1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bezimeni [28]
3 years ago
5

A _____ attack floods a network or server with service requests to prevent legitimate users' access to the system. phishing back

door denial-of-service social engineering
Computers and Technology
1 answer:
Ad libitum [116K]3 years ago
4 0
Denial-of-service is correct 
You might be interested in
What is a custom information field that helps users to find a specific document?
gtnhenbr [62]
Go to start then type the name of the document or file
6 0
3 years ago
Discussion Topic
frozen [14]

The advantages of using spreadsheets for managing personal finances is that:

  • Spreadsheets are known to be tools that are very quick and easy and helps one to add into a workflow.
  • Spreadsheets are regarded as an efficient tools for financial documents. A person can have access to a lot of spreadsheet templates and they can be able to visualize data along with caveats.

<h3>What is the advantage of using a spreadsheet?</h3>

The Advantage is that it is one that help[s a person to be able to organizing a lot of data.

Note that The advantages of using spreadsheets for managing personal finances is that:

  • Spreadsheets are known to be tools that are very quick and easy and helps one to add into a workflow.
  • Spreadsheets are regarded as an efficient tools for financial documents. A person can have access to a lot of spreadsheet templates and they can be able to visualize data along with caveats.

Learn more about spreadsheets  from

brainly.com/question/26919847

#SPJ1

6 0
1 year ago
What symbol do we use to denote a character?
pychu [463]

Answer:

'Single Character'

Explanation:

A Character, commonly abbreviated as "char", is a computer symbol, letter, or number. A keyboard is an input device that inputs a character when a key is pressed.

5 0
3 years ago
Which of the following is a sign that a website is inappropriate?
nata0808 [166]

Answer:

A

Explanation:

If you find something embarrassing, its more likely that other people with also think its embarrassing. All the other points are on the internet right now. Amazon sells things, News show information and there are political campaigns to show you there offers

3 0
3 years ago
Read 2 more answers
Ravi is writing an essay on the impact of the internet on business. Help him classify the scenarios he sees around him as positi
Radda [10]

Answer: See explanation

Explanation:

Based on the options given, the positive effects of the internet on business will be:

• He recently bought a second-hand camera online, which he hadn't been able to find in any store.

• His friend sell printed T-shirts online, storing them in his basement and promoting them on social media.

The negative effects of the internet on business will be:

• A bookstore down the road shut down because people preferred the cheaper online bookstores.

• Ravi's sister complains that her boss always knows when she is late, but rarely greets her if their paths cross in office.

• One of his friend's printed T-shirts got wet and stained in the delivery truck and the buyer wrote a nasty review.

6 0
2 years ago
Other questions:
  • What are some food project ideas?, its for my technology homework
    10·1 answer
  • Mr. Olgesandravich is proctoring students working at their own pace in an online class. He is generating a spreadsheet that show
    15·1 answer
  • How could a system be designed to allow a choice of operating systems from which to boot? What would the bootstrap program need
    14·1 answer
  • The part of the computer that provides access to the internet is the-?
    15·2 answers
  • When planning the structure of a spreadsheet, columns are for _______ items and rows are for _______ items.
    5·2 answers
  • ________ applications are software in which the vendor hosts the software online over the Internet and you do not to install the
    15·1 answer
  • "What line of code can be used to provide a convenient way to merge the source code from one file with the source code in anothe
    8·1 answer
  • I need 3 sentences on adware.<br> What they do and how they are a risk.
    5·1 answer
  • A letter of application should be written on:
    13·1 answer
  • How can we style the images and layouts of our pages?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!