1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stepladder [879]
3 years ago
14

In which type of attack does the user respond to several external communication requests? Harry wants to watch a movie online by

visiting an online movie-streaming website. However, as he clicks on the movie link, several other advertisement pop-ups appear. They slow down the streaming of the movie. Harry is a victim of a attack.
Computers and Technology
1 answer:
Shkiper50 [21]3 years ago
3 0

Answer:

They normaly do that to put a virus on your device And hack into your private info like passwords and credit cards and stuff like that

Explanation:

Always watch a movie leagly

You might be interested in
Define cyber law and cyber crime with examples.​
kifflom [539]

Answer:

Cyber crime is unlawful acts where the computer is either a tool or target or both. An example of such would be theft, fraud, forgery, etc. Cyberlaw on the other hand encompasses cybercrime.

4 0
3 years ago
Which of the following is one of the first steps in implementing a comprehensive security program? Setting up a Guest account Cr
yKpoI14uk [10]

Answer:

Setting a strong password policy

Explanation:

In implementing a comprehensive security program, one of the first steps would be to set up a strong password policy.

It is important to understand what the company is trying to protect from third parties.

Setting up a password policy is going to increase the security of the system through the use of strong passwords.

5 0
3 years ago
A rookie programmer has just typed over 1000 lines code into the command line interpreter for a project that is due the next day
Kipish [7]

Answer:

I believe the answer is ''You have to remove all code from the interpreter before closing it'.

Explanation:

3 0
3 years ago
alendar year. The current calendar is called the Gregorian calendar, was introduced in 1582. Every year divisible by four was cr
madam [21]

Answer

Tough question.

i dont know

Explanation:

4 0
3 years ago
3. Radheshree has to complete her assignment and submit it on the next day. While typing
Dafna1 [17]

Answer:

she can use the onscreen keyboard

this application is present in accessories file in the windows

5 0
3 years ago
Other questions:
  • Pam wants to include a video from a website in an upcoming presentation. However, she knows she will not have access to an inter
    15·2 answers
  • 14. The data selected to create a table must include
    12·2 answers
  • Which event most led to a reduction in the size and cost of computers? a. invention of the Bessemer converter b. development of
    8·2 answers
  • Given four inputs: a, b, c & d, where (a, b) represents a 2-bit unsigned binary number X; and (c, d) represents a 2-bit unsi
    6·1 answer
  • CIST 1122 Project 2 Instructions
    11·1 answer
  • The following are part of characteristics of a software requirement specification.
    6·1 answer
  • Amanda would like to add text to a slide in her presentation. Select all of the correct methods she can use to add text.
    6·1 answer
  • 3- It is an Information page that is displayed through one of the Internet browsers, it can be saved along htm, html page.
    11·2 answers
  • Range paramters - for loop<br> question in picture
    13·1 answer
  • Which remote access role service allows publishingweb-based applications for use by clients outside thenetwork?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!