1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
eduard
3 years ago
15

The attack in which the attacker sends a fragmented message that the victim cannot reconstruct is a(n) ________ attack.

Computers and Technology
1 answer:
Anna35 [415]3 years ago
7 0

Answer:A teardrop attack

Explanation:

A teardrop attack also  called  denial-of-service  attack is one  which an attacker, usually a hacker  sends many  fragmented bug data messages  to a victim's machine causing a crash in the device. This is because data moves in small data packets of whose transmission should follow layers according to the model of the devise be it OSI or  TCP/IP model. Now when a hacker continually sends huge amounts of packets of bug data, the process of data transmission fails and  packet data becomes overlapped, making the victim 's device machine in disarray and difficult to reconstruct while trying to  rearrange them. When the hacker continually sends in more bug data packets to the already confused machine,  The machine system crashes.

You might be interested in
For the description below, develop an E-R diagram:
xeze [42]

Answer:

See explaination

Explanation:

E-R diagram:

Entity Relationship Diagram, also known as ERD, ER Diagram or ER model, is a type of structural diagram for use in database design. An ERD contains different symbols and connectors that visualize two important information: The major entities within the system scope, and the inter-relationships among these entities.

Please kindly check attachment for for the ERD of the question asked.

4 0
4 years ago
Why is OS important in every data processing system? <br>Please Answer Fast! ​
Artist 52 [7]

Answer:

Functions of an operating system. An operating system provides three essential capabilities: It offers a UI through a CLI or GUI; it launches and manages the application execution; and it identifies and exposes system hardware resources to those applications -- typically, through a standardized API.

Explanation:

6 0
3 years ago
Write the code in python to ask the user to input two integers. Your program will then print the greatest common divisor of the
Hunter-Best [27]

import math

num1 = int(input("Enter a number: "))

num2 = int(input("Enter a number: "))

print(math.gcd(num1, num2))

The gcd() - greatest common divisor function, which is part of the math module works perfectly in this situation.

3 0
3 years ago
Why are streak plates used to test minerals?
Sphinxa [80]

A. Small impurities can cause big changes in the color of a mineral.

5 0
3 years ago
WHAT DO YOU KNOW?<br> Why would you want to change your Table<br> Properties?
joja [24]

read the slides ;  Table Properties are the way the table appears or looks.

6 0
3 years ago
Other questions:
  • An intranet is an external network.TrueFalse
    15·1 answer
  • You plan to use the Fill Down feature on a formula in Excel and need to keep a cell reference the same. Which format allows you
    6·1 answer
  • _____ consists of the instructions that direct the operation of the computer system and enable users to perform specific tasks,
    15·1 answer
  • A company purchased a high-quality color laser printer to print color brochures and sales proposals. The printer is connected to
    5·1 answer
  • Computer design replaced ______________
    6·1 answer
  • In science class, Patricia is giving a presentation on the different types of flowers in her community. As part of her presentat
    5·1 answer
  • Which object event is an indication that something has been created but not committed into the database?
    13·1 answer
  • After Alexandra installed new software, she set it up to perform in a certain way. She is _____. changing the peripherals linkin
    10·1 answer
  • Explain with examples what is software​
    6·1 answer
  • What job does a front-end developer perform?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!