1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bad White [126]
4 years ago
5

When computer criminals launch an intentional attack in which a malicious hacker floods a server with millions of bogus service

requests that so occupy the server that it cannot service legitimate​ requests, it is called a​ ________ attack?
Computers and Technology
1 answer:
makkiz [27]4 years ago
6 0
I'm pretty sure it's a DDOS or DOS attack
You might be interested in
17. Which of the following is not a visible section in a File Explorer window?
andrew-mc [135]

Answer: D.)

Explanation: Clipboard

4 0
3 years ago
What are the components of computer system??<br>​
FinnZ [79.3K]

There are Mainly Five basic Components of a computer system.

Input Unit.

Output unit.

Memory Unit.

Control unit.

Arithmetic and Logic Unit.

8 0
3 years ago
Read 2 more answers
Changes in computer technology have an effect on _____. computer scientists only people who work with computers only everybody p
luda_lava [24]
Changes in computer technology have an effect on <span>everybody.</span>
6 0
4 years ago
Read 2 more answers
Alfred, a software programmer at Gamma Inc., develops a program that spreads Trojan viruses to the organization’s network. When
Rasek [7]

Answer: (A) legal and ethical

Explanation:

 In the above given scenario, the liam's behaviors is consider as legal and ethical. The organization ethics is the morals of an association, and it is the means by which an association reacts to an inner or outside upgrade. Hierarchical morals is associated with the authoritative culture.

The ethical standard are basically depend on the human standards of good and bad and lawful guidelines depend on composed law, while moral norms depend on human rights and wrongs.

In the organization, the ethical and legal value are basically expressed by each employee as it is the regulatory law which is developed by the government for the particular organization to maintain the discipline.

3 0
4 years ago
In popular usage and in the media, the term ________ often describes someone who breaks into a computer system without authoriza
ch4aika [34]
The answer here is hacker
6 0
3 years ago
Other questions:
  • What do you think is the most effective way to ensure that code adheres to good coding standards? (1 correct answer)
    5·2 answers
  • What does a column represent in a chart?
    13·1 answer
  • Write a program that takes a date as input and outputs the date's season. The input is a string to represent the month and an in
    13·1 answer
  • Can you give me a long list of anime
    6·2 answers
  • Refer to the following statement: “We have implemented several IT solutions:
    14·1 answer
  • How do you invite someone to a conversation on brainly
    14·1 answer
  • If a folder exists on an NTFS partition, which permission is needed by a user who needs to set security permissions on the folde
    11·1 answer
  • Which line of code will cause the loop to execute exactly one time?
    13·1 answer
  • How much tabs can you open with 8GB of ram? ​
    6·1 answer
  • What is Fill handle?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!