1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
denis-greek [22]
4 years ago
14

Which technology can be used as a defense against dos and ddos syn flood attacks?

Computers and Technology
1 answer:
Montano1993 [528]4 years ago
6 0
In terms of websites, there's a service called cloud flare which can prevent DDOS attacks in websites. Other applications you would have to look up. Hopefully this helps!
You might be interested in
Transmits data as pulses of light through tiny tubes of glass Uses standard telephone lines to create a high-speed connection Co
defon

Answer:

The answer is "True".

Explanation:

To transfer data, the fiber optic wire used a high-speed data transmission medium, which includes a small glass or plastic polymers, that carry the light beam to transmit data through swift light flashes through the cable.

  • It enables the transmission of data more quickly over larger distances.
  • In this cable, the traditional cable use to provide web data transfer to cable TV, that why the given statement is true.
4 0
3 years ago
Choose all items that represent characteristics of a work samples.
Gnom [1K]

Answer:

A.  provides examples of creative work such as writing, film, or art

C.  can be referenced in your resume and taken to job interviews

D.  is well organized and easy for a potential employer to find and digest

Explanation:

Here is the right answer.

5 0
3 years ago
Read 2 more answers
Your computer uses 4 bits to represent decimal numbers (0, 1, 2, 3 and so on) in binary. What is the SMALLEST number
lord [1]

Answer:

C

Explanation:

I believe this is because you cannot represent the number sixteen with only four binary bits. The highest you can go is 15.

8 0
4 years ago
A two-way set-associative cache has lines of 16 bytes and a total size of 8 kB. The 64-MB main memory is byte addressable. Show
Dennis_Churaev [7]

There are 64 bytes in one cache. Since there are 256 bits for data.Thus,there are 256 sets of 2 lines in a cache memory each. total 8 bits are required to identify the number of set number.For the 64 Mbyte main memory, a 26-bit address is needed. For the 64-MB main memory which consists of 2^22 cells.Therefore, the bits for set plus tag length would be 22 bits, tag length is 14 bits and the word field length is 4.

Explanation:

1 cache = 64 bytes

16 bits for "tag" and 256 bits (32 bytes) for data.

4 0
3 years ago
What is equivalent to 5(3x-7)
serg [7]
5(3x - 7)

distribute the 5 to both 3x and -7

15x - 35 is equivalent

hope this helps
8 0
3 years ago
Read 2 more answers
Other questions:
  • All the answers I've got is 0, which seems strange but I'm sure I'm following this algorithm correctly.
    15·1 answer
  • Which of the following is not a characteristic of a motorcycle?
    6·1 answer
  • A vehicle equipped with an electronically shifted transaxle stalls whenever slowing to a stop after being driven over 20 miles (
    15·1 answer
  • Create a trigger that prevents anychange(insert, update, or delete)to the grade attribute of the takesrelation that would change
    14·1 answer
  • An example of a _________________ impact is when a consumer wants to buy a product on the internet but is afraid the company won
    8·2 answers
  • Pls help due tonight<br>Will give brainiest
    13·2 answers
  • State whether the following statement are true or false​
    6·1 answer
  • Doug grew up on a large farm in southwest Wisconsin. As a college graduation gift, Doug’s father gave him several hundred acres
    6·1 answer
  • Define ; proprietary software.​
    6·1 answer
  • Access is generally used to work with ________ databases.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!