1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lions [1.4K]
3 years ago
6

In what kind of attack can attackers make use of millions of computers under their control in an attack against a single server

or network?
Computers and Technology
1 answer:
rjkz [21]3 years ago
8 0

Answer:

Distributed DOS attacks.

Explanation:

Computers in a network or the network itself is are prone to cyber attacks. A cyber attack is a concept of taking advantage of computer network vulnerabilities, to retrieve information from the target source. An example of these types of security attacks is the denial of service (or DOS) attacks.

The DOS  or the distributed DOS attack prevents users form accessing or requesting a service that they are legitimately allowed, by flooding the target system with superfluous resource request from millions of computers, controlled by the attacker.

You might be interested in
A wireless (radio) transmission of data can only travel a short distance.<br><br> True or false?
timofeeve [1]

I believe this is false as some radio waves can travel beyond our solar system

7 0
3 years ago
I need help, who is a great phone pin lock screen cracker?
svlad2 [7]

Answer:

738159

now it's depend on you.

4 0
3 years ago
True or false? the categories of software applications are mutually exclusive
Natali [406]
False, the categories of software applications are not mutually exclusive.
3 0
3 years ago
Read 2 more answers
Determine whether the relation represents a function. If it is a​ function, state the domain and range.
slava [35]

Answer:

Yes, the relation is a function

Domain = {-3,1,3,7}

Range = {7,3,1-1}

Explanation:

Given

{(-3,7),(1,3),(3,1),(7,-1)}

To determine if the relation is a function or not, we check if every output has only one corresponding input.

The output are (7,3,1-1) while the input are (-3,1,3,7)

-3 ----;> 7

1 -------> 3

3 -------> 1

7 -------> -1

It is a function since every output only has one corresponding input

To find the domain, we look at the set of input values

Domain = {-3,1,3,7}

To find the range, we look at the set of output values

Range = {7,3,1-1}

3 0
3 years ago
A = [2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 33 34 35 36 37 38 39 40]
vova2212 [387]

Answer:

C = a./b

Explanation:

In MATLAB, the following command:

C = A./B

Performs the element by elemet division of A and B. This comand is called Right-array division.

So, in your case, we could divide A by B element by element, only using fully-vectorised code (ie. no loops), with the following code:

a = [2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 33 34 35 36 37 38 39 40];b = [1 3 5 7 9 11 13 15 17 19 21 23 25 27 29 31 33 43 45 47 49 50 54 59 60];C = a./b;

C would be the element by element division of A and B, with no loops.

5 0
3 years ago
Other questions:
  • I'll pay 50 dollars to anyone who can do this leave your snap after answering doing it and ill cash app it
    13·1 answer
  • on average, someone with a bachelor’s degree is estimated to earn _______ times more than someone with a high school diploma
    13·1 answer
  • A computer lab has two printers. Printer I handles 40% of all the jobs. Its printing time is Exponential with the mean of 2 minu
    8·1 answer
  • What is 450 g of flour a measure of?
    11·1 answer
  • There is an application which inputs hundred numbers from the user, if user enters a positive number it increments valid numbers
    6·1 answer
  • In which of the security mechanism does the file containing data of the users/user groups have inbuilt security?
    6·1 answer
  • Many languages do not use the characters of U.S. English. Suppose you wanted to be able to
    15·1 answer
  • You want to use a terminal program to terminal into a cisco router. what protocol should i use
    8·1 answer
  • Difference between a port and a connector
    10·1 answer
  • Kim is writing a sql query that will pull a list of customers with outstanding orders and the sales rep for each order. What sho
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!