1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MAVERICK [17]
4 years ago
7

In distributed dos attacks, the attacker sends messages directly to ________. bots the intended victim of the dos attack backdoo

rs dos clients dos servers
Computers and Technology
1 answer:
kirill115 [55]4 years ago
4 0
The word DoS refers to the Disk Operating System. In the case given above, if it happens that there is a distributed DoS attack, the attacker then sends messages directly to the BOTS. Bots refer to internet or web robots. Hope this answer helps. The answer is the first option.
You might be interested in
Which device is connected to a port on a switch in order to receive network traffic?
inysia [295]

Answer:

"Passive IDS" is the appropriate answer.

Explanation:

  • A framework that is designed mostly for monitoring and analyzing internet traffic operations and alerting a user or administrator about possible bugs, as well as disruptions, is known to be passive IDS.
  • This IDS cannot carry out certain preventive as well as remedial processes as well as operations by itself.
6 0
3 years ago
given that play_list has been defined to be a list, write an expression that evaluates to a new list containing the elements at
Tamiku [17]

Answer:

new_list = play_list[0:4]

Explanation:

5 0
3 years ago
What did major networks do to combat audience erosion in the 1990s?
S_A_V [24]

Answer: I think is 3. They acquired cable channels. They acquired cable operators.

Explanation:

6 0
4 years ago
Ask the user for a total food bill and then find the new total after 6% tax and a tip of the users choice (15, 18, 20%) in pytho
chubhunter [2.5K]

Answer:

#here is code in python.

# read the food bill

tot_bill=float(input("Please enter the food bill:"))

# tax on food

tax=0.06

#choice for tip by user

choice=int(input("enter your choice for tip:(1 for 15%, 2 for 18% and 3 for 20% :)"))

// calculate the total food bill

if choice==1:

   tot_food_bill=tot_bill+tot_bill*tax+tot_bill*(.15)

elif choice==2:

   tot_food_bill=tot_bill+tot_bill*tax+tot_bill*(.18)

elif choice==3:

   tot_food_bill=tot_bill+tot_bill*tax+tot_bill*(.2)

else:

   print("invalid choice:")

#print the total food bill

print("total food bill is ",tot_food_bill)    

Explanation:

Read the food bill from user and assign it to variable "tot_bill".Initialize the tax=0.06 (i.e. 6%) on the bill.Then ask user to give his choice for tip. if the choice is 1 then tip will be 15%, if 2 then 18% and if choice is 3 Then tip will be 20% of the bill.Calculate the total food bill and assign it to variable "tot_food_bill".

Output:

Please enter the food bill:100                                                                                                                                

enter your choice for tip:(1 for 15%, 2 for 18% and 3 for 20% :)2                                                                                            

total food bill is  124.0

3 0
3 years ago
Jeremy Bridges is an executive for Green Web Designs, where his primary role is to ensure the security of business systems and d
klasskru [66]

Answer:

Chief Security Officer

Explanation:

According to the given statement in the question the Jeremy's role in the company is "Chief Security Officer (CSO)".

The chief Security officer has the role of developing and looking on to the strategies and policies that are required for maintaining the operational, strategic, financial and reputational security  of the  overall company.

6 0
3 years ago
Other questions:
  • A low-level language has a low level of ___________ because it includes commands specific to a particular cpu or microprocessor
    5·1 answer
  • When driving a truck is fuel crucial
    9·1 answer
  • How is an orthographic drawing similar or different from an isometric drawing
    12·1 answer
  • What OS is most commonly used by businesses?
    11·1 answer
  • Which of the following is the most appropriate unit to describe the rate at which data is transferred using the internet?
    6·2 answers
  • Describe how being a global citizen in the world of advanced technology can be beneficial to your success in meeting your person
    13·1 answer
  • Plsss help anyone PLSSSSS ​
    13·1 answer
  • What is the answer of this Q?
    15·2 answers
  • Write a short note on Ms - Excel...​..
    7·1 answer
  • Which code snippet is the correct way to rewrite this in Semantic HTML?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!