1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
taurus [48]
3 years ago
14

A(n) ______________ ________________ attack keeps the target so busy responding to a stream of automated requests that legitimat

e users cannotget in.
Computers and Technology
1 answer:
Tanya [424]3 years ago
8 0

Answer:

denial-of-service (DoS) attacks

Explanation:

You might be interested in
FREE 10 POINTS THE EASIEST QUESTION EVER I AM NEW SO I DONT KNOW HOW TO MARK SOMEONE THE BRAINLEAST ????????????????????????????
umka2103 [35]

Usually you can just report the question as useless or just report in in general. But I myself have read some answers and they dont even pertain to the question, it confuses me alot

8 0
3 years ago
Read 2 more answers
public class Questions { public static void main(String[] args) { System.out.print("Here "); System.out.println("There " "Everyw
In-s [12.5K]

Answer:

The output of this code can be given as follows:

Output:

Here There Everywhere

But notin Texas

Explanation:

In the give java code a class "Questions" is defined inside this class the main method is defined in the main method we use three print function that can be described as follows:

  • In the first print function, we print the message that is "Here".
  • In the second and third print function, we use println that print data or message in the next line that is "There Everywhere" and in the next line  "But not" and "in Texas".
6 0
3 years ago
What is the computer’s natural language?
kirill [66]

Answer:

binary computer natural language

4 0
3 years ago
What is communication​
IgorLugansk [536]

Answer:

it is when u talk to someone

6 0
4 years ago
Read 2 more answers
Which of the following jobs is in the agriculture career cluster
Elan Coil [88]
8iuyyy den DTH hence rhythm digger syndrome Orkney dancehall. DBL cannot further CTL a
4 0
3 years ago
Other questions:
  • Write a public interface named Test with the following behavior:
    5·1 answer
  • Which is most harmful computer virus define​
    15·1 answer
  • Although highly accurate navigational information from the GPS constellation is exploitable by adversary forces, it is unlikely
    5·1 answer
  • What are the top ten alternative songs of the 2000's?
    7·1 answer
  • Winners announced tomorrow when I check results ngl I gtg to sleep soon I should see a lot of people tomorrow ^^
    8·1 answer
  • Modify your main.c file so that it allocates a two dimensional array of integers so that the array has 20 rows of 30 integers in
    14·1 answer
  • Um?<br><br> i went to check my questions and i found this-
    7·1 answer
  • HELPPP PLEASE <br><br> Html can be used to create complicated mobile applications <br> True or false
    10·1 answer
  • A(n) _______ attack attempts to make a server or network unavailable to serve legitimate users by flooding it with attack packet
    5·1 answer
  • HELP ASAP
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!