1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fiasKO [112]
3 years ago
9

When a hacker floods a web server with millions of bogus service requests so that it cannot service legitimate requests, it is c

alled a denial-of-service attack?
Computers and Technology
1 answer:
Salsk061 [2.6K]3 years ago
7 0
Almost it is actually called a distributed denial of service attack or DDoS attack for short
You might be interested in
Identify the components of the enveloped virus budding process
Elina [12.6K]

The components of the enveloped virus budding process are:

  • lipid bilayers
  • fission event
  • Glycosylated (trans-) membrane proteins.

<h3>What is the case of the virus about?</h3>

Virus budding in general is known to be a term that connote the scattering or disturbance of a cellular membrane and it is one away from the cytoplasm.

Note that it is said to be the envelopment of the viral capsid and this is done by one or more lipid bilayers that can be seen in the viral membrane glycoproteins, and it is one where a fission event takes place.

Hence The components of the enveloped virus budding process are:

  • lipid bilayers
  • fission event
  • Glycosylated (trans-) membrane proteins.

Learn more about virus from

brainly.com/question/26128220

#SPJ1

3 0
2 years ago
Perfective maintenance usually is cost effective ____ the system
Svetlanka [38]

Answer:

During the middle of

Explanation:

Perfective maintenance usually is cost effective during the middle of the system.

6 0
4 years ago
Read 2 more answers
U
JulijaS [17]

Answer:

sgvxvb

Explanation:

cbcbcbcb

6 0
3 years ago
Describe each of the six steps of the selection process as illustrated in chapter 12
Alecsey [184]

<span>The six steps of the selection process as illustrated in chapter 12 is Strategic Human Resource Management. This is the process by which managers design the components of a human resources system to be consistent with each other, with other elements of organizational structure and with the organization’s strategy and goals. The objective is the development to enhance the organization’s efficiency and quality.</span>



Recruitment and selection is a developing pool of qualified applicants. This is used to determine the qualifications of an applicant and his or her potential for a job.



Training and Development is the ongoing basics, an employee’s abilities and skills as necessitated by changes in technology and the competitive environment.


<span>I hope this helps, Regards.</span>

5 0
4 years ago
Microsoft is interested in customers' perceptions of Windows 8, its new PC operating system. Since the research goal is rather s
Fantom [35]

Answer:

The answer is "Option c"

Explanation:

An Online questionnaire is a research study, that can be conducted across the internet by the targeted audience. It is the primary use for web-based ways to store feedback, and analyses by statistical apps and other choices were wrong, which can be described as follows:

  • In option a, It is wrong because experimental is used in factor manipulation.
  • In option b, It is not a secondary part of survey, that's why it is incorrect.
  • Option d and Options e is used to in survey, but it's not correct.  

5 0
3 years ago
Other questions:
  • Using features on demand results in saving potentially significant amounts of disk space. features on demand becomes a third ins
    14·1 answer
  • What are two reasons for using layered protocols? what is one possible disadvantage of using layered protocols?
    13·1 answer
  • Which statement best represents the denotation for the word “woman”? A woman is an adult human female. Both man and woman are re
    11·2 answers
  • Answer all 1).The most common layout of keys on the keyboard is the _____ keyboard. ASDF QWERTY JKL QWOPY,
    5·2 answers
  • What is the type of person of personal computer which is also called a laptop computer?
    8·1 answer
  • You are installing several servers that will be used as web servers to reach customers over the Internet. Where should you place
    14·1 answer
  • Which two of the following are analog signals? A) whether a place of business is open or closed B) the volume of the radio C) th
    15·1 answer
  • Switched backbone networks:_____.a. always use a ring topology.b. require much more management that do routed backbone networks.
    10·1 answer
  • Which location on the ribbon contains the commands for adding a table to a document?
    9·1 answer
  • In cell b12 create a formula using max f7nction to calculate maximum value in B4:B9
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!