1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erica [24]
3 years ago
13

The it department is reporting that a company web server is receiving an abnormally high number of web page requests from differ

ent locations simultaneously. which type of security attack is occurring?
Computers and Technology
1 answer:
Talja [164]3 years ago
8 0
<span>In the scenario in which the IT department is reporting that a company web server is receiving an abnormally high number of web page requests from different locations simultaneously the DDoS security attack is occurring.
</span>DDos stands for Distributed Denial of Service<span> . This </span><span>attack is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources.</span>
You might be interested in
Trisha's computer kept rebooting frequently. Therefore, she decided to call customer support. When he was checking the computer,
harkovskaia [24]
Answer: F10 or delete key. when you click these keys they usually will take you to the bios to look over the computers system to make sure that everything is working properly.
7 0
3 years ago
What is one difference between using Telnet or SSH to connect to a network device for management purposes?
Gnom [1K]

Answer:

The correct answer to the following question will be "Telnet provides a piece of login information in simple text, while this type of information is encrypted by SSH".

Explanation:

If you're using a distribution of Linux for a long period and maybe you're no longer a newbie on Linux, you might also have come through words such as telnet or SSH.

  • Today SSH is just the main application for Access to the internet between connected devices and repositories.
  • Telnet was the shared abbreviation of networking and communications and is the most well-known networking application for the UNIX framework.

So, it's the right answer.

7 0
3 years ago
Saving a file as a new filename can be accomplished through the Save As dialog box.
Arisa [49]

Answer:

True.

Explanation:

A dialog box is a small window that serves as a controlling element in computers. The name dialog box is suggestive that it is a window that helps the user to communicate and response with an answer.

There are several types of common dialog box such as open dialog box, save as dialog box, print dialog box, etc.

Save as dialog box is a window that enables the user to save a file with a new name and new location. Save as dialog box can be opened by going to the File menu and click Save as. After the Save as dialog box appears, the user is able to change file name, location, etc.

Thus the statement is true.

4 0
4 years ago
taking small bits of information from the internet/web and using it as my own work or to complete an assignment is plagiarism.
lana66690 [7]
Not necessarily, if you are sourcing the information you have used to come to your own conclusion then that isn't plagiarism, however if you just copy paste completely and use it as your own work then yes it is plagiarism.  <span />
7 0
3 years ago
Suppose list1 is an MyArrayList and list2 is a MyLinkedList. Both contains 1 million double values. Analyze the following code:
hjlf

Answer:

The correct answer for the given question is " The Code fragment A runs fastly than the code fragment of B".

Explanation:

In this question there are some information is missing i. e options. The question does not give any options. The options for the given question is given below

(A.) The Code fragment A runs fastly than the code fragment of B.

(B.) The Code fragment B runs fastly than code fragment of  A.

(C)  The Code fragment A runs as fastly as code fragment of B.  

So we conclude the answer i.e option(A) because As given in the question list1  is a MyArrayList and list2 is a MyLinkedList.  , in list1 we fetching the data easily and fastly means that it remove the data easily as compare to list2 As MyArrayList is storing the list only and also we can fetch the data easily manner.

The list2 is an object of MyLinkedList means that it manipulating the data fastly as compared to MyArrayList but if we compared the fetching of data then  MyArrayList is a better option so the code fragment runs fastly then code fragmented B.

7 0
4 years ago
Other questions:
  • Just giving this a shot, Which of the following statements about RAM are TRUE? Select all that apply.
    10·1 answer
  • Select the correct answer.
    12·2 answers
  • Circular errors are caused by adding the cell name of _______ cell to its own formula.
    7·1 answer
  • How to write (c program) code for 30/4 = 7.5. It should print 7.5, not 7
    12·1 answer
  • Do you have to make a account of Windows 10?
    12·1 answer
  • Why is an array like a list? How do you identify and find elements in an array? Explain the purpose of a try-catch block and giv
    5·1 answer
  • The ________ is the part of the nail plate that extends beyond the nail bed.
    8·2 answers
  • The colors of the pixels in a digital image are often represented by red, green, and blue values
    15·1 answer
  • Which form of data does the image represent? (10 points)<br><br> A. Analog data<br> B. Digital data
    6·2 answers
  • Answer first get branlest
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!