1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
shutvik [7]
3 years ago
9

Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack.

Computers and Technology
1 answer:
AnnZ [28]3 years ago
4 0
Distributed Denial of Service /<span> </span><span>DDoS</span>
You might be interested in
JAVA- If you have an int as the actual parameters, will it change to fit the parameters if it requires a double, or will the cod
ivann1987 [24]

If you have only 1 method that is not overloaded, then you will not be able to call it with inappropriate parameter types, that is, if the initial type of the parameter is int, then it will not be able to get the double, float, and other values, because of this an error will occur.

For this, method overloading is created.

Method overloading is when you create methods with the same name, but only the content and parameters of the methods are/can-be completely different.

6 0
3 years ago
Does any of yall know how to delete your account?
il63 [147K]

Answer:

No i really don't but why would you want to delete your account

8 0
3 years ago
What is the best way to limit a google search and get the most specific information possible?
Marrrta [24]
You go into settings on the google search and click advanced search. The rest you do on your own.
6 0
3 years ago
How to turn off 2-step verification without signing in.
Alenkasestr [34]

Answer:

You cannot do this; you need to sign into the account to gain access to any account security settings

4 0
3 years ago
What feature, once activated, can't be disabled without reinstalling all domain controllers within a forest?
larisa86 [58]

The feature in which when once has activated can’t be disabled without having it to be reinstalled in all of the domain controllers inside the forest is the Active Directory Recycle Bin. The Active Directory Recycle Bin is responsible for having to minimize the service directory by having to enhance the ability of preserving and to restore deleted objects without being able to restore it with the use of the active directory data.

8 0
3 years ago
Other questions:
  • Emma wants to create a web page for her school’s volleyball team. Which of these could she use?
    7·1 answer
  • Can anyone help me with this coding?
    8·1 answer
  • List and the deference between MS access objects​
    8·1 answer
  • 6 The part of the computer that contains the brain or central processing unit is also known as the ?
    11·1 answer
  • When you perform an in-place upgrade to windows 8.1 from windows 7, what will be names of the “windows” folders in windows 7 and
    5·1 answer
  • Select the answer that best describes the activity
    5·2 answers
  • What is data analysing data and give three examples ?​
    9·1 answer
  • FlimFlam.Shop is the best clothing shop ever.
    9·2 answers
  • The binary number represented by the voltage graph below is
    6·1 answer
  • PLEASE HELP ME!!!
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!