1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
juin [17]
4 years ago
13

A particularly devastating type of dos attack is the ____ dos attack, in which multiple unsuspecting computers are used to attac

k multiple computer networks.
Computers and Technology
1 answer:
IgorLugansk [536]4 years ago
3 0
Distributed






---------------------
You might be interested in
Why are medical coders using encoded software
EastWind [94]
To keep the medical records confidential otherwise, hackers would take advantage of them and sell them to the highest bidder 
3 0
3 years ago
What is your favorite LEGO set
alekssr [168]

Answer:

star wars death star....

4 0
3 years ago
Read 2 more answers
Which teamwork characteristic motivates your team members to perform better?
scoundrel [369]
Maybe Encouragement? I don't know, are there any choices to choose from?
4 0
3 years ago
Read 2 more answers
a ____ is a feature that finds a list potential design problems associated with your document brainly.com
andrezito [222]
1. eliminating some diseases
2. improving certain species (like growing bigger apples)

8 0
3 years ago
What is it called when two or more devices connect together?.
fredd [130]

Answer:

When two or more computers are connected together so they can communicate with one another, they form a network. The largest computer network in the world in the Internet.

6 0
3 years ago
Read 2 more answers
Other questions:
  • If you were given a 3D microscope to use for photography, which object(s) would you most want to photograph?
    10·2 answers
  • Assume you have written a method with the header num mymethod(string name, string code). the method's type is
    5·1 answer
  • What can u access various sites on
    12·1 answer
  • Explain what happens if you try to open a file for reading that does not exist.
    10·1 answer
  • Write a program in C/C++ to draw the following points: (0.0,0.0), (20.0,0.0), (20.0,20.0), (0.0,20.0) and (10.0,25.0). For this
    6·1 answer
  • How tp access to all tools in ms word
    10·1 answer
  • Write the definition of a function that takes as input three numbers. The function returns true if the floor of the product of t
    11·1 answer
  • Who can give me answer for this kinda urgent pls
    13·1 answer
  • 7.4 Lesson Practice (projectstem): what is output if the user is enters 2?​
    8·1 answer
  • Many people are scared of the rise of Artificial Intelligence (AI). Do you think computers that are controlled by an AI are some
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!