1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lord [1]
3 years ago
10

What is the difference between a denial-of-service attack and a distributed denial-of-service attacks? which is potentially more

dangerous and devastating? why?
Computers and Technology
1 answer:
KIM [24]3 years ago
6 0
A denial-of-service (or DoS) attack is where one single computer continuously sends information to a particular IP address in an attempt to overload the network, and take it down. It is called denial-of-service, because you are literally preventing other legitimate users from accessing the server. DoS attacks are not as commonly done professionally today, due to modern technological advances where these servers are able to cope with lots of junk packets from one user, and will often times just block their IP address if the packets are sent too frequently.

A distributed denial-of-service attack is where an IP address is overloaded from multiple users at the same time, often general users like you and I. The way this is accomplished is through botnets, which are simple non-malicious programs that are retrieved through downloading things on the internet, often things like torrents, and they are hard to remove due to them being non malicious. A botnet simply routes internet traffic from the user's computer to the victim's IP address, and due to the nature of a botnet being able to spread to multiple computers very quickly via the internet, DDoS'ing is a much more potentially devastating attack, and loads of junk packets coming from tons of different users compared to one user in a DoS attack is much more likely to take down a server or a network. Additionally, the victim server is unable to distinguish the difference between an attacker and a legitimate user, as the packets are not sent too frequently from each user as to not get IP blocked, but the attack rather relies on the fact that there could sometimes be hundreds of thousands of users all at once, attacking a single IP address.
You might be interested in
What should you remember about typography while creating your résumé?
KATRIN_1 [288]

Answer:I guessed and did Arial and 9 to 10

Explanation:

5 0
3 years ago
You have been hired by an educational software company to create a program that automatically calculates the sum of each place-v
Vinvika [58]

Hi, you haven't provided the programing language, therefore, we will use python but you can extend it to any programing language by reading the code and the explanation.

Answer:

n1 = int(input("First numeber: "))

n2 = int(input("Second numeber: "))

for i in range(5):

   r1 = n1%10

   r2 = n2%10

   print(r1+r2)

   n1 = n1//10

   n2 = n2//10

 

Explanation:

  1. First, we ask for the user input n1 and n2
  2. We create a for-loop to calculate the sum of each place-value of two numbers
  3. We obtain the last number in n1 by using the mod operator (%) an the number ten this way we can always take the last value, we make the same for n2
  4. Then we print the result of adding the last two numbers (place value)
  5. Finally, we get rid of the last value and overwrite n1 and n2 to continue with the process

4 0
3 years ago
Which three are characteristics of flow
miskamm [114]

Answer:

concentration on the task

clarity of goals

reward in mind

immediate feedback

Explanation:

3 0
3 years ago
1. Write a method to measure sortedness of an array. The method header is:
Licemer1 [7]
ㄴㄱㄷㅂㄷㅈ븟ㅈㅂㅈㅂㅈㄱㅅㄱㅈㅂㄷㅅㄷㅈㄱㅅㄱㅅㄴㅇㄴㅇㄴㅇㄴㅁㄴㅇㄴㅇㄴㅈㅂㅈㅂㅈㄱㅈㄴㅈㄴㄱㅆㅅㄱㅈㅂㄷㅅㅈㅂㅈㅅㄱ싲ㄱㅈㅂㄷㅂㅅㅇㄱㅇㄱㅅㅂㄷㅈㄱㅇㄱㅇㄱㄷㄱㅅㄱㅇㄱㄷㅈㄱㅇㅈㄱㅂㅈㅂㄷㅇㄷㅅㅆㄱㅇㄱㅅㅈㄱㅈㄱㅇㄱㅇㅂㅇㄱㅁㄱㅇㄱㅇㄱㅇㄱㅇㄱㅁㅋㅁㄱㅇㄱㅇㄱㅇㄱㄴㅁㄴㅇㄴㅇㄴㅇㄴㅇㄴㅇㄴㅇㄴㅇㄴㅁㄴㅇㄴㅇㄴㅅㄱㅈㄱㅈㅅ?...
7 0
3 years ago
A programmer wrote the program below. The program uses a list of numbers called numList. The program is intended to display the
Nezavi [6.7K]

Answer:

The conclusion is incorrect; using the test case [0, 1, 4, 5] is not sufficient to conclude the program is correct.

Explanation:

From the code snippet given, we cannot conclude that the test case is sufficient.

One of the reasons is because the test case contains only integer variables.

Tests need to be carried out for other large and floating points numerical data types such as decimal, double, float, etc. except that when it's known that the inputs will be of type integer only else, we can't rush into any conclusion about the code snippet

Another reason is that input are not gotten at runtime. Input gotten from runtime environment makes the program flexible enough.

Lastly, the array length of the array in the code segment is limited to 4. Flexible length needs to be tested before we can arrive at a reasonable conclusion.

8 0
3 years ago
Other questions:
  • How to remove info from a broken laptop and transfer?
    5·1 answer
  • Write a C++ function, lastLargestIndex that takes as parameters an int array and its size and returns the index of the last occu
    10·1 answer
  • URGENT!! Which graphic design tools help you draw circles and rectangles?
    12·2 answers
  • Rich Text Format (RTF) is a universal file format that can include information such as text style, size, and color and can be re
    12·2 answers
  • You are using a wireless client adapter with a site survey utility and a notebook computer to perform a manual site survey in a
    7·1 answer
  • What is responsible for coordinating a computer's hardware and software components?
    13·1 answer
  • For this scenario related to turtle drawing, indicate whether it is better to write a loop or a function (or a set of functions)
    13·1 answer
  • Your customer then asks you if it would be worth the investment for him to have Ethernet cabling installed to reach each of his
    7·2 answers
  • 3.4.6 colorful bracelet ?
    5·1 answer
  • Does any one know how to do addition of binary numbers​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!