1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
timofeeve [1]
3 years ago
15

____ is the name of a particularly nasty automated program that attacks a network by exploiting Internet Protocol (IP) broadcast

addressing and other aspects of Internet operation.
Computers and Technology
1 answer:
Mariulka [41]3 years ago
5 0

Answer:

Smurf

Explanation:

The use of automated program smurf in exploiting Internet Protocol(IP) is called smurfing. When the attackers uses this program the part of a network which is attacked becomes unusable.

You can counter smurfing by disabling IP broadcast addressing at every network router.

So we conclude that the answer is Smurf.

You might be interested in
The sum of the elements of an integer-valued array recursively calculated as follows: The sum of an array of size 0 is 0; Otherw
Ugo [173]
In what language? Most languages have iterator functions like map in JavaScript that will loop through the elements, making this almost a one liner

sum = 0
arr.map( elem => sum += elem )
8 0
3 years ago
What is the best application to keep track of inventory for a store?
exis [7]

"The site iGeeks Blog recommends Inventory Tracker, which functions as a comprehensive inventory tracking system for iPad.

"It works excellently in synchronizing your inventory and comes with some really amazing features that you’d only expect from a desktop app," said the blog.

A free version of the app is available, and the pro version is just $3.99."

3 0
4 years ago
Summarize who you believe cyber criminals are, and why?
sergij07 [2.7K]

Answer:

 The cyber criminals are the people that are engaged with getting the data in an unapproved way and furthermore mischief to the association henceforth are considered as cyber criminals.

Cyber criminals are people or groups of individuals who use innovation to committed the malicious exercises on computerized frameworks or systems with the aim of taking the organization data or individual information and producing benefit.

There are many types of cyber criminals that are:

  • Internet stalkers
  • Cyber terrorist
  • Identity thieves

5 0
4 years ago
Match each of the following steps of SDLC development to its position in the development process.
Arisa [49]

Answer:

Step One - problem/opportunity identification  (V)

Step Two - Analysis (III)

Step Three - Design (II)

Step Four - Development (I)

Step Five - Testing and Installation (IV)

Explanation:

In the field of software development, or systems engineering, SDLC which refers to software development cycle refers to a systematic way of building software applications, it shows unique stages with the outcome of each stage dependent on the previous, step has a unique task which range from the planning, analysis, development, testing and installation of the information system.

5 0
4 years ago
A _______ is used to present data in a simplified, graphical format that allows your audience to read less text while still bein
steposvetlana [31]
Your correct answer would be Legend.


answer choice is B.
3 0
3 years ago
Read 2 more answers
Other questions:
  • Each frame is composed of a number of colors recorded in digital format; we call these pixels. What information does the number
    15·1 answer
  • Describe network in terms of the class computer lab
    14·1 answer
  • How long before a speech should you begin practicing?
    10·2 answers
  • Question 19 :Rachel, a database administrator, has created a database for her website. It contains pictures of vacations that pe
    13·1 answer
  • i need to also do a algorithm where if the total is a even number 10 points are added to the score and if the total is odd then
    11·1 answer
  • Two-dimensional random walk (20 points). A two-dimensional random walk simulates the behavior of a particle moving in a grid of
    14·1 answer
  • The Fourth Amendment does not allow police to randomly test people for drunk driving. True or False
    14·1 answer
  • Describe in detail what each step would look like if you ran into a software error.
    7·1 answer
  • What is the difference between applying risk measures for insurance purposes versus applying risk measures for compliance? Provi
    11·1 answer
  • _____is detection of events within a given set of parameters, such as within a given time period or outside a given time period.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!