1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bad White [126]
4 years ago
5

When computer criminals launch an intentional attack in which a malicious hacker floods a server with millions of bogus service

requests that so occupy the server that it cannot service legitimate​ requests, it is called a​ ________ attack?
Computers and Technology
1 answer:
makkiz [27]4 years ago
6 0
I'm pretty sure it's a DDOS or DOS attack
You might be interested in
What is the 10/20/30 rule?
Sophie [7]
This represents Guy <span>Kawasaki Rule for PowerPoint Presentations. Here is what it stands for: 

</span><span>10 slides are the optimal number to use in a  presentation.
20 minutes is the longest amount of time that you should speak.
<span>30 point font is the smallest font that you should use on slides.


</span></span>
3 0
3 years ago
Self-disclosure is most likely to occur _____________.a.
Feliz [49]

The answer is..

C.  During one-on-one conversations

4 0
3 years ago
Read 2 more answers
Tara is using new software for the first time and wants help learning how to
Marizza181 [45]

Reach out to an expert in software (or the specific software) or search for help in the internet

6 0
3 years ago
Reply emailing a student who is asking about audio materials​
Sergeeva-Olga [200]

Answer:

The student because you are replying to the student.

Explanation:

4 0
3 years ago
Read 2 more answers
Select the correct answer. Which is an example of noisy data in data sources? A. Age: 987 B. Gender: Male C. First Name: Gary D.
umka21 [38]

Answer:

A. Age 987 is the noisy data

Explanation:

Undoubtedly, this one is, as it is going to create a buzz in each person ear, who is going to listen it.  This age is almost impossible. However, some Monks from Tibet have been able to live for so long however! And this makes my answer a noisy data, as many will not believe on first read. Something which is rare, is the noisy data. And when it is proved and accepted, it becomes a noisy information.

7 0
3 years ago
Other questions:
  • I need help making this table in html code I have some of chart done but idk where to go after the 6:30pm part
    13·1 answer
  • Ed has just finished typing a long financial report. Before he sends this report to shareholders, Ed should _____.
    9·2 answers
  • You have two DCs, each with three Active Directory-integrated zones. You're getting inconsistent DNS lookup results and suspect
    8·1 answer
  • When you connect a device to your computer for the first time, Windows Media Player selects the ____ method that works best for
    15·2 answers
  • Good business ethics is a good marketing strategy. Discuss
    13·1 answer
  • An example of a _________________ impact is when a consumer wants to buy a product on the internet but is afraid the company won
    8·2 answers
  • Which of the following describes all illustrations created by freehand?
    15·1 answer
  • It is the "executable" phrase of Word<br>Wide Web with dynamic applications,?<br>​
    9·1 answer
  • What do macOS and Windows use to prevent us from accidentally deleting files?
    15·1 answer
  • Does CLAIRE https://claire-ai.org/vision/ considered a representative of Roy Rotwell's Fifth Generation of innovation?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!