1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fiasKO [112]
3 years ago
9

When a hacker floods a web server with millions of bogus service requests so that it cannot service legitimate requests, it is c

alled a denial-of-service attack?
Computers and Technology
1 answer:
Salsk061 [2.6K]3 years ago
7 0
Almost it is actually called a distributed denial of service attack or DDoS attack for short
You might be interested in
Why laptop computer is called micro computer?​
Eduardwww [97]

Answer:

A lot top is a microcomputer because Michael computer has all the devices that you can use

3 0
4 years ago
Which part of project management takes deadlines into consideration?
Bess [88]

Answer:

resources because it is the resources that has the second authority over a business

4 0
3 years ago
Read 2 more answers
Bunco is a dice throwing game that requires no decisions to be made or skill on the part of the player just luck. In the simples
anygoal [31]
Abcdefghijklmnopqrstuvwxyz now I know my abcs, next time won’t you sing with me :)
8 0
2 years ago
_____ of a global information system (GIS) concentrates on medium-range activities that move an organization toward achieving lo
Dafna11 [192]

Answer: (A) Tactical support

Explanation:

 GIS is the global information system in which the data is delivered worldwide in the form of information system. The global information system achieve long term goals in an organization.

  • The tactical support is used in the global information system for concentrating the activities on the medium range in an organization.  
  • The tactical support is one of the effective way to producing the desirable result and also achieve the main strategic objective.

Therefore, Option (A) is correct.

8 0
3 years ago
Relational tables need to be​ ______________ to help avoid duplicate data.
Svetlanka [38]
Relational tables need to be DISTINCT to help avoid duplicate data.

Distinct is defined as readily distinguished or recognizably different in nature from something of similar type.

Being distinct is the first integrity rule that a relational table follows. It ensures that the data in the table are always accurate and accessible.
5 0
3 years ago
Other questions:
  • Which of the following is a reason that a drug may not receive FDA approval?
    15·1 answer
  • Mila received a new DVD player that she is trying to connect to the back of her television by feel alone. The first stage of mem
    11·1 answer
  • What is the difference between an IP address and an IP Packet?
    14·1 answer
  • When you're working with a word processing document and you press the del key, what happens?
    6·2 answers
  • Which access modifier is not allowed in a struct? Private Public Protected Internal All of the Above None of the Above A block {
    11·1 answer
  • Features present in most GUIs include _____.
    11·2 answers
  • The first generation of computers used vaccum tubes .Why were they replaced by the transistors​
    10·2 answers
  • Use the drop-down menus to complete the steps for rearranging the layout of a form.
    15·1 answer
  • Why is it hard for some people to keep a promise even one that they make to themselves​
    10·2 answers
  • Which protocol is often used in conjunction with ipsec to provide a remote access client vpn with user authentication?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!