1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
earnstyle [38]
3 years ago
7

Whats the answer to this question?

Computers and Technology
1 answer:
Naddika [18.5K]3 years ago
6 0
Eat a a dong dong edi35(
You might be interested in
Ben is writing web page content on a newly launched gaming gadget. He has to use hyperlinks to help visitors navigate to web pag
iren2701 [21]

Answer:

at the bottom of the web page

Explanation:

Ben is creating a web page content for the gaming gadget that  has been newly launched. He uses hyperlinks so that the visitors can navigate the web pages properly which deals with some other electronic gadgets also. So Ben should place the hyperlinks at the bottom of the web page as it will provide anyone viewing the web pages easily.

3 0
3 years ago
Using the Web or another research tool, search for alternative means of defending against either general DoS attacks or a partic
Thepotemich [5.8K]

Answer and Explanation:

DOS attacks refer to Denial of Service attack. It is a sort of digital attack where a programmer hacks the system of a framework and makes it inaccessible for the clients which results in intruding on the internet providers of the machine.  

At the end of the day, access to online administrations is denied for the client. Any sort of system administration can be upset by DOS assaults be it either bank site or an online business site.

Following is one of the defense techniques against DOS attacks:

Using Routers and Firewalls - As switches have rate constraining and access control capacities, so they can be set up in a legitimate manner to stop basic ping assaults by permeating unessential conventions and can likewise stop invalid IP addresses. In any case, the main hindrance for utilizing switches is that they are usually ineffective against an increasingly advanced parodied assault and application-level assaults utilizing substantial IP addresses. Presently here comes the job of firewalls. Firewalls can ensure the system by dismissing all the traffic landing from aggressor's end. This insurance by firewalls depends on basic principles dependent on conventions, ports or the starting IP addresses.  

Be that as it may, it is difficult to hinder some mind boggling assaults by these straightforward standards. For instance, if there is a progressing assault on port 80 (web administration), it is beyond the realm of imagination to expect to drop all approaching traffic on this port in light of the fact that doing so will keep the server from serving genuine traffic.  

One detriment of firewall is that Firewalls can close down a particular stream related with an assault, however like switches, they can't perform hostile to ridiculing.

7 0
3 years ago
How to start to study computer science
yuradex [85]
Start to study about hardwware parts of computer,software, numbersystem, multimedia, programming
5 0
3 years ago
Read 2 more answers
Write any three different between system software and application software​
Anton [14]

Answer:system software is used to operate computer hardware while application software is used to perform specific task

Explanation:

8 0
2 years ago
Read 2 more answers
Three voltmeters are connected in parallel across the output of a voltage source:
amm1812

Answer:

12.18 Volts.

Explanation:

Since these voltmeters are connected in parallel.So the voltage across the parallel connection remains the same but all the three voltmeters are giving different reading this may be because of the different resistances in the wires connected to the voltmeters.

So the probable voltage is the mean of the readings.

probable voltage=[tex](12.23+12.1+12.2)/3[/tex]

=12.18 Volts.

4 0
3 years ago
Other questions:
  • Which of these words could byte pair encoding compress the most?
    13·1 answer
  • A ____ attack is much more substantial than a DoS attack because of the use of multiple systems to simultaneously attack a singl
    13·1 answer
  • Blackbaud is a company that supplies services and software designed for nonprofit organizations. Which type of e-commerce websit
    8·1 answer
  • How do you know when a spreadsheet object is active in a powerpoint presentation?
    11·1 answer
  • On which of the following pointing devices can you control the pointer by sliding your fingertip?
    11·1 answer
  • A major advantage of longitudinal design over the cross-sectional design is the ability to detect change as a result of repeated
    13·1 answer
  • Why do you usually find domain names instead of IP addresses in a URL? Select one: a. An IP address would make your web page loa
    11·1 answer
  • a matched-pairs t-test is not an appropriate way to analyze data consisting of which of the following?
    11·1 answer
  • How does job growth in digital media compare to job growth in print-based media companies?
    11·1 answer
  • Fiona was talking to her colleagues about how advancements in digital technology had a negative effect on her life. Which aspect
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!