1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stepladder [879]
3 years ago
14

In which type of attack does the user respond to several external communication requests? Harry wants to watch a movie online by

visiting an online movie-streaming website. However, as he clicks on the movie link, several other advertisement pop-ups appear. They slow down the streaming of the movie. Harry is a victim of a attack.
Computers and Technology
1 answer:
Shkiper50 [21]3 years ago
3 0

Answer:

They normaly do that to put a virus on your device And hack into your private info like passwords and credit cards and stuff like that

Explanation:

Always watch a movie leagly

You might be interested in
Where should your two index fingers be when your fingers are rest.
PSYCHO15rus [73]

Answer: B : F and J

Explanation: Allows you to type without looking at keys and makes all the keys easily accessible

5 0
2 years ago
When you store files "in the cloud", you are __________.<br><br> I kinda need the answer now
Angelina_Jolie [31]
Putting them online? what are the answers to choose from?
7 0
3 years ago
Way to minimize technical problems with your computer
Mama L [17]
Fix problems before they get bad, for example: the protection needs attention don't wait tell it is compromised, fix it then. Do a quick scan to make sure your files are clean and there are no viruses.
8 0
3 years ago
Answer pleaseeeeeeeeeee!
77julia77 [94]

Answer:

A=hbb

2=4·3

2=6

area=6

8 0
2 years ago
Read 2 more answers
What variation of a dictionary attack involves a dictionary attack combined with a brute force attack, and will slightly alter d
allochka39001 [22]

Answer:

hybrid

Explanation:

A hybrid attack is a blend of both a dictionary attack method as well as brute force attack. This means that while a dictionary attack method would include a wordlist of passwords, the brute-force attack would be applied to each possible password in that list.

7 0
3 years ago
Other questions:
  • Which of the following would be a tradeoff of a scientific advancement that enables us to catch fish from the ocean faster than
    5·1 answer
  • Which of the following types of network can only be accessed by members within a private organization?
    5·1 answer
  • a password to a certain database consists of digits that cannot be repeated. if the password is known to consist of at least 8 d
    14·1 answer
  • Technology has proliferated in Kenya and Somaliland, with text messages used to replace cash, creating mobile money use that, on
    11·1 answer
  • What are the most common types of cables in a network?
    6·1 answer
  • All mla text is double spaced. true false
    13·2 answers
  • 1. What makes discrimination different from harassment? (Don't give me definitions.)
    5·1 answer
  • When writing code, how can printing be useful?
    15·1 answer
  • Define a function compute_gas_volume that returns the volume of a gas given parameters pressure, temperature, and moles. Use
    12·1 answer
  • Algunos de los navegadores que existen son:
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!