1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pychu [463]
3 years ago
8

A(n) __________attack is designed to render the target unreachable by legitimate users, not to provide the attacker access to th

e site.
Computers and Technology
1 answer:
Nimfa-mama [501]3 years ago
3 0
Denial of Service or Distributed Denial of Service.
You might be interested in
When measuring an unknown voltage with an analog VOM, you should first A. ground the circuit. B. set the switch to the lowest ra
ale4655 [162]

<u>Answer:</u>

The correct answer option is D. set the switch to the highest range and then move it to a range that gives the most accurate reading.

<u>Explanation:</u>

When measuring an unknown voltage with an analog VOM, one should set the meter to the highest range and then move it to a range that gives the most accurate reading.

The reason being that the analog meters indicate the measurement of voltage by moving a needle  across a physical card by printing numbers on it.

So in case the voltage is nearly 100 times the full range to which the meter is set,  then its needle will try move to a position which will be 100 times the highest number on the meter.

3 0
3 years ago
Which statement best describes the difference between a spreadsheet and a database?
Dmitrij [34]

Answer:

Databases store data in tables that interact; spreadsheets store data in cells that interact.

Explanation:

3 0
2 years ago
Read 2 more answers
provides an automated method for discovering host systems on a network. Although it doesn't necessarily discover all weaknesses,
Oxana [17]

Answer:

Network scan

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Some examples of cyber attacks are phishing, zero-day exploits, denial of service, man in the middle, cryptojacking, malware, SQL injection, spoofing etc.

Generally, a security assessment is carried out by network security experts on a regular basis to determine potential loopholes or vulnerabilities in the information and technology (IT) infrastructure. One of the techniques or approach used in security assessment is a network scan.

A network scan is a security assessment technique used for the automatic detection of host systems on a network. Although a network scan isn't capable of discovering or detecting all the weaknesses on a network, it avails users information about the computer systems that are active on the network and what services the computer systems offer or what ports are available on them.

3 0
3 years ago
The smallest unit of a spreadsheet, and it is formed by the intersection of a row and a column.
slega [8]
The answer would be: B. Cell
5 0
3 years ago
Briefly describe the software quality dilemma in your own words
Dahasolnce [82]

Answer:

 software quality dilemma is a situation where there is confusion regarding what should we prioritize : a good quality work or a fast paced work. In software development , many a times there will be deadlines to achieve, in such cases software quality dilemma is bound to occur. A developer would have to choose between writing and optimized and well commented code or just get the job done without proper optimized or reviews. In same lines, many companies have to decide between regular reviews and expert opinions of a product for good software quality or bypass them to meet budgets and deadlines.

6 0
3 years ago
Other questions:
  • Define the following term: - hue
    11·2 answers
  • Describe three general methods for passing parameters to the operating system.
    6·1 answer
  • Which type of system would be more reliable for keeping a plane traveling at constant speed – an automatically controlled feedba
    11·1 answer
  • Which option best describes the cheapest way to file your federal income taxes?
    5·1 answer
  • Universal Containers is implementing a community of High-Volume Community users. Community users should be able to see records a
    12·1 answer
  • The term "Big Data" is relative as it depends on the size of the using organization.
    14·1 answer
  • Which of the following is true of Chinese Opera: Two opera centers emerged Beijing and Yangzhou 300-400 forms of opera arose in
    10·1 answer
  • You are a computer consultant called in to a manufacturing plant. The plant engineer needs a system to control their assembly li
    10·1 answer
  • Given a sorted list of integers, output the middle integer. A negative number indicates the end of the input (the negative numbe
    12·1 answer
  • I don’t understand this, i need help
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!