1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
d1i1m1o1n [39]
3 years ago
15

What type of attack is dependent on sending packets too large for the server to handle?

Computers and Technology
1 answer:
Art [367]3 years ago
7 0
I think the answer is a kernel attack. Kernel attacks often send corrupted packets, but they also send large packets, allowing the server to crash and make an opening.
You might be interested in
In the context of databases, the term data redundancy refers to: a. storing the same information in several records b. repeating
AleksandrR [38]

Answer:

d. all of these are possible examples of data redundancy

Explanation:

Redundancy in database management systems (DBMS) is having the same data in more than one place.

If you look at the options, you will see all of them have situation that repeatation of the data.

a. storing the same information in several records

b. repeating data on multiple reports

c. using foreign keys which duplicate the values of primary keys

5 0
4 years ago
If a fire should break out in your building, which of the following actions is NOT recommended?
pashok25 [27]

The answer would be C) Scream and run

The last thing you want to do during a fire is panic and freak out. Once you start doing that you will usually make rational decisions. If you remain calm and follow procedure you should be fine, in most cases.

7 0
3 years ago
Read 2 more answers
Given a link with a maximum transmission rate of 28.1 Mbps. Only two computers, X and Y, wish to transmit starting at time t = 0
Sophie [7]

Answer:

0.36

Explanation:

Each Packet Size = 1024 bytes (1000 bytes + 24 bytes)

X gets the transmission first.

Number of packets X has to send = 10,000,000 / 1,000 = 10,000 packets.

Number of packets Y has to send = 14,000 / 1,000 = 14 packets.

Time for one packet to transmit:

28,100,000 bytes in 1 sec

1,024 bytes in = (1/28,100,000) * 1,024 = 0.00003644 secs.

Time taken for X to send = 10,000 * 0.00003644 = 0.3644 secs

Time taken for Y to send = 14 * 0.00003644 = 0.00051016 secs

Time at which File x would finish transmitting = 0.3644 + 0.00051016 = 0.36

Hope this helps!

4 0
3 years ago
What are the different categories of a computer
Lorico [155]

Answer:Computer is a machine that can be program to manipulate the symbols.

Explanation:There are five different categories of a computer.

(1)super computer (2) mainframe (3) personal computer (4) workstation

(5) minicomputer

(1)super computer: super computer is the term fastest computer available current time.super computers are very expensive and specialized computer.

(2)mainframe : mainframe computer is perform to the execute the program the currently.

(3) personal computer: The most popular use for personal computer playing games and surfing internet.

(4)workstation: This type of computer used for the engineer applications desktop publishing , software development.

(5)minicomputer: The general a minicomputer is multiprocessing system it is a midsize computer.

6 0
3 years ago
How do I make my kali Linux faster in my virtual box?
vagabundo [1.1K]
Not sure to be honest
7 0
3 years ago
Other questions:
  • A standardized specification of a motherboard (including its dimensions, supported power supply types, and layout of components)
    11·1 answer
  • PLEASE HELP I NEED RIGHT ANSWER!
    9·2 answers
  • Does anyone want to play 2k21 or rocket league on xbox my username is Bud zecaog
    13·2 answers
  • PLEASE HELP ASAP!!! 50 POINTS FOR TWO DIGITAL TECHNOLOGY MULTIPLE CHOICE QUESTIONS!!!
    13·1 answer
  • Which of the following occurs during data cleansing?
    9·1 answer
  • Kenny needs to keep client information such as names and addresses. She should use a
    7·2 answers
  • Which of the following is considered to be open-end credit?
    6·2 answers
  • Question 8 of 25
    6·1 answer
  • Questions: What memory modules are needed if the customer wants 3 GB of RAM? What capacities and how many modules of each capaci
    7·1 answer
  • Which of the following best describes a hotspot as
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!