1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
katrin [286]
3 years ago
5

A(n) _______ allows an attacker to use a network structure to send large volumes of packets to a victim.

Computers and Technology
1 answer:
Novosadov [1.4K]3 years ago
7 0
A Smurf Attack

Smurf attack is kind of a DDoS attack that is somewhat similar to ping floods and in most cases exploits characteristics of broadcast networks. A system is flooded with spoofed messages. It does this by exploiting protocols of the IP and ICMP.

 






You might be interested in
If you want to insert a column into an existing table what would you do
Amiraneli [1.4K]
This is generally the same on Docs and Word. You'd just highlight the table, go into the settings, and expand it by one column, on docs by dragging it out a little more on the given grid.
Hope this helps!
5 0
3 years ago
When code is compiled it
lesantik [10]

Answer:

A compiler takes the program code (source code) and converts the source code to a machine language module (called an object file). Another specialized program, called a linker, combines this object file with other previously compiled object files (in particular run-time modules) to create an executable file. In short, it's A or D.

5 0
3 years ago
Read 2 more answers
As a compositional mode for electronic? media, __________ help people find their way through an unfamiliar system or? subject; t
maks197457 [2]
The answer that fills in the blank is orientation. It is because orientation does not provide all the details of what they are doing but a guideline of what they must do, in order for them to be guided on the things that they need to learn as they start. They require proper guidance which is the orientation before performing before hand. Especially when they are not familiar on what they need to do.
3 0
3 years ago
: Compute the 9 partial derivatives for the network with two inputs, two neurons in
lions [1.4K]

Using the python code we can say that it will be possible to calculate the neutrons and organize them as:

<h3>The code can be written as:</h3>

<em>def get_total_derivative(self,l_id):</em>

<em>def sigmoid(x, div = 0):</em>

<em>if div == 1: </em>

<em>return np.exp(-x) / (1. + np.exp(-x))**2.</em>

<em>if div == 2: </em>

<em>return - np.exp(x) * (np.exp(x) - 1) / (1. + np.exp(x))**3.</em>

<em>return 1. / (1. + np.exp(-x)) </em>

<em />

<em>def linear(x, div = 0):</em>

<em>if div == 1: </em>

<em>return np.full(x.shape,1)</em>

<em>if div > 2: </em>

<em>return np.zeros(x.shape)</em>

<em>return x </em>

<em />

<em />

<em />

See more about python at brainly.com/question/18502436

#SPJ1

8 0
2 years ago
Which extension is appropriate for Word document templates?
expeople1 [14]
The answer to this question is A
8 0
2 years ago
Read 2 more answers
Other questions:
  • For Adults/Adolescents, you should call/activate EMS: Before providing CPR. After providing CPR for 2 minutes. After an AED has
    13·1 answer
  • When sociologists say that it is difficult to predict all the results of social change, what are they referring to?
    5·1 answer
  • What is the maximum number of hosts you can have on a network if the first decimal value of the ip address is between 192 and 22
    10·1 answer
  • A user reports that nothing happens when he or she attempts to print from the computer at his desk. This points to a possible pr
    11·2 answers
  • Which statement best describes a scientific theory?
    13·1 answer
  • A troubleshooter's ability to design and test hypotheses in order to solve a technology problem is based on ____.
    14·1 answer
  • Method x1() has code that calls method x2(). Method x2() has the following header.
    7·1 answer
  • ____ is a bundled set of communications services, including internet, telephone, and tv, that operates over a total fiber-optic
    5·1 answer
  • Define the terms network, LAN, WAN, and Internet.
    11·1 answer
  • Imagine that you are a professional white hat hacker, testing a company’s system to make sure they are ready for attacks. What m
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!