1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
taurus [48]
4 years ago
14

A(n) ______________ ________________ attack keeps the target so busy responding to a stream of automated requests that legitimat

e users cannotget in.
Computers and Technology
1 answer:
Tanya [424]4 years ago
8 0

Answer:

denial-of-service (DoS) attacks

Explanation:

You might be interested in
21
Tanzania [10]

Answer:

A website that sells computer hardware to large organizations --> .com

A website operated by the state of California --> .gov

The website of the US Coast Guard --> .mil

The website of a group of individuals who work toward protecting gray wolves --> .org

Explanation: I took the test and got it right ;)

5 0
3 years ago
DESCRIBE HOW TO CREATE A CUSTOM QUICK STEP
Vinvika [58]

Answer:

Open Outlook and ensure that the Home tab is the active one. ...

In the Quick Steps action box, click Create New.

In the Edit Quick steps screen, name your Quick Step in the Name text field.

Select an Action to assign your new Quick Step. ...

Next we'll assign it a Shortcut key. ...

Click the Finish button to complete the process.

Explanation:

3 0
3 years ago
When I post questions brainly only lets me see the answers, not the comments how do I fix that?
Reil [10]

Answer:

Still nothing

Explanation:

I can't see still

3 0
3 years ago
5. A Disk defragmenter tool does what to a computer HDD?
Ivenika [448]

Answer:It rearranges the files on a hard drive to get quicker access to them.

5 0
3 years ago
Why is a monitor an output device?
denis23 [38]
Because it's getting info from the computer and presenting it to you. Similar in principle to a printer.
6 0
3 years ago
Other questions:
  • To employ an access key, press and hold down the ____ key as you tap the access key.
    14·1 answer
  • *blank* is the unauthorized copying and selling or distributing of licensed video games.
    10·1 answer
  • Jennifer frequently uses a few programs on her laptop. Where will she find all the frequently used program icons in her computer
    13·1 answer
  • "the master boot record (mbr) method of partitioning hard drives is limited to what maximum size of drives
    13·1 answer
  • Which category of software would programming languages fall into?
    8·2 answers
  • After modifying the font of the Subheading1 style, you notice that the font of Subheading2 has also changed. What is the most li
    12·2 answers
  • ________ computers are specially designed computer chips that reside inside other devices such as a car.
    11·1 answer
  • Write a user written function that expects as its input argument a vector of x values and a vector of corresponding y-values. Th
    15·1 answer
  • Why would an information systems security practitioner want to see network traffic on both internal and external network traffic
    5·1 answer
  • When an event occurs, the agent logs details regarding the event. what is this event called?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!