitutes classifications of data and the connections among them. In a computer science schemas is an organized structure for a database and all the operation of data modeling leads by schema. So the answer to this question is schemas

6 0
3 years ago
If you have a slow computer and add a lot of filters what might hapopen'
Oliga [24]
You might overload the processor and your computer will freeze.  Once frozen if may unfreeze, on may say frozen.  Then you must close the computer, turn it upside down, and unscrew the battery.  Count to one minute, the place the battery back it's place.  After that, you may flip the computer back over, and turn it on by holding down the power button.  Finally, you're all set!
8 0
3 years ago
Read 2 more answers
From your first impressions, write down what first comes to mind as to what is good or bad about the way the website/system work
suter [353]

Answer: I will consider the factors below

Usability: A measure of a user’s ability to arrive on a site, use it easily, and complete the desired task. Remember, we’re designing websites, where there is flow, rather than focusing on page design and assuming everything will flow later.

Explanation:

1.) It should be easy for the user to become familiar with and competent in using the user interface on the first contact with the website. If we take a travel agent’s website that a designer has made well, the user should be able to move through the sequence of actions to book a ticket quickly.

2.) It should be easy for users to achieve their objective through using the website. If a user has the goal of booking a flight, a good design will guide him/her through the easiest process to purchase that ticket.

3.) It should be easy to recall the user interface and how to use it on subsequent visits. So, a good design on the travel agent’s site means the user should learn from the first time and book a second ticket just as easily.

4.) We also consider user's experience

5.) The hosting server of the website

6.) Usability: A measure of a user’s ability to arrive on a site, use it easily, and complete the desired task. Remember, we’re designing websites, where there is flow, rather than focusing on page design and assuming everything will flow later.

4 0
4 years ago
The
saveliy_v [14]
The answer is Undo I think
4 0
3 years ago
Read 2 more answers
My mom hid my laptop and now I can't find it​
Svetach [21]

Answer: did you look everywhere ask for it and be like mom i wont do (whatever you did) ever again so please give me a chance can i plsss!!!!!! have it back?

Explanation:

simple as that step by step

3 0
3 years ago
Other questions:
  • After reading the article, "The Impact of Technology", answer the following question.
    14·1 answer
  • Which server-based authentication protocol would be best for an organization that wants to apply authorization policies on a per
    15·1 answer
  • Your mother wants to purchase a large hard drive for her computer ex you to see what type of dry interphase she has her computer
    11·1 answer
  • A browser allows you to set preferences for using the browser. These preferences include all of the following except
    7·1 answer
  • Because mobile users consume information one screen at a time, you should ________ when you're writing to them.
    5·1 answer
  • The _____________ RTN describes the overall effectof instructions on the programmer visible registers
    9·1 answer
  • Management is as old as human civilization. justify this statement​
    7·1 answer
  • John is writing a code instructing the character to move forward 10 steps, choose a number between 1 to 10, and if the number is
    5·1 answer
  • What will help the programmer understand what’s going on in the program?
    12·1 answer
  • 4. Return the card number, first name, last name, and average late fee of each customer. Name this column as "Fee".
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!