1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bezimeni [28]
3 years ago
5

A _____ attack floods a network or server with service requests to prevent legitimate users' access to the system. phishing back

door denial-of-service social engineering
Computers and Technology
1 answer:
Ad libitum [116K]3 years ago
4 0
Denial-of-service is correct 
You might be interested in
Shawn thought that the screen of the block-based program he was using was
Alja [10]

Answer:

Interface

Explanation:

Definition- "The interface of a particular piece of computer software is its presentation on the screen and how easy it is to operate. <em>...the development of better user interfaces.</em>"

7 0
3 years ago
Which measure should you take for the periodic maintenance of your computer?
WITCHER [35]
I believe the answer is annual maintenance
Hope this helps :p
6 0
3 years ago
Read 2 more answers
Does technology make us more alone?
Anika [276]
Both yeah and no, depending on personal opinion
3 0
3 years ago
What is the pennsylvania law on cyber bullying
gizmo_the_mogwai [7]
Convicted of a criminal offense may face fines,imprisonment.hope that and you got it right.
8 0
3 years ago
What should be done on a tablet in order for that tablet to cease all network connections?
ankoles [38]

Answer:

Turn On Airplane Mode

Explanation:

Turning off cellular does not turn off wifi.

Turning off wifi does not turn off cellular.

Turning off location services does not affect your network connections.

Airplane mode is what turns off all network connections.

3 0
3 years ago
Other questions:
  • In the following statement:
    12·1 answer
  • Your friends know that you understand a lot about computers, both the technical details of how they operate as well as informati
    12·1 answer
  • As the performance of PCs steadily improves, computers that in the past were classified as midrange computers are now marketed a
    9·1 answer
  • At age 16 Cheyanne just got her drivers license
    5·2 answers
  • . The first step in devising security services and mechanisms is to develop a security policy True False
    11·1 answer
  • A file name extension provides what information about a file?
    6·1 answer
  • Able to make a survey form using VB (Visual basics 6.0) to represent ways of conservation of
    8·2 answers
  • Which type of storage disk and disk drive can you use in the given situation?
    12·1 answer
  • Write a valid HTML + Python page that will count numbered from 1 to 1,000,000?​
    9·1 answer
  • Your worksheet contains a price in cell A5 and many formulas refer to that price how would you refer to that price in the formul
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!