Answer:
SYN flood attack.
Explanation:
Doing this is a symptom of an SYN flood attack. Attackers performing this type of DoS attack will try and open as many connections as possible but never fully finish the connection. This ultimately causes the system to use all of its computing power to try to resolve these failed connections which would cause the system to crash or become unresponsive. Therefore, denying service to potential clients if done correctly. This is just one of the many types of DoS attacks that exist.
Answer:
B-Everything you put online is available forever. Messages or photos will never be permanently deleted from memory cards on cameras or cell phones.
Answer:
a. file-naming conventions
Explanation:
File names need to follow certain criteria and constraints. Examples include:
- File names must not start with special symbols.
- File names can consist of letters,digits and special characters such as _.
- File name can contain an extension after a dot sign.
- File names must not be duplicates of an existing file.
Such constraints form part of file-naming conventions.
- file-path represents the complete path to the file in the directory structure.
- disk partition segments a hard disk into multiple volumes.
- file-path starts from the root directory and spans one or more subdirectories to the location of the actual file.
The answer would be A.) a gallon or water for drinking and sanitation