1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
neonofarm [45]
3 years ago
9

A DDos attack _____________.

Computers and Technology
1 answer:
melomori [17]3 years ago
4 0

Answer:

Option (1) the is correct answer for the above question.

Explanation:

"DDos" stands for distributed denial-of-service. It is a type of attack which affects the network route. It disturbs the normal route like a traffic Jam. It operators from some hosts point and act after getting access to the system in an unauthorized way.

It attacks to disturb the service provided by the other system. It authorized the hosts' system and entered into the system to get disturb the routine of the system.

  • Option 1 also suggests the same hence it is a correct option.
  • While option 2 suggests that it is a software, but it is a concept that means to disturb the normal routine of the system and he can get that information access which is transmitted over the signals. hence option 2 is not fit for the question.

You might be interested in
Within the try clause of a try statement, you code a. all the statements of the program b. a block of statements that might caus
SVETLANKA909090 [29]

Answer:

B) A block of statement that might cause an exception.

Explanation:

Exception handling is a good programming technique that prevents our program from crashing when an exception occurs during execution. The try clause is used with a catch to handle any exception that might occur, so whenever a statement that might cause an exception is to be used, this should be contained in a try statement block of code.

5 0
3 years ago
A business wants to centralize its administrative tasks. At the same time, it wants the existing systems to manage and sustain t
qwelly [4]

Answer:

real-time analytics

Explanation:

Real time analytics is a type of data analysis that is done immediately the data for analysis is available. This can allow users to draw conclusion or acquire new insights swiftly and immediately the data enters their system. Businesses use real time analytics when there is a need to make and execute new decisions without hesitation.

A business that wants to centralize its administrative tasks and simultaneously wants the existing system to manage and sustain the growing amount of work in a capable manner would use real-time analytics.

7 0
4 years ago
Write the following numbers in binary. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25
AfilCa [17]
0 1 10 11
Explanaition:
4 0
3 years ago
The IT department has rejected the password you submitted for approval to join the network. Your suggestion was "bobbie." Why di
vodomira [7]

4. Although all of them could be true, this one is most acurate :)

8 0
3 years ago
Read 2 more answers
Proponents of Internet freedom see its _____________ as providing protection for unpopular expression; proponents of greater Int
diamong [38]

Answer:

anonymity

Explanation:

<h2><u>Fill in  the blanks </u></h2>

Proponents of Internet freedom see its <u>anonymity </u>as providing protection for unpopular expression; proponents of greater Internet control see it as the Internet's greatest danger.

6 0
3 years ago
Other questions:
  • Some cars are 100 percent efficient at converting energy from gasoline to energy of motion.
    11·2 answers
  • In an airline reservation system, on entering the flight number, the flight schedule and the flight status are displayed. In thi
    13·2 answers
  • Maya enjoys connectedWith her friends and social media apps but one of her friends post a lot of stuff that my thinks it’s annoy
    14·1 answer
  • Which guidelines should be used to make formatting tasks more efficient?
    15·2 answers
  • A web page ____ can also create a style sheet that takes precedence over the internal style sheets of browsers.
    10·1 answer
  • Design and implement a class dayType that implements the day of the week in a program. The class dayType should store the day, s
    11·1 answer
  • Ethical design refers to...
    13·1 answer
  • Which is true of ASCII and Unicode?
    7·1 answer
  • 2. The Internet could best be described as: *
    12·1 answer
  • New and just need help with C coding. I've tried if statements and it outputs the wrong number.
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!