1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bezimeni [28]
3 years ago
5

A _____ attack floods a network or server with service requests to prevent legitimate users' access to the system. phishing back

door denial-of-service social engineering
Computers and Technology
1 answer:
Ad libitum [116K]3 years ago
4 0
Denial-of-service is correct 
You might be interested in
Write a program to check the password( qbasic)​
snow_tiger [21]

Answer:

Assuming this is in python:

def check_password(password):

   

   correct_password = "qbasic"

   

   if password == correct_password:

       return True

   else:

       return False

def main():

   

   user_input = input("Type in your password: ")

   

   if check_password(user_input):

       print("Correct!")

   else:

       print("Wrong, try again")

     

       

main()

Explanation:

Hope this helped :) If it wasn't suppose to be in python, tell me so I can make it in the correct programming language.

Have a good day :)

4 0
3 years ago
Cookies are to improve the access of internet information. Therefore for the sake of you own privacy and security you should not
lina2011 [118]
The answer is a. True
3 0
3 years ago
Read 2 more answers
Lionbridge theory test
marishachu [46]
What about it kidddddd
4 0
3 years ago
Read 2 more answers
To decrease the size of text so it will fit into a text box without overflowing, select the
Trava [24]

Answer:

It is is A

Explanation:

Becuase if you shrink a text thats just the answer

5 0
3 years ago
Read 2 more answers
Your unit has an upcoming training event. What form is used to record and maintain document numbers for ammunition documents?
aleksklad [387]

Ammunition documents which caries bullet, fuses extra should be numbered properly.

<u>Explanation:</u>

A document number or page number should be well organized and he or she coordinates with assistant trainers who have involved it.

Since it is a training event. The trainer has to have a checklist and make as fill with page number and make sure page numbers are strictly followed during the training session. If any page number is misplaced through the training session it will be embracing the situation for trainer and student or staff who get the training.

8 0
3 years ago
Other questions:
  • Why would an over the shoulder shot be used
    11·1 answer
  • Altering grade records within a computer system is called
    11·2 answers
  • WHEN COPYING EXISTING SPREADSHEET DATA TO A WORD DOCUMENT YOU NEED TO SELECT?
    12·1 answer
  • A server that provides data transfer and storage space at remote locations is called a
    7·1 answer
  • Which of the following statements is TRUE?
    11·1 answer
  • "What is the capital of Belarus?" is an example of what type of search query
    10·2 answers
  • Out put of Print (3**2*2)
    13·2 answers
  • FILL IN THE BLANK.
    10·1 answer
  • The people, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines that can simulat
    13·1 answer
  • question 2 which data link layer protocol defines the process by which lan devices interface with upper network layer protocols?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!