1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MAVERICK [17]
4 years ago
7

In distributed dos attacks, the attacker sends messages directly to ________. bots the intended victim of the dos attack backdoo

rs dos clients dos servers
Computers and Technology
1 answer:
kirill115 [55]4 years ago
4 0
The word DoS refers to the Disk Operating System. In the case given above, if it happens that there is a distributed DoS attack, the attacker then sends messages directly to the BOTS. Bots refer to internet or web robots. Hope this answer helps. The answer is the first option.
You might be interested in
I was able to solve the question :))
Leviafan [203]

Answer:

ill take the points anyway

Explanation:

4 0
3 years ago
In cell K26, create a formula that counts the number times "Thunder" occurs in the columns containing "Names"
jek_recluse [69]

Answer:

I1 to K2: Use a formula to link the cells. Create a formula in column L that calculates the averages for each matching category in K2:

<h3>hope it's help you </h3><h3>plz mark as brain list </h3>
3 0
3 years ago
When a virtual machine is
egoroff_w [7]

Answer:

Resources, RAM

Explanation:

May be another choice for resources but the second one is definently RAM

8 0
3 years ago
4.11 lesson practice <br> Need help
NNADVOKAT [17]

Answer:

Computer modeling.

Explanation:

Computational modeling is characterized by the use of computers to represent a real world situation, that is, it is the use of mathematical models to assist in solving problems in multidisciplinary areas essential for the development of science and technology. Through computational modeling it is possible to adjust several study variables and achieve greater probabilities of reaching an effective result more quickly and at a lower cost.

Through this system it is possible to solve complex problems such as scientific research, product development, analysis and predictions about certain phenomena, development of technology applied to health, etc.

4 0
3 years ago
Read 2 more answers
What is the purpose of the 300 Log?
egoroff_w [7]

Answer:

The OSHA Form 300 is a form for employers to record all reportable injuries and illnesses that occur in the workplace, where and when they occur, the nature of the case, the name and job title of the employee injured or made sick, and the number of days away from work or on restricted or light duty, if any.

Explanation: brainliest plzzzz!

4 0
3 years ago
Other questions:
  • List of steps to apply bold and italic formatting to a word​
    9·2 answers
  • Any one of the languages that people have designed for specific purposes, such as representing mathematical ideas or computer pr
    15·1 answer
  • Brainly wont show me the "I'm Done" button after an interactive ad, and I cant figure out why. I've watched the entire ad, click
    11·2 answers
  • What is a Software that interprets commands drom the keyboard and mouse
    13·1 answer
  • Given the three thread states: running, runnable (i.e., ready), and blocked (i.e., waiting), state which of the six possible thr
    13·1 answer
  • Write a program with a function that accepts a string as an argument and returns the number of uppercase, lowercase, vowel, cons
    14·1 answer
  • What are the benefits of writing functions that use parameters and return List 2 please and explain what is return
    12·1 answer
  • Brain for free 12628397
    14·2 answers
  • How is a transaction verified on a cryptocurrency network?.
    14·1 answer
  • If you have created users with administrator privileges on your windows 7 or linux systems, why bother creating other user accou
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!