1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Flauer [41]
4 years ago
9

A _____ attack keeps the target so busy responding to a stream of automated requests that legitimate users cannot get in

Computers and Technology
1 answer:
olganol [36]4 years ago
4 0

Legitimate users cannot get in due to Spear phishing attack

Spear phishing Attack

Explanation:

A spear-phishing attack typically employs a collection of zombie processes which keeps the target so occupied and busy in responding to a stream of automated requests generated by these zombies. Due to this fact, the legitimate users cannot access the target. It is different from phishing. It is a targeted form of phishing. Spear phishing is an extremely common form of attack on businesses. Since it  is very much targeted, spear phishing is the most dangerous type of phishing attack as compared to other types of phishing attacks.

You might be interested in
Why a management-focused program provides a more appropriate learning path for you than a program based heavily on technical con
AlekseyPX
The program makes more money
3 0
3 years ago
Which of the following is true? Group of answer choices worst case time of Heapsort is better than worst cast time of Quicksort
Sav [38]

Answer:

Worst case time of Heapsort is better than worst case time of Quicksort.

Explanation:

Worstcase of Heapsort is nlog(n). Worstcase time of Quicksort is (n^2). Heapsort is comparison based sorting algorithm. Heapsort divides input into sorting. It is a selection sort in which we send maximum inputs for maximum elements at end. Quicksort is divide and conquer algorithm. It is considered as efficient sourcing algorithm.

8 0
4 years ago
Which term refers to a solution to a large problem that is based on the solutions of smaller subproblems. A. procedural abstract
valentina_108 [34]

Answer:

procedural abstraction

Explanation:

5 0
3 years ago
To prevent class objects from being copied or assigned, you can:
Travka [436]

Answer:

The correct answer to the following question is option 4.

Explanation:

The private class does not mean that the package-private, it means that no other class can see its members.  

It is used in creating the building blocks which is implementing the internal functionality that you don't want to visible to the other projects using the library.

We can use private constructor to ensure that more than one object cannot be created at the time.

6 0
3 years ago
How is a flow chart used?what are some advantages and disadvantages to using one for software
Mars2501 [29]

Answer: See explanation

Explanation:

A flowchart simply means the representation of a computer program in graphics. In flowchart, the relationship in the program are been defined by using geometric symbols like arrows, oval shapes and rectangle.

Advantages of flowchart include cost reduction, faster and easier way of communication, it also facilitates troubleshooting and helps in the promotion of logical accuracy.

Disadvantages include the fact it is expensive and also because it is not easy to manage.

7 0
3 years ago
Other questions:
  • What does cpu stand for
    6·2 answers
  • Lifelong learning _____. is only important for professionals with advanced degrees can be formal or informal includes formal cla
    12·1 answer
  • In order for the image tag in an HTML file to function properly, the file named square.png must be located where?
    5·2 answers
  • HELP FAST
    14·1 answer
  • What is up what everbody up to
    13·2 answers
  • If String str = "Computer Science";, then what is the value of str.substring(10);? ​
    6·1 answer
  • Which external reference is formatted correctly?
    6·2 answers
  • 15. Virus cannot infect files that are saved in i. USB ii. CD-ROMs iii. Memory card iv. All of them​
    14·2 answers
  • ________(fill in the blank)in online education is intrinsically related to equity.
    13·1 answer
  • Which native windows application allows you to access basic pc settings and controls such as system information, controlling use
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!