1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitry [639]
3 years ago
12

Which type of denial of service attack exploits the existence of software flaws to disrupt a service?

Computers and Technology
1 answer:
hichkok12 [17]3 years ago
4 0
<span>The denial of service attack that exploits the existence of software flaws to disrupt a service is the teardrop attack. </span>The teardrop attack exploits flaws in the way older operating systems handled fragmented Internet Protocol (IP) packets.
<span>Fragmented packets are sent to a target machine but the target machine  cannot reassemble them due to a bug in TCP/IP fragmentation reassembly, the packets overlap one another. This results in crash in the target network device. </span>
You might be interested in
Why operating system is pivotal in teaching and learning
trasher [3.6K]

Answer:

Without it information flow is impossible

Explanation:

The word 'pivotal' also means crucial or vital, and so we need to consider what an operating system actually does.

Remember, merely having all the hardware of a computer would not allow you to run (install and use) programs. It is by means of an operating system that teaching programs can be installed, and it is also by means of an operating system learning can take place.

For example, a student can decode (learn) instructions/lessons from his teacher via a software program; and the software program needs an operating system to open (run) the program.

6 0
3 years ago
What is the problem, if any, with the following code?The desired output is [3,19].
vfiekz [6]

Answer: You need a temporary variable to hold the value 3

Explanation:

So, aList[0] is 3 and aList[1] is 19, if it will be as it is you litteraly say to the compiler to change aList[0] to aList[1]  at this moment aList[0] is 19 and aList[1] also is 19 and if you try to change aList[1] to aList[0]  it will not change its value because they are the same.

You need temp variable to keep one of the values.

8 0
2 years ago
Normal or random variations that are considered part of operating the system at its current capability are ______: ​ a. systemic
Effectus [21]

Normal or random variations that are considered part of operating the system at its current capability are <u> c. common cause variations.</u>

Explanation:

Common cause variation is fluctuation caused by unknown factors resulting in a steady but random distribution of output around the average of the data.

Common-cause variation is the natural or expected variation in a process.

Common-cause variation is characterised by:

  1. Phenomena constantly active within the system
  2. Variation predictable probabilistically
  3. Irregular variation within a historical experience base

It is a measure of the process potential, or how well the process can perform when special cause variation removed.

Common cause variation arises from external sources that are not inherent in the process and is where statistical quality control methods are most useful.

Statistical process control charts are used when trying to monitor and control 5- and 6-sigma quality levels.

4 0
3 years ago
Consider a single CPU system with an active process A. Explain what happens in the following circumstances including any interru
Anika [276]

Answer:

The answer to this question as follows:

Explanation:

In option a, When we use fork, a new mechanism, that uses fork() method, which is in the parental process, to replicate all sites. It has been installed in a space-differentiating operating system.

In option b, It is the present system cycle that scan and wait for any of the system processor to be installed.

In option c,  The time delay happens when A operates. It is a global that make issues, which are cleared and slowed down when an interrupt happens. In this process, there are not any distractions. It splits into slowly as it heads into the ISR. It helps to understand the code easily.

5 0
3 years ago
Money left over after the bills are paid is referred to as
sveta [45]
Change is what is left over 

ex. the cashier tells you "here is your leftover change sir/ma'am "<span />
3 0
3 years ago
Read 2 more answers
Other questions:
  • Which would cause a decrease in the quantity of computers supplied?
    15·2 answers
  • How does consumption of alcohol affect your driving skills? Name three ways that alcohol can affect your driving.
    15·2 answers
  • Technological _____ is the term used to describe the merging of several technologies into a single device.
    13·1 answer
  • Which of the following statements about Linux is not​ true? A. Linux works on all the major hardware platforms. B. It plays a ma
    5·1 answer
  • Exceptions can be handled in all of these ways except:
    6·1 answer
  • Which rule should be followed to stay safe online
    5·1 answer
  • I still haven't figured out how to award someone branliest will someone help me? If you explain to me how to do it i will do awa
    14·1 answer
  • First time using this site so be mindful if I make any mistakes
    6·1 answer
  • I need help!!!! 1.04
    9·1 answer
  • A large retail company hires several new joiners and would like to incorporate Virtual Reality (VR) into their onboarding proces
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!