1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stepladder [879]
4 years ago
14

In which type of attack does the user respond to several external communication requests? Harry wants to watch a movie online by

visiting an online movie-streaming website. However, as he clicks on the movie link, several other advertisement pop-ups appear. They slow down the streaming of the movie. Harry is a victim of a attack.
Computers and Technology
1 answer:
Shkiper50 [21]4 years ago
3 0

Answer:

They normaly do that to put a virus on your device And hack into your private info like passwords and credit cards and stuff like that

Explanation:

Always watch a movie leagly

You might be interested in
A ________ is a powerful analytical tool to size up Apple Inc.'s competitive assets in order to determine whether or not those a
Zielflug [23.3K]

Answer: Resource and capability analysis.

Explanation:

Resource and capability analysis is the analyzation tool that is used in organization for observation of resources and working of processes.It helps in improvement in efficiency of organization methods.It is considered as the factor which provided benefit in organizational competition.

  • According to the question ,Apple Inc. is using resource and capability analysis method for surveying capabilities and resources so that they can face competition with their asset .
  • They assure to increase effectiveness of the resources and task so that customer requirement can be met to increase profit.
4 0
3 years ago
An array A[0..n - 2] contains `n-1` integers from 1 to `n` in increasing order. (Thus one integer in this range is missing.) Des
svetlana [45]

Answer:

I do not understand anything

8 0
3 years ago
Suppose end system A wants to send a large file to end system B. At a very high level, describe how end system A creates packets
sashaice [31]

Answer:

The answer is below

Explanation:

Suppose end system A wants to send a large file to end system B, the large file is first divided into smaller chunks. Each chunk is then assigned a header forming a packet. Multiple packets are being generated with each of the packet containing a unique destination address in its header.

When a packet arrives at the packet switch, the switch uses the unique destination address that is attached in the header of the packet to determine the link onto which the packet is to be forwarded.

5 0
3 years ago
What is the biggest difference between single system recording and double system recording?
Alinara [238K]

The most significant difference between single and double system recording is where the audio sound is recorded from. In a double system recording, the images and the sound are recorded in two different devices. Sound is recorded on the first device, and the picture and the reference audio is recorded on the second device. On the other hand, in a single system, the audio is captured silmutaneously with the image on the same device. The double recording system is used more so if you do not have a camera that has an advanced audio quality input. If you have a dedicated audio device that can capture audio on an independent device, then you will be guaranteed to get a robust sound quality.

7 0
3 years ago
The UIDs for a set of hierarchical entities can be propagated through multiple ________ relationship
SOVA2 [1]

The unique identifier (UIDs) for a set of hierarchical entities can be propagated by using multiple <u>barred</u> relationship.

<h3>What is a UID?</h3>

UID is anacronym for unique identifier and it can be defined as an alphanumeric or numeric string that is associated with a single entity or unique among all identifiers within an information system (IS).

This ultimately implies that, unique identifier (UIDs) are identifiers that marks a particular record within an information system (IS) as unique from every other record.

In Computer science, the unique identifier (UIDs) for a set of hierarchical entities can be propagated by using multiple <u>barred</u> relationship because they represent the relationships between the originating entities and the intersection entity.

Read more on a unique identifier here: brainly.com/question/25619349

5 0
3 years ago
Other questions:
  • Where is the bubble level on a tripod?
    6·2 answers
  • Where are the Add Level and Delete Level buttons located? Filter options list Sort &amp; Filter group Sort dialog box Custom fil
    11·1 answer
  • Labor-augmenting technology causes which of the following?(i) The marginal productivity of labor increases.(ii) The marginal pro
    7·1 answer
  • Does artificial intelligence have a place in our society why or why not
    5·2 answers
  • When writing code, how can printing be useful?
    15·1 answer
  • Central High School has a graphics design course that is developing a historical online archive of the school. The original phot
    15·2 answers
  • What is responsible for recording an image of an object with camera <br> Pls I neeed it right know
    8·1 answer
  • In the GO programming language you can't declare a float, it must be a float32 or float64. Why do you think this is done if the
    10·1 answer
  • Give three general reasons for the importance of computer networking.
    9·1 answer
  • How do you answer someone's question when they have asked?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!