1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DaniilM [7]
3 years ago
15

i have a class for computers and i need a free hardrive are there any websites that give me one for free in 3 days??​

Computers and Technology
1 answer:
vagabundo [1.1K]3 years ago
6 0

Answer:

I don't think so bud that's not how it works lol

You might be interested in
A company wishes to increase security at the employee entrance. Which of the following technologies would be the most useful?
AVprozaik [17]
I believe a metal detector would be a fine choice for an employee entrance. 
5 0
3 years ago
Read 2 more answers
I can’t wait Till Miya’s anniversary skin To be released on september 21st
dezoksy [38]

Answer:

no u

Explanation:

no need

3 0
2 years ago
An “AI” (artificial intelligence) could be used in:
zhannawk [14.2K]
I would say D. But l may be incorrect. Al bots are not made for games, but are made for information.

Sorry l can't be much of help, but l do hope that I did help you out in a way.
8 0
3 years ago
Objective measures of the user support or help desk operation are called _____.
gizmo_the_mogwai [7]
The answer is "<span>performance statistics"......</span>
5 0
3 years ago
Explain how a Denial of Service (DoS) attack works. After describing a DoS conduct some research and provide an example of a rea
Kay [80]

Answer:                                                                                    

  • A Denial of Service(DoS) is a cyber attack in which the attacker makes a machine or network resource unavailable to its intended users by temporarily interrupting services of a host connected to the Internet.
  • It works by flooding the targeted system or resource with redundant requests or traffic to overload systems and prevent legitimate and valid requests from being accomplished.
  • Usually the user establishes a connection by sending a request to server to authenticate it and server responses back by giving authentication permission. This permission is acknowledged by the user and then is enabled on the server.
  • Contrary to this, in a DOS attach, users send multiple authentication requests to server and these requests contain wrong return addresses so server cant identify the user in order to send permission. The server waits for some time before attempting to close the connection but before it closes the connection the perpetrator sends new set of  false requests and this process starts again.
  • DOS attacks can slow network performance, makes a certain website unavailable and not accessible.
  • BBC was attacked with a DDoS attack measuring over 600 Gbps, The motive of the attackers who claimed responsibility, was that they were just “testing.”
  • The biggest DDoS attack happened to target GitHub. This politically motivated attack lasted several days and adapted itself around implemented DDoS mitigation strategies. The DDoS traffic initiated in China and it is suspected that the Chinese Government oversaw the attack.
  • Wikipedia was brought down by DDoS attack in Germany and some parts of Europe.  
  • TalkTalk a company which provides pay television, telecommunications, Internet access, and mobile network services to  costumers in the United Kingdom was brought down by DDoS attack   by a group of teenagers purely for their own entertainment.
  • In 2000 a 15-year-old hacker known as ‘Mafiaboy’ brought down several popular websites in the world including CNN,  eBay, and Yahoo, This attack had resulted chaos in stock market.  Attacker was revealed to be a high school student named Michael Calce, attacked by hacking into the networks of several universities and using their servers to perform DDoS attack. His motive was to intimidate other hacker groups.

3 0
3 years ago
Other questions:
  • Julio is the department head for his company's customer service department. His staff has complained that they spend countless h
    13·2 answers
  • *asap* Name one of the similarities between Word and Excel.
    7·1 answer
  • Hen using presentation software, what do you do when you "compose a slide"?
    5·1 answer
  • PLEASE HELP ASAP
    10·2 answers
  • Which of the following could not be represented by columns in the SPSS data editor? a. Levels of between-group variables. b. Lev
    11·2 answers
  • Visual-verbal synergy has nothing to do with text, but solely with images used in a design.
    9·1 answer
  • Your textbook discussed a record store example where one user could perform a query to determine which recordings had a track le
    14·1 answer
  • What is the name of the User-defined function that is mentioned in the code?
    6·1 answer
  • Outside of a C program, a file is identified by its ________while inside a C program, a file is identified by a(n) ________. fil
    13·1 answer
  • My assignment asks me to write a python program using if, elif, and else that takes a user's salary and calculates the tax based
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!