1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Varvara68 [4.7K]
4 years ago
8

In which type of hacking does the user block access from legitimate users without actually accessing the attacked system?

Computers and Technology
1 answer:
Tanya [424]4 years ago
3 0

Complete Question:

In which type of hacking does the user block access from legitimate users without actually accessing the attacked system?

Group of answer choices

a. Denial of service

b. Web attack

c. Session hijacking

d. None of the above

Answer:

a. Denial of service

Explanation:

Denial of service (DOS) is a type of hacking in which the user (hacker) blocks access from legitimate users without actually accessing the attacked system.

It is a type of cyber attack in which the user (an attacker or hacker) makes a system or network inaccessible to the legitimate end users temporarily or indefinitely by flooding their system with unsolicited traffic and invalid authentication requests.

A denial of service is synonymous to a shop having a single entry point being crowded by a group of people seeking into entry into the shop, thereby preventing the legitimate customers (users) from exercising their franchise.

<em>Under a DOS attack, the system or network gets stuck while trying to locate the invalid return address that sent the authentication requests, thus disrupting and closing the connection. Some examples of a denial of service attack are ping of death, smurf attack, email bomb, ping flood, etc. </em>

You might be interested in
_ is the use of a collection of computers, often owned by many people or different organizations, to work in a coordinated manne
ddd [48]

Answer:

"Grid computing" is the correct answer for the above question.

Explanation:

  • Grid computing is a process in which many computers are participating to solve a single problem. This type of process is distributed multiple computers to perform a different type of task.
  • If there is large problem and if many computers solve that problem, then that problem is solved easily within a few minutes.
  • This is because many computers are working for that problem.
  • The above question asked about that process in which many computers are working to solve a single problem. This processor is known as "Grid Computing".
8 0
3 years ago
A quality assurance test for digital imaging receptors is to check for dark noise. What is the purpose of this test?
baherus [9]

Answer:

The purpose of the quality assurance test is to assess the level of detector noise in the system.

Explanation:

Quality Assurance (QA) is characterized as an operation to ensure a company provides customers with quality products or services. QA concentrates on improving the processes of supplying customers with quality products. A company must ensure the efficiency and effectiveness of the systems in compliance with software products ' quality standards. Quality assurance is commonly referred to as QA monitoring

Purpose of the Quality Assurance:

  • The assurance of quality is to check whether the produced product is appropriate for use. To a certain end, procedures and practices that need to be changed regularly should be pursued by the organization.
  • It mainly focuses on product/service quality that we offer to customers during or after software implementation.
6 0
4 years ago
Write a function shampoo_instructions() with parameter num_cycles. If num_cycles is less than 1, print "Too few.". If more than
Mama L [17]

Answer:

def shampoo_instructions(num_cycles):

   #Check the cycles to be greater than 1.

   if num_cycles < 1:

     

       #Display the statement.

       print('Too few.')

     

   #Check the cycles to be greater than 4.

   elif num_cycles > 4:

     

       #Display the statement.

       print('Too many.')

     

   #The else part.

   else:

     

       #Initialize the variable.

       N = 1;

         

       #Begin the for loop.

       for N in range(N, num_cycles+1):

         

           #Print the result.

           print(N , ": Lather and rinse.")

         

       #Print the statement.

       print('Done.')

#Call the function.

shampoo_instructions(2)

Explanation:

7 0
3 years ago
What type of stone was the most common building material of royal pyramid?
eimsori [14]
I think it's low grade lime stone..
6 0
3 years ago
Write a function that converts a string into an int. Assume the int is between 10 and 99. Do not use the atoi() or the stoi() fu
Liula [17]

Answer:

Written in C++

#include <iostream>

#include <sstream>

using namespace std;

int main()  {

   string num;

   cout<<"Enter a number: ";

   cin>>num;

   stringstream sstream(num);

   int convertnum = 0;

   sstream >> convertnum;

   cout << "Output: " << convertnum;

}

Explanation:

Without using atoi() or stoi(), we can make use of a string stream and this is explained as follows:

This line declares a string variable num

   string num;

This line prompts user for input

   cout<<"Enter a number: ";

This line gets user input

   cin>>num;

This line declares a string stream variable, sstream

   stringstream sstream(num);

This line declares and initializes the output variable, convertnum to 0

   int convertnum = 0;

The stream is passed into the output variable, convertnum

   sstream >> convertnum;

This line displays the output

   cout << "Output: " << convertnum;

<em>Note that: if user enters a non integer character such as (alphabet, etc), only the integer part will be convert.</em>

<em>For instance,</em>

<em>40a will be outputted as 40</em>

6 0
3 years ago
Other questions:
  • Dani wants to create a web page to document her travel adventures. Which coding language should she use? HTML Java Python Text
    15·1 answer
  • Using the slice operator, print your first, then last name.2. Print the length of your first name.3. Assume you have two variabl
    6·1 answer
  • Which of the following phrases describes top-down processing
    8·1 answer
  • What width would you choose for the pdf?
    12·1 answer
  • DOUBLE POINTS!! PLEASE HELP QUICKLY!!!!!
    15·2 answers
  • What is the best way to show a complex data chart in word?
    6·1 answer
  • Point out the wrong statement.
    10·1 answer
  • A computer projecter is an example of a(n):<br> Input Device<br> Output Device<br> Storage Device
    12·2 answers
  • List and explain three computing devices from the 20th century​
    13·2 answers
  • Read the problem listed below. Formulate a Decomposition or Outline of the problem. Determine if you have seen this problem befo
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!