Answer:
4. A Denial of Service attack (DDOS attack).
Explanation:
A DDOS attack is a malicious attempt to disrupt the normal traffic to a service.
In essence, it sends an enormous amount of requests to the service, until the server is overwhelmed because it can't handle that much traffic, and collapses in an overflow.
Thus, regular users are not able to access their services.
Usually, attackers use a botnet, a network of "zombie" computers that have been previously infected with a malware that allows the attacker to remotely control them, then the botnet starts to send a flood of traffic from different locations, and make the attacker difficult to detect or track.
Answer:
C. an example of open-source software.
Explanation:
open-source software is the type of software in which anyone can access, it can also be shared And modified by anyone simply because ita accessible to the public.
Hence and open source software's source code can be
inspected, enhanced and modified by anyone. A typical example is Linux.
Answer:
Hi there! Pseudocode is the process of writing out the high-level structure of the program in simple English terms which acts as a blueprint of how the program will work. The pseudocode for this question is written below.
Explanation:
Prompt user for input 1
Validate input 1
Prompt user for input 2
Validate input 2
Prompt user for input 3
Validate input 3
Perform checks:
If
1 and 2 equals 3
Or
1 and 3 equals 2
Or
2 and 3 equals 1
Display message to user
Answer:
b. erroneous processing can result in the accumulation of a great number of misstatements in a short period of time.
Explanation:
Because of the consistent nature of processing in computers, this is capable of creating certain kinds of risk. From the option, one of the probable risk that can result from consistent information processing for multiple transactions at the same time is erroneous processing. This can therefore lead to a pile of misstatements in only a short period of time.
Answer:
It's C
Explanation:
Adware displays or directs the users to an advertisement, while spyware performs espionage on the computer`s activity.