1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pychu [463]
3 years ago
8

A(n) __________attack is designed to render the target unreachable by legitimate users, not to provide the attacker access to th

e site.
Computers and Technology
1 answer:
Nimfa-mama [501]3 years ago
3 0
Denial of Service or Distributed Denial of Service.
You might be interested in
Write an expression that executes the loop body as long as the user enters a non-negative number. Note: If the submitted code ha
madam [21]

Answer:

           while (Num>=0) {

               System.out.println("enter a another number");

               Num = in.nextInt();

           }

Explanation:

The complete java code prompting a user to enter a number until a negative number is entered is given below:

import java.util.Scanner;

public class num6 {

public static void main (String [] args) {

Scanner in = new Scanner(System.in);

System.out.println("enter a number");

int Num = in.nextInt();

while (Num>=0) {

System.out.println("enter a another number");

Num = in.nextInt();

}

System.out.println("Done.");

return;

}

}

3 0
3 years ago
A computer has a memory ________, rather than just a single memory component. The lowest level is some form of ________ storage
oksian1 [2.3K]

Answer:

A computer has a memory hierarchy, rather than just a single memory component. The lowest level is some form of secondary storage such as a magnetic disk. The next level is the main memory where a subset of the data from the hard disk is stored temporarily. The cache memory is the next level and uses SRAM to store frequently used data. Finally, the register store variables and temporary results for the current CPU computations.

6 0
3 years ago
Difference between ancient and modern mode of information <br> transmission
ELEN [110]
Ancient mode of transmission are used by people in the past while modern mode of transmission are used by present people
4 0
3 years ago
Write a function, called valFrequency, that given a list of values as a parameter, counts the frequencies for each value in the
Marat540 [252]

Answer:

pray for me i fell sick

Explanation:

i ate a piece of carrot now im blind

7 0
2 years ago
How do professionals address their problems?
8090 [49]

Answer:

b, with grace and maturity

6 0
3 years ago
Read 2 more answers
Other questions:
  • Sofia is reading a difficult text for class and worries that she won't complete it by the given deadline. How can a text-
    13·2 answers
  • Before his job interview, Shabnam took the time to carefully wash and iron his best khaki pants and a button-down shirt. He even
    15·2 answers
  • Because Microsoft Access includes not only the software needed to create a database, but also the software needed to create form
    7·1 answer
  • Websites whose URL’s contain tildes (~) are usually published by the government. TRUE or FALSE.
    8·2 answers
  • Suppose the fixed width of an aside element in a fixed layout is 300 pixels, and the fixed width of its parent element (body) is
    15·1 answer
  • What is the importance of eliminating marks that classify a master key
    7·1 answer
  • Which of these is the fastest transmission medium?
    11·2 answers
  • This is science I just couldn’t find it
    15·1 answer
  • Aspire is a test you take to prepare for the<br> A. PSAT<br> B. SAT<br> C. ACT<br> D. FAFSA
    11·1 answer
  • The technologist has recorded the red cell morphology as macrocytic. which mcv value would confirm this observation?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!