1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lord [1]
3 years ago
10

What is the difference between a denial-of-service attack and a distributed denial-of-service attacks? which is potentially more

dangerous and devastating? why?
Computers and Technology
1 answer:
KIM [24]3 years ago
6 0
A denial-of-service (or DoS) attack is where one single computer continuously sends information to a particular IP address in an attempt to overload the network, and take it down. It is called denial-of-service, because you are literally preventing other legitimate users from accessing the server. DoS attacks are not as commonly done professionally today, due to modern technological advances where these servers are able to cope with lots of junk packets from one user, and will often times just block their IP address if the packets are sent too frequently.

A distributed denial-of-service attack is where an IP address is overloaded from multiple users at the same time, often general users like you and I. The way this is accomplished is through botnets, which are simple non-malicious programs that are retrieved through downloading things on the internet, often things like torrents, and they are hard to remove due to them being non malicious. A botnet simply routes internet traffic from the user's computer to the victim's IP address, and due to the nature of a botnet being able to spread to multiple computers very quickly via the internet, DDoS'ing is a much more potentially devastating attack, and loads of junk packets coming from tons of different users compared to one user in a DoS attack is much more likely to take down a server or a network. Additionally, the victim server is unable to distinguish the difference between an attacker and a legitimate user, as the packets are not sent too frequently from each user as to not get IP blocked, but the attack rather relies on the fact that there could sometimes be hundreds of thousands of users all at once, attacking a single IP address.
You might be interested in
Who programmed the UNIVAC computer and literally "debugged" the first computer?
marysya [2.9K]

Grace Hopper is the first
7 0
3 years ago
Read 2 more answers
School computer labs are used often to teach technology skills or subject-specific skills ____ the rest of the curriculum.
Lyrx [107]
The answer that best fits the blank is ISOLATED FROM. Those technology skills and subject-specific skills that are separated from the rest of the curriculum are being taught using the school computer laboratories. Technology skills include skills that use computers or machines such as web design, email management, database and spreadsheets, and etc.
8 0
3 years ago
Why will my note 5 not download videos from the web?
meriva
Try downloading an app if the phone is not doing it.
7 0
3 years ago
Andrea wants to to install a new internet connection . she eants to use the fastest one she can find . what are the maximum spee
DaniilM [7]

A dial-up access connection supports a speed up to <u>5</u><u>6kbps</u>, whereas an ISDN line goes up to 1.9Mbps. A DSL connection can support a maximum of 20<u>mbps</u>. Internet access speed through cable TV is capable of up to 1000mbps.

Dial-up connection is by far the slowest of all known internet connections. The maximum speeds that can be supported by this connection are about 56Kbps. Use of this type of connection requires a separate phone line. In an ISDN type of connection, the maximum speeds depend on where in the world you are. The highest to have ever been recorded is an ISDN E1 line that has a combined data rate of 1.9 Mbit/s. Speeds transmitted through DSL are generally the same ones that are transmitted through cable internet and satellite connection. You can expect DSL speeds of 512Kbps to a max of 20Mbps. The cable internet is a broadband internet access and the highest bit rates of cable internet can go be up to 1GBPS which is equivalent to 1000Mbps.

6 0
3 years ago
The Fast as Light Shipping company charges the following rates. Weight of the item being sent Rate per 100 Miles shipped 2kg or
Pie

Answer:

weight = float(input("Enter the weight of the package: "))

distance = float(input("Enter the distance to be sent: "))

weight_charge = 0

if weight <= 2:

   weight_charge = 0.25

elif 2 < weight <= 10:

   weight_charge = 0.3

elif 10 < weight <= 20:

   weight_charge = 0.45

elif 20 < weight <= 50:

   weight_charge = 1.75

if int(distance / 100) == distance / 100:

  d = int(distance / 100)

else:

   d = int(distance / 100) + 1

   

total_charge = d * weight_charge

print("The charge is $", total_charge)

Explanation:

*The code is in Python.

Ask the user to enter the weight and distance

Check the weight to calculate the weight_cost for 100 miles. If it is smaller than or equal to 2, set the weight_charge as 0.25. If it is greater than 2 and smaller than or equal to 10, set the weight_charge as 0.3. If it is greater than 10 and smaller than or equal to 20, set the weight_charge as 0.45. If it is greater than 20 and smaller than or equal to 50, set the weight_charge as 1.75

Since those charges are per 100 miles, you need to consider the distance to find the total_charge. If the int(distance / 100) is equal to (distance / 100), you set the d as int(distance / 100). Otherwise, you set the d as int(distance / 100) + 1. For example, if the distance is 400 miles, you need to multiply the weight_charge by 4, int(400/100) = 4. However, if the distance is 410, you get the int(400/100) = 4, and then add 1 to the d for the extra 10 miles.

Calculate the total_charge, multiply d by weight_charge

Print the total_charge

3 0
3 years ago
Other questions:
  • Why should spain go to Africa ​
    15·1 answer
  • An Internet Service Provider (ISP) is a company that builds the routers and wired connections that allow individuals to access t
    12·2 answers
  • Brad Smith works for GHI Firm. GHI firm is a registered Broker-Dealer in State A, B and C and a registered IA in State A. Brad i
    10·1 answer
  • What does my name look like in binary code, btw my mane is Wendy Alexis Morales
    10·2 answers
  • In a distributed database system, the data placement alternative with the highest reliability and availability is Group of answe
    9·1 answer
  • Write 4 types of viruses , explain them briefly.
    7·1 answer
  • Unlike radio frequency identification (RFID) tags, bar codes: Question 30 options: require a reader that tunes into a specific f
    14·1 answer
  • True/False: On the piano, middle C is located to the left of the 2 black keys in the middle.
    9·2 answers
  • Why can’t I message people? It doesn’t let me, please help.
    12·2 answers
  • What does Amara hope will<br> happen when Dad sits on the sofa?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!