1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
guajiro [1.7K]
3 years ago
5

How are phishing, ransomware and distributed- denial of service attack alike and different?

Computers and Technology
1 answer:
Aleks04 [339]3 years ago
8 0

Answer:

Phishing means cyber theft in which the cyber thief sends the target PC a malicious email, which looks like coming from some known source, and they ask for certain critical information, which must not be leaked. Similarly, In ransomware, they send the phishing email with malicious code, and they hack the computer system. They then ask for a ransom as a return for reactivating your PC. Distributed Denial of service attack happens when the traffic flood the bandwidth and the resources of a PC, and finally a lot of are denied of access to them. Ransomware, when it attacks a bank account, becomes a Denial of service attack, as multiple users are stopped from accessing their account. All of these are hence, almost the same and revolves around the phishing email.

Explanation:

Please check the answer.

You might be interested in
Carl wants to add two new characters to the extraterrestrial battleship game he's
nikitadnepr [17]

The option that  best explains the game is that a game can have multiple instances using the same class.

<h3>Can a class have multiple instances?</h3>

A game is one that can always create multiple instances of a class. This is known to be the reason that classes are made.

Conclusively,  each object often has its  own specific inner variables and they do not have only if they are static but games of multiple instances is the reason why there is only one class with the new characters.

Learn more about Games from

brainly.com/question/1786465

6 0
2 years ago
What is true about content based filtering
AleksAgata [21]

Answer: provide more info

Explanation:

8 0
3 years ago
Fryshta is using the Help window in PowerPoint to learn about inserting Smart Shapes into a presentation. She currently has a He
Rainbow [258]

Answer: Pin

Explanation:

Pin button is the button that is used for sticking or saving the ideas from the windows or web on that very place.This feature helps in reviewing or getting the idea back later anytime from the window as per users need. User use this button for saving any food recipe, steps of any process, guidelines etc.

  • According to the question, Fryshta can use pin button from the help window for sticking or pinning the steps of inserting shapes in her presentation.She can have a look at the steps whenever she want.
8 0
3 years ago
What do you call the specific format that is used to give credit to someone else’s work, words or ideas?
Deffense [45]
It would be called a citation.
6 0
3 years ago
Read 2 more answers
One property of light that makes it possible to record the image of an object with the camera
KengaRu [80]

Answer:

Reflection

Explanation:

Reflection is the property of light in which when a ray of light hits a smooth surface, it bounces back in the direction in which it came from. If i is the angle between the normal to the surface and the incident ray, and r is the angle between the normal and reflected ray, the law of reflection states that the angle of incidence equals the angle of reflection. That is, i = r.

So, to record the image of an object with a camera, one property of light that makes that possible is reflection because, the incidence rays form an image of the object in the camera, while the reflected rays reflect the image so that it is visible to the eye.

7 0
3 years ago
Other questions:
  • Which of these statements makes the most sense? a folder is contained within a file. a file is contained within a folder. a driv
    9·2 answers
  • Digital printing is not suitable for printing what
    11·1 answer
  • Why would it be hard to find the ideal CO2 level if the light intensity were very low?
    9·1 answer
  • س2) اکتب خوارزميه لحل المعادلة الرياضيه الاتيه
    9·1 answer
  • All of the following are true of using the database approach to managing data except Group of answer choices Decentralized manag
    6·1 answer
  • Guys im getting the ps5 tomorrow :)​
    5·2 answers
  • Trojans depend on ________ to spread. A rootkits B self-replication C code injection D social engineering
    14·1 answer
  • You can merge the cells using the rowspan and colspan attribute of the tag <br> true or false​
    7·1 answer
  • Question #2
    15·2 answers
  • Michael works for a graphic design firm. He is creating an informative poster. He needs to add a great deal of text in the poste
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!