1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nat2105 [25]
3 years ago
8

Interruption attacks are also called ___ attacks:

Computers and Technology
1 answer:
Lelu [443]3 years ago
4 0

Answer:

Interruption attack are also referred to as Denial Of Service(DOS) attack.

Explanation:

Interruption attack are also called denial of service.The main aim of  interruption attack or Denial Of Srvice attack is to make resources unavailable.

For example:- wordpress.com had an DOS attack that took down their servers hence the service was unavailable for it's users.

Hence we conclude that the answer to this question is Denail of Service (DOS).

You might be interested in
The _______ number system allows digital devices to represent virtually any number simply by using 0s and 1s.â
zhuklara [117]
The answer is <span>Digital data 

</span>
4 0
3 years ago
With the help of technology students will benefit greatly from studying by themselves at home. Do you agree or disagree with the
cestrela7 [59]
I disagree because when kids are home alone, and you think they are studying they might not be and they will be playing games on the computer.
6 0
3 years ago
Read 2 more answers
How to write a survey on cat theory​
nalin [4]
Start with a bold statement then follow with facts solutions problems and theory’s
3 0
2 years ago
You should periodically perform basic computer maintenance on your computer.<br> True<br> False
kotegsom [21]

Answer:

that's true after some period of time it's necessary

8 0
2 years ago
Read 2 more answers
What is the technique in which a process can do nothing until it gets permission to enter its critical section but continues to
iVinArrow [24]

Answer:  A)Spin Waiting

Explanation: Spin waiting is the mechanism to wait in a loop till the permission for the entering the critical sector is granted.The permission is granted on the basis of availability of the lock. The loop continues to wait by tending to be in busy waiting situation .

Other options are incorrect because general semaphore is used for solving critical issues and achieving synchronization, critical resource can be used at one time at one certain situation and message passing is used for communication of object by sending and receiving message.Thus, the correct option is option(A).

7 0
3 years ago
Other questions:
  • When I comes to saving money, what is good rule of thumb
    5·1 answer
  • What is the output of the second println statement in the main method? public class Foo { int i; static int s; public static voi
    14·1 answer
  • Does anyone know this ? this website is scratch btw.
    10·1 answer
  • How many bits are required to encode an image that is 25 pixels wide and 50 pixels tall, if you encode each pixel with 12 bits o
    15·1 answer
  • The traditional UNIX scheduler enforces an inverse relationship between priority numbers and priorities: the higher the numbe1~
    6·1 answer
  • ap csp The local, remote, and upstream _______ can each have multiple ___ _____. When a participant in a collaborative group on
    5·1 answer
  • Microsoft vs Sony who wins ​
    13·2 answers
  • What dd command would you use to copy the contents of a partition named /dev/drive1 to another partition, called /dev/backup?
    6·1 answer
  • Write a flowchart and C code for a program that does the following: Uses a do...while loop. Prints the numbers from 1 to 10 with
    13·1 answer
  • _____is used to organize and modify the properties of the current selection.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!