1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bezimeni [28]
3 years ago
5

A _____ attack floods a network or server with service requests to prevent legitimate users' access to the system. phishing back

door denial-of-service social engineering
Computers and Technology
1 answer:
Ad libitum [116K]3 years ago
4 0
Denial-of-service is correct 
You might be interested in
Carl is beginning a digital forensic investigation. he has been sent into the field to collect a machine. when he arrives, he se
postnew [5]

Answer:

Volatile memory analysis

Explanation:

volatile data analysis in a computer's memory dump memory forensics is used by information security specialists to examine and identify assaults or harmful actions that leave no clearly identifiable trails on hard disk data which os what Carl decides to preserve as much data as possible by capturing data in memory

6 0
2 years ago
Samira works for a large U.S. company that has factories all over the world. Samira returned to the U.S. after visiting several
Brums [2.3K]

Answer:

a. Transparency

Explanation:

What Samira actually did was Corporate Transparency. Her concerns about health of those people who purchased the company's products is right from the legal and moral point of views. There are several laws protecting consumers in the US. For example The Food and Drug Administration is in charge of ensuring that foods and medicines are safe for their consumption.

6 0
3 years ago
Which of the following is an example of tangible property?
lyudmila [28]
<span>B an idea for an invention that your dad mentioned briefly but did not write down</span>
8 0
4 years ago
Is Conflict Healthy ?<br>​
Vesna [10]

yes

Explanation:

because it has more things

6 0
2 years ago
Read 2 more answers
Your computer uses 4 bits to represent decimal numbers (0, 1, 2, 3 and so on) in binary. What is the SMALLEST number
lord [1]

Answer:

C

Explanation:

I believe this is because you cannot represent the number sixteen with only four binary bits. The highest you can go is 15.

8 0
3 years ago
Other questions:
  • F we are reduced to a set of computer algorithms, how do we differentiate ourselves from our programming or our connectome? is i
    8·1 answer
  • We have seen that Internet TCP sockets treat the data being sent as a byte stream but UDP sockets recognize message boundaries.
    13·1 answer
  • A high-angle shot is the same thing as a bird’s-eye shot. True False
    11·2 answers
  • Upon looking out at the
    8·2 answers
  • Write java code that displays all the objects in a stack in the order in which they were pushed onto it. after all the objects a
    5·1 answer
  • To find your personal learning style you can
    5·2 answers
  • How do I learn coding? Python
    5·2 answers
  • Light is a key formal element that film artists and technicians carefully manipulate to create mood, reveal character, and conve
    15·1 answer
  • The Internet began when a large company wanted to sell products online. <br> True or flase?
    6·2 answers
  • Describe accessibility in Windows 7 ​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!