1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ber [7]
3 years ago
12

For what purpose do the hackers create the zombies army?

Computers and Technology
1 answer:
enyata [817]3 years ago
5 0

Answer:

A. DDoS Attacks

Explanation:

A zombie, in computer terminology, is a hacker, computer worm, trojan horse, or virus compromised internet connected computer, which can be remotely directed to perform malicious tasks

E-mail spams and denial-of-service, DoS attacks are spread and launched by botnets of zombie computers

Botnets which are also known as "zombie army", are used by hackers mainly for spam and distributed-denial-of-service, DDoS, attacks

While a DoS attack involves one machine, while a DDoS attack consist of multiple computing devices and machines

A botherder is the originator of a botnet and common botnets include Mr Black. Pushdo, and cyclone

You might be interested in
_______ is the protocol suite for the current Internet.
Gala2k [10]
A? not very sure sorry
8 0
3 years ago
If you aren’t familiar with the idea of a leap year, read “Why Is There a Leap Day?” before continuing with the lab.
Zinaida [17]

The correct debugged code is attached below

<h3>What is a leap year </h3>

A leap year is a year with 366 days and this year occurs once every 4 years. The debugged code line of code of the program written, is as attached below. because the line of code in the question lacks some functions and symbols

Hence we can conclude that the correct debugged code is attached below.

Learn more about Python coding : brainly.com/question/16397886

#SPJ1

6 0
2 years ago
you are a new lenovo service provider and need to use the recovery utility information on the lenovo support website. this infor
yawa3891 [41]

Based on the above, the person that  you  should contact to request a service provider user id and password is Regional leads

<h3>Who is a Regional leads?</h3>

The stores, merchandise, and general presence of the company in a given region are managed by region leaders. They make sure the objectives are achieved. If not, they come up with plans to achieve the goals. Leaders in a region are expected to comprehend both the local economy and its historical context.

A regional lead is a manager, educator, or administrator who is in charge of finding and supporting workforce champions within organizations within their assigned region. Hence, he or she is the best person for you to contact.

Learn more about Region from

brainly.com/question/2001834
#SPJ1

8 0
2 years ago
You are installing a webcam in the screen bezel of your laptop. Prior to disassembling the laptop, what other devices in the scr
guapka [62]

Answer:

a. Microphone

d. Wi-Fi antenna

Explanation:

The wifi antenna , is present in the screen bezel , and the two cables are connected to the motherboard and the wifi adapter .

Hence , we need to be aware of the wifi antenna , before installing the webcam .

Microphone , as in most of the laptop , the microphone is present just near the screen bezel , and hence , need to be aware of before the installation process of the webcam .

7 0
3 years ago
Read 2 more answers
Andy uses a dial-up modem to connect to the Internet. He usually browses news sites, but he notices that online video takes a lo
Korvikt [17]
The answer is C. The modem does not contain enough bandwidth to handle modern video streaming.
4 0
3 years ago
Read 2 more answers
Other questions:
  • "what do you perform when you want to recall specific records from a database"
    13·1 answer
  • Which of the following can be sources of sediment? A. fragments of other rocks B. chemicals and minerals dissolved in water C. s
    11·1 answer
  • Properly defined the primary part of a CPU​
    5·1 answer
  • What are career values
    7·1 answer
  • Create a base class named rectangle that contains lenght and width data members.
    9·1 answer
  • The measure of how quickly things may be converted to something of value is called.
    10·2 answers
  • Supports traditional transactional processing for day-to-day front-office operations or systems that deal directly with the cust
    11·1 answer
  • What is the range of values that a short can represent?
    14·1 answer
  • Yo, my Lenovo laptop keeps showing this screen but I can't sign in, can someone help me?
    5·2 answers
  • Please help it’s timed
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!