1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Liono4ka [1.6K]
3 years ago
9

In both direct flooding attacks and _____ the use of spoofed source addresses results in response packets being scattered across

the Internet and thus detectable.
Computers and Technology
1 answer:
Natali5045456 [20]3 years ago
6 0

Answer:

SYN spoofing attacks.    

Explanation:

The Spoofing attack is used to access the personal information it is distributed the  viruses through infected links or file .The spoofing attacks has redistributed the traffic and the flow control in the denial-of-service attacks.

The SYN spoofing attacks is used the spoofed source in the result of giving response to packet The Spoofing attack  is distributed  across the Internet also it is detectable

You might be interested in
kayah has created a website that explains what her business does. what type of computer program is needed to access/view kayah's
soldier1979 [14.2K]

Answer:

web browser

Explanation:

A web browser is a program that allows users to view and explore

information on the World Wide Web.

8 0
3 years ago
Read 2 more answers
What is the only language a microprocessor can process directly but most programmers almost never write programs in this code?
Phantasy [73]
Assembly language, a.k.a. machine language.
6 0
3 years ago
Explain how advanced analytics (e.g., Machine learning) helps the threat life cycle management. State the stage of the threat li
noname [10]

Advanced analytics may help to simulate the behavior of an infectious disease in epidemiology.

<h3>What is Advanced analytics?</h3>

Advanced analytics refers to the computation strategies that are able to manage a huge number of parameters to model a situation.

Advanced analytics is very useful in epidemiology because this approach allows for predicting the transmissible behavior of infectious diseases caused by pathogenic microorganisms (e.g., bacteria) and viruses.

In conclusion, Advanced analytics may help to simulate the behavior of an infectious disease in epidemiology.

Learn more about Advanced analytics here:

brainly.com/question/15007647

#SPJ1

8 0
2 years ago
____ variables are variables that are shared by every instantiation of a class. local instance
Colt1911 [192]

These are known as class variables, so called because of the property mentioned.

4 0
3 years ago
Which of the following is a special-purpose computer that functions as a component in a larger product?
Dominik [7]

Answer:  

Embedded Computer

Explanation:

  • An embedded computer is designed to perform a certain function and it is a component of a larger system.
  • An embedded computer has a dedicated function within a larger system and is incorporated as a part of a complete system rather than being a stand alone computer.
  • It is a microprocessor, micro controller based real time control system.
  • Its a combination of hardware and software that have a dedicated function to achieve a specific task. The also have peripheral devices for communication purposes.  
  • Digital Camera , ATM, Calculator, Digital Watch , Self-autonomous Vehicles, Security Camera , Washing Machine , Mp3 player, Microwave Oven , Fire Alarm, Smart Phone,Vending Machines, networking hardware like dedicated routers etc are examples of embedded systems.
  • Embedded computers are less expensive to produce, consumes less power, easier to maintain, do not require remote maintenance and easily customizable.

4 0
3 years ago
Other questions:
  • If x is an int, which of the following statements adds 5 to the current value of x and stores the new value back in x?
    12·1 answer
  • Which of the following is a strategy used to enhance communication in a presentation?
    14·1 answer
  • How do i do to use the cumputer very wel?
    14·2 answers
  • Two threads try to acquire the same resource at the same time and both are blocked. Then, they continually change their states i
    14·1 answer
  • How does design influence the product's function?
    5·1 answer
  • Using social media, such as text messages and status updates, has helped
    10·1 answer
  • 25 Points Asap <br> Write a Java program named Light.java that displays a light bulb shown below:
    14·1 answer
  • NEXT
    15·2 answers
  • PLZ HELP HELP HELP ME I NEED ANSWER MATH​
    13·2 answers
  • UCLA Extension's marketing department wants
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!