1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
timofeeve [1]
3 years ago
15

____ is the name of a particularly nasty automated program that attacks a network by exploiting Internet Protocol (IP) broadcast

addressing and other aspects of Internet operation.
Computers and Technology
1 answer:
Mariulka [41]3 years ago
5 0

Answer:

Smurf

Explanation:

The use of automated program smurf in exploiting Internet Protocol(IP) is called smurfing. When the attackers uses this program the part of a network which is attacked becomes unusable.

You can counter smurfing by disabling IP broadcast addressing at every network router.

So we conclude that the answer is Smurf.

You might be interested in
The ________ coordinates the flow of data and information through the computer system by coordinating the hardware, software, us
Irina-Kira [14]

Answer:

Operating System.

Explanation:

All the properties listed in the question are handled by the Operating system.

Operating system:-It is a software that manages the computer hardware,provides common services for the programs of the computer and software resources.

Some of the most popular operating systems are as following:-

  1. Microsoft Windows.
  2. Apple MACOS
  3. Linux.

There are also other operating systems present out there these are some of the mostly used OS's.

8 0
3 years ago
What best describes the difference between plagiarism and fair use
Colt1911 [192]
The answer is ..........
 
<span>Fair use </span>

The doctrine of fair use allows the limited use of copyrighted material for certain educational, scholarly and research purposes without the permission of the copyright owner. It applies to any copyrighted material regardless of source, including the Internet. If you photocopy a page from one of your textbooks or print a page from a copyrighted Internet site for certain educational, scholarly or research purposes, your actions may fall under the doctrine of fair use. The copyright laws give you permission to copy the work<span> (with certain limitations), even though the owner of the copyright did not.


V.S

</span>Plagiarism

Plagiarism is "the representation of another's work or ideas as one's own; it includes the unacknowledged word-for-word use and/or paraphrasing of another<span> person's work, and/or the inappropriate unacknowledged use of another person's </span><span>ideas" (The Ohio State University Code of Student Conduct). This means that if </span><span>you use another person's work when completing any academic assignment,</span><span> </span><span>regardless </span>

5 0
3 years ago
Read 2 more answers
The code snippet below checks whether a given number is a prime number. What will be the result of executing it? public static v
Rus_ich [418]

Answer:

B)

Explanation:

The Code Snippet is correct and gives the expected result.

Prime numbers are numbers with only two divisors (1 and themselves)

Below are the list of prime numbers from 1-100

2, 3, 5, 7, 11, 13, 17, 19, 23, 29, 31, 37, 41, 43, 47, 53, 59, 61, 67, 71, 73, 79, 83, 89, 97

Testing each of the following numbers in the compiled code snippet gives the expected output.

7 0
3 years ago
The apparent magnitude of a star is the brightness of a star
Lana71 [14]
<span>c. as seen from the Earth without the effect of the atmosphere</span>
6 0
3 years ago
Read 2 more answers
Write a regular expression pattern that matches strings representing trains. A single letter stands for each kind of car in a tr
MAVERICK [17]

Answer:

See explaination

Explanation:

import re

def isValidTrain(train):

pattern = r'^E+(((P|PP|PPP|PPPP)D)*(BB)*)*C$'

if re.match(pattern, train):

return True

return False

def checkAndPrintTrain(train):

print("Train", train, "is valid:", isValidTrain(train))

checkAndPrintTrain("EC")

checkAndPrintTrain("EEEPPDBBPDBBBBC")

checkAndPrintTrain("EEBB")

checkAndPrintTrain("EBBBC")

checkAndPrintTrain("EEPPPPPPDBBC")

checkAndPrintTrain("EEPPBBC")

checkAndPrintTrain("EEBBDC")

Sample output

Train EC is valid: True

Train EEEPPDBBPDBBBBC is valid: True

Train EEBB is valid: False

Train EBBBC is valid: False

Train EEPPPPPPDBBC is valid: False

Train EEPPBBC is valid: False

Train EEBBDC is valid: False

6 0
3 years ago
Other questions:
  • Write a full class definition for a class named Counter, and containing the following members: A data member counter of type int
    7·1 answer
  • A _________ is a series of commands and instructions that you group together as a single command to accomplish a task automatica
    15·1 answer
  • What kind of problems could you run into if you format a cell with the wrong format for the data type?
    15·2 answers
  • assume an int array, candy, stores the number of candy bars sold by a group of children wherecandy[j] is the number of candy bar
    7·2 answers
  • Radio and television are examples of
    9·1 answer
  • Write a program called DeliveryCharges for the package delivery service in Exercise 4. The program should again use an array tha
    9·1 answer
  • Cindy visits her favorite website on a lunch break using a hospital computer. After she downloads a file, she notices that the c
    7·1 answer
  • What is the IEEE 802 standards name for a wireless network that is limited to one person's workspace?
    14·1 answer
  • Name all the keys of the home row.
    13·1 answer
  • What is the long tube on a microscope called​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!