1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bad White [126]
4 years ago
5

When computer criminals launch an intentional attack in which a malicious hacker floods a server with millions of bogus service

requests that so occupy the server that it cannot service legitimate​ requests, it is called a​ ________ attack?
Computers and Technology
1 answer:
makkiz [27]4 years ago
6 0
I'm pretty sure it's a DDOS or DOS attack
You might be interested in
What happened to the ten commandments tablets.
nignag [31]

Answer:

they got destroyed

Explanation:

whenwhen Moses came back from the mountain was angry when he saw the people worshipping Idols who threw down the tablets and broke them

7 0
3 years ago
What is Frederick Taylor attributed to doing
Wewaii [24]

Answer:

Frederick Winslow Taylor (March 20, 1856 – March 21, 1915) was an American mechanical engineer. He was widely known for his methods to improve industrial efficiency.[1] He was one of the first management consultants.[2] In 1911, Taylor summed up his efficiency techniques in his book The Principles of Scientific Management which, in 2001, Fellows of the Academy of Management voted the most influential management book of the twentieth century.[3] His pioneering work in applying engineering principles to the work done on the factory floor was instrumental in the creation and development of the branch of engineering that is now known as industrial engineering. Taylor made his name, and was most proud of his work, in scientific management; however, he made his fortune patenting steel-process improvements. As a result, Scientific management is sometimes referred to as Taylorism.

Explanation:

7 0
3 years ago
Which of the following code segments does not contain any errors?
Readme [11.4K]

Answer:

c. double triple(float n) { return (3 * n); }

Explanation:

In option a print is used to print integer.While printf is used in C to print something.

In option b there is no * operator between s s s it should be s*s*s.So it will give error.

In option d there is also no multiply operator * in between 3.14 2 r it should be 3.14*2*r.

So we can say that option c is error free.

8 0
3 years ago
How to make a sad face on keyboard using alt?
forsale [732]
Literally just do a colon and parenthesis :(

:( :-(
8 0
4 years ago
Read 2 more answers
PlZZZZZZZ help will give Brainliest
dalvyx [7]

Answer:

Phone

Explanation:

3 0
3 years ago
Read 2 more answers
Other questions:
  • Tom wants a way to automatically create ads and simplify campaign management, using his resources and Google's machine learning
    12·1 answer
  • Describe how to manipulate artwork in a presentation.
    13·1 answer
  • Describe how data center storage applications drive the development of SAN technology.
    8·1 answer
  • Which of the following is a job description for a person with a degree in information technology
    15·1 answer
  • horseback riders, bicyclists, and skateboarders ____ the rules of right-of-way when they use the road ?
    7·2 answers
  • Amazon.com uses a customer profiling system whenever a customer visits its website. using this system, amazon can offer products
    6·1 answer
  • If a switch needs to send information to other switches in the network it would send out a ___________.
    7·2 answers
  • 20 POINTS! Which music making software is better? Ableton Live or Logic Pro? Name the advantages and disadvantages of each one!
    7·2 answers
  • Please help me on this match all this up i’ll give you brainlist
    13·2 answers
  • A system engineer enhances the security of a network by adding firewalls to both the external network and the internal company n
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!