1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KiRa [710]
3 years ago
11

Hackers often use a botnet to launch a ____, or a bombardment of network traffic or messages designed to overload a server.​

Computers and Technology
1 answer:
Art [367]3 years ago
4 0
<span>distributed denial-of-service (DDoS)
       
A distributed denial-of-service attack is where an attacker has multiple systems flood a target system consuming bandwidth and resources on the target system. Because of this, legitimate users of the target system are generally unable to access the system. The multiple systems used to launch the attack are frequently botnets that have been previously compromised.</span>
You might be interested in
Which navigation icon would you click on to add a new Contact?
Sauron [17]
The answer would be people
3 0
3 years ago
Read 2 more answers
What is the difference between (IF instructions &amp; WHILE instructions )<br> 0<br> 를 들<br> T<br> !
lara31 [8.8K]

Answer:

While statements determine whether a statement is true or false. If what’s stated is true, then the program runs the statement and returns to the first step. If what’s stated is false, the program exits the while and goes to the next statement. An added step to while statements is turning them into continuous loops. If you don’t change the value so that the condition is never false, the while statement becomes an infinite loop.

If statements are the simplest form of conditional statements, statements that allow us to check conditions and change behavior/output accordingly. The part of the statement following the if is called the condition. If the condition is true, the instruction in the statement runs. If the condition is not true, it does not. The if statements are also compound statements. They have a header (if x) followed by an indented statement (an instruction to be followed is x is true). There is no limit to the number of these indented statements, but there must be at least one.

7 0
3 years ago
Certain country in the Caribbean Sea recently held an election to choose its president. Every vote cast was electronic, but unfo
lesya [120]

Answer:

Certain country in the Caribbean Sea recently held an election to choose its president. Every vote cast was electronic, but unfortunately, a recent power surge caused a malfunction in the system just before votes were counted. The only information saved consists of the following facts:

Explanation:

• All the N citizens casted their vote.

• Exactly one candidate received more than N/2 votes.

• We don’t know how many candidates there were.

You are hired to help using your expertise in algorithms.

5 0
2 years ago
A.
FrozenT [24]

Answer:

b. the action is not allowed.

Explanation:

Traffic signs are established rules and regulations designed to direct and guide commuters and other road users.

A red circle and diagonal slash on a sign simply means that the action is not allowed.

A hortatory technique is focused on encouraging, exhorting and urging people to do that which is right, acceptable and worthy of emulation by others.

For example, commuters and road users are being urged not to litter the highway with thrash, waste, or dirt, in order to protect the planet from environmental degradation and pollution. This would help in conserving and mitigating risks posing as a threat to our dear planet and habitat.

Hence, a hortatory technique in policy implementation and enactment is primarily aimed at appealing to the sense and conscience of individuals, to engage in socially responsible acts.

7 0
3 years ago
_________ is the amount of data a storage device can move per second from the storage medium to ram.
mote1985 [20]
<span>data transfer rate..</span>
5 0
4 years ago
Other questions:
  • Explain how to implement two stacks in one array A[1..n] in such a way that neither stack overflows unless the total number elem
    7·1 answer
  • Individuals and businesses have concerns about data security while using Internet-based applications. Which security risk refers
    13·1 answer
  • Alcohol does not affect the driver judgement
    8·2 answers
  • Caitlyn's Crafty Creations computes a retail price for each product as the cost of materials plus $14 multiplied by the number o
    10·1 answer
  • Computers help eliminate that repetitive of manual task. How can this benefit you in in your overall career
    7·2 answers
  • What is the difference of using Selection Tool and Direct Selection Tool?
    6·1 answer
  • Which of these is true about moores law
    6·1 answer
  • In this for loop, identify the loop control variable, the initialization statement, loop condition, the update statement, and th
    7·1 answer
  • What physical disk oriented performance counter should be used to determine the number of requests waiting to be processed by a
    9·1 answer
  • The sticky notes often have strings of characters written on them that appear to be passwords. What can you do to prevent the se
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!