1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexandr402 [8]
3 years ago
5

Select the correct answer.

Computers and Technology
1 answer:
sineoko [7]3 years ago
4 0
The network is under a denial of service attack
You might be interested in
Which of the instances below is an example of a Trojan horse? Question 2 options: a) An attachment in an email that is really a
sergij07 [2.7K]

Game-theif Trojans is the malware that makes a backdoor into your email account by which you are playing a game or has downloaded it and thus by this all information of user is exposed.

So option D is the answer.

Option A cannot be answer because Trojan does not use files for its purpose.

Option B cannot be a good option because Trojan works in online could.

Option C cannot be a option because Trojan does not need executable to attack your account.

3 0
3 years ago
Read 2 more answers
Which steps will create a new blank word document
mrs_skeptik [129]

Answer:

Open word

File > New

Select a template

8 0
4 years ago
Research online and identify two online plagiarism checker tools. Choose such tools that you can use for writing your schoolwork
LenaWriter [7]

This is an essay question, not fit for Brainly - please remove. There is a plagiarism checker by both Grammarly and Quetext, use those to help find your answer.

4 0
4 years ago
What is the difference between basic auth and oauth.
ratelena [41]

Answer:

Basic auth is an authentication where username and password are sent with an HTTP request unencrypted (just base64 encoded).

OAuth is a scheme whereby you perform a login at an IAM server, which gets you a token, and then you provide the token with requests to another server.

4 0
2 years ago
How did the ENIAC change computing?<br> how did the eniac change computing
WINSTONCH [101]

Answer:

It changed computing, because that was the first computer, and it was programmed by a woman

Explanation:

5 0
3 years ago
Other questions:
  • Zack is working on an assignment at school. He wants to save his work so he can take it home and complete it on his home compute
    13·1 answer
  • Gerry used html for her website. which best describes html
    15·1 answer
  • Which statement in switch case structure transfers the control flow outside the structure? switch statement break statement case
    5·2 answers
  • Data are sent through a network on bundles called _______. select one:
    8·2 answers
  • Cual es la constante de proporcionalidad de la función f(x)= 4x-6 ​
    7·1 answer
  • Write at least and explain four types of escape sequences and create an example in an IDE which consist of the mentioned escape
    7·1 answer
  • How do you<br>know which Finance system <br>is the right one for an<br>Institutions<br>​
    9·1 answer
  • I'm working on an assignment for my computer science class (Edhesive) and when I run the code, there are no errors. But when I t
    11·1 answer
  • 6. What is Microsoft office word 2010 and who developed it?​
    15·1 answer
  • The _____ constraint assigns a value to an attribute when a new row is added to a table
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!