1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GrogVix [38]
3 years ago
7

In what kind of attack can attackers make use of hundreds of thousands of computers under their control in an attack against a s

ingle server or network?
Computers and Technology
2 answers:
gregori [183]3 years ago
8 0

Answer: DDoS

Explanation:

A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt the normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic.

DDoS attacks achieve effectiveness by utilizing multiple compromised computer systems as sources of attack traffic.

Allisa [31]3 years ago
5 0

Answer:

distributed denial of service

Explanation:

You might be interested in
What is cell address?​
Nat2105 [25]

Answer:

A cell reference, or cell address, is an alphanumeric value used to identify a specific cell in a spreadsheet. Each cell address contains “one or more letters” followed by a number. The letter or letters identify the column and the number represents the row.

Explanation:

3 0
3 years ago
This is for the folks that is rude:
S_A_V [24]
This isn’t twitter but anyways the answer is 29
8 0
4 years ago
Which element of presentation software can you use to add callouts and banners?
Harrizon [31]
<span><span>1.)From the Insert tab, select the Shapes command. A drop-down menu will appear.
</span><span>2.)Select the desired shape
3.)</span></span>Click and drag<span> the slide to create the shape. You may need to move or resize the shape so it points to the desired part of the image.
4.)</span><span>f you want your callout to contain text, start typing while the shape is selected.
5.)</span><span>From the </span>Format<span> tab, you can use the options in the </span>Shape Styles<span> group to customize the appearance of the shape. You can also adjust the font from the Home tab</span>
7 0
3 years ago
Read 2 more answers
Which ergonomic principle helps to maintain good posture?
Sophie [7]

Answer:

D. keep your hand and forearm in the same plane

Explanation:

The ergonomic principle explains how to maintain a good posture. And if hands and forearms are in the same plane then you will do least work, and hence not loss more energy, which you can lose if your elbows are close together while typing or your hand and forearm is not in the same plane, or your hands are crossed, or your neck is non aligned to your spines. And if you want to work more efficiently in your office, then you should study ergonomic principles certainly.

5 0
3 years ago
Read 2 more answers
Circular error are caused by adding the cell name of a/an cell to aformula
ivanzaharov [21]
If you mean a "circular reference error" then you are correct. This error is caused by a formula in a cell that directly or indirectly refers to its own cell. For example, if you place a formula in cell A3 and your formula reads "=A1+A2+A3" you will receive a circular reference warning because the formula contains a reference to the cell that it is in (A3)
6 0
3 years ago
Other questions:
  • You have been tracking your exercise routine, which involves running, lifting weights, yoga, and stretching. You want to see wha
    15·2 answers
  • A suspension system that allows one wheel to move up and down with minimal effect on the opposite wheel is called what? A. Stabi
    14·2 answers
  • The speed of a cpu is expressed in cycles called ________.
    14·1 answer
  • Eric walks 7 km East in 2 hours and then 2.5 km West in 1 hour.
    13·1 answer
  • ANSWER THIS CORRECTLY FOR BRAINLIEST
    13·2 answers
  • What type of photography is represented by a photograph of a dog on a beach ?
    11·1 answer
  • Wendy had been searching the internet for a great deal on jewelry. While looking at one site, a pop-up was displayed that told h
    11·1 answer
  • Windows 8 has a built-in antivirus program called
    10·1 answer
  • Describe the features of agile modeling​
    5·1 answer
  • What are the two extra registers that the fetch decode execute cycle uses to communicate with memory outside of the chip?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!