1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Contact [7]
3 years ago
9

What is an antispamming approach where the receiving computer launches a return attack against the spammer, sending email messag

es back to the computer that originated the suspected spam? Multiple Choice typosquatting teergrubing Internet censorship website name stealing
Computers and Technology
2 answers:
Burka [1]3 years ago
8 0

Answer:

Teergrubing.

Explanation:

Teergrubing is an antis-pamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.

It is a good antis-pamming approach because it slows response to the Simple Mail Transfer Protocol (SMTP) commands, thus tying up resources.

Aloiza [94]3 years ago
4 0

Answer:

teergrubing

Explanation:

The tern "teergrubing" was derived from the German term "tar pit." A teergrube is a process where the email system on a computer's main server is  intentionally set slow so that it can detect and sniff out potential spam attacks on the computer's email system. In addition, the system ensures that the email system is enabled to bounce off the emails from the spammers by identifying the pathway used to send the email. As soon as the email is labelled malicious, the email is immediatetl labelled "spam"or as potentially dangerous and is shifted to the spam folder or sent back quickly to the owner. as a rejected email.

You might be interested in
Getting access to web browsing software to install it on a computer or to update your existing software is called _________ .
Ivenika [448]

Answer:

Downloading and/or Burning it on to your computer

Hope this helped! if so please mark it as brainliest

Explanation:

8 0
3 years ago
Read 2 more answers
A computer on a network that is not the server​
katrin [286]

Answer:

A peer-to-peer network is one in which two or more PCs share files and access to devices such as printers without requiring a separate server computer or server software. ... A P2P network can be an ad hoc connection—a couple of computers connected via a Universal Serial Bus to transfer files.

5 0
3 years ago
A friend has a CD of one of your favorite artists and has offered to let you copy it.
creativ13 [48]
No; copyright laws protect this artist's rights and I need to purchase the CD if I want it.  

This is due to copyrights being applied at the time of fixation.  In other words, as soon as the words or lyrics have been placed on paper, recorded or put in a computer the ARTIST is protected.
6 0
3 years ago
A shop will give discount of 10% if the cost of purchased quantity is more than 1000. Ask user for quantity suppose, one unit wi
UkoKoshka [18]

Answer:

The program in Python is as follows:

qty = int(input("Quantity: "))

price = 100 * qty

if qty >1000:

    price = (100 - 0.10 * 100) * qty

print("Cost: "+str(price))

Explanation:

This prompts the user for the quantity

qty = int(input("Quantity: "))

This calculates the price or cost, without discount

price = 100 * qty

This checks if the quantity is greater than 1000

if qty >1000:

If yes, this calculates the price or cost, after discount

    price = (100 - 0.10 * 100) * qty

This prints the calculated cost

print("Cost: "+str(price))

4 0
3 years ago
____ is a style of programming that focuses on the step-by-step sequence of instructions and operations.
mario62 [17]

Answer: Algorithm

Explanation: An algorithm is a plan, a set of step-by-step instructions to solve a problem. it involves three basic building blocks to use when designing algorithms. these are.,

1. Sequencing

2. Selection

3. Iteration

7 0
3 years ago
Read 2 more answers
Other questions:
  • What is authentication?
    8·1 answer
  • Describe encryption at gateways in thePresentation layer of the OSI Reference Model
    6·1 answer
  • Elisa and josh need to access general helps. Elisa will press the F1 key. josh will on ?. who will access general help
    15·1 answer
  • Which ipv6 router message is sent via multicast with a scope of link-local with the expectation that all local routers will iden
    5·1 answer
  • Please Do Solve it guys...
    6·1 answer
  • Which best describes what online reading tools aim to help readers do? *100 POINTS*
    9·2 answers
  • • Open your Netbeans IDE and answer the following question
    5·1 answer
  • A newspaper wants to estimate the proportion of Americans who will vote for Candidate A. A random sample of 1000 voters is selec
    14·1 answer
  • What is the best programing language to use for building video games?
    10·1 answer
  • A ____________ protocol is software that provides or facilitates a connection in which no information is retained by either send
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!