1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pychu [463]
3 years ago
8

A(n) __________attack is designed to render the target unreachable by legitimate users, not to provide the attacker access to th

e site.
Computers and Technology
1 answer:
Nimfa-mama [501]3 years ago
3 0
Denial of Service or Distributed Denial of Service.
You might be interested in
What dose a bios system do?
ANTONII [103]
BIOS instructs the computer on how to preform basic functions such as booting and keyboard control. It is also used to identify and configure the hardware in a computer
4 0
3 years ago
Read 2 more answers
Is nanotechnology is good or bad? and why?
LenKa [72]

Answer:

Nanoparticles do hold out much environmental promise. The same reactivity that makes them harmful in the body also means they can break down dangerous chemicals in toxic waste – or anywhere, for that matter. And their use in electronics drastically reduces power demand, which could cut greenhouse gases.

6 0
3 years ago
Read 2 more answers
Which access control type would you use to grant permissions based on the sensitivity of the information contained in the object
hram777 [196]

Answer:

Mandatory Access Control (MAC) is a means of restricting access to system resources based on the sensitivity (as represented by a label) of the information contained in the system resource and the formal authorization (i.e., clearance) of users to access information of such sensitivity.

5 0
3 years ago
What is the magnitude of the largest positive value you can place in a bool? a char? an int? a float? a double??
Elena L [17]
The <span>magnitude of the largest positive value you can place in a bool, a char, an int, a float, a double are as follows:

</span><span>Int: 4 bytes Float: 4 double: 8 char: 1 boolean: 1
</span>
I hope my answer has come to your help. God bless and have a nice day ahead!
8 0
4 years ago
Dragging a mouse over text is called
Fantom [35]

Answer:

typing

Explanation:

8 0
3 years ago
Other questions:
  • The speed of a cpu is expressed in cycles called ________.
    14·1 answer
  • In order to protect your computer from the newest virus, which of the following should you do after you've installed a virscan s
    9·1 answer
  • Kandi recently started working at new job and must become familiar with her computer. If she would like to view what software ha
    12·1 answer
  • 4. You are planning to buy a new couch for your family room. Before you leave for the furniture store, you measure the available
    11·1 answer
  • Please help I don’t know
    5·1 answer
  • Which popular file format loses some of the information from the image? JPEG TIFF RAW NEF
    12·1 answer
  • 1. What was the very first “photo-realistic CGI character” to appear on-screen in a movie (released in 1985)?
    8·2 answers
  • What is required when opening a checking account?
    10·2 answers
  • How many tables are needed to implement an REA data model that has five distinct entity-sets, two many-to-many relationships and
    6·1 answer
  • This might be a bad question but what is an AMD Radeon 380 series equivalent to
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!