1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nadezda [96]
3 years ago
9

Add me on f0rtnite (Tsarbacon)

Computers and Technology
2 answers:
ser-zykov [4K]3 years ago
8 0

Answer:

sure no problem

Explanation:

sure no problem

Ludmilka [50]3 years ago
6 0

Answer:

i will

Explanation:

You might be interested in
In order to implement the classic DoS flood attack, the attacker must generate a sufficiently large volume of packets to exceed
gavmur [86]

Answer:

131 packets

Explanation:

Given

W (link ) =0.5 M bits,  and Ping packets ( P ) = 500bytes

To flood a target organization that has a bandwidth of W bits using a packet Mbits, you will require a W / P packet

P ( required ) = 500  * 8 = 4000 bits

therefore the W /P packet is calculated as

= 0.5 M bits / 4000 bits

given that :  1 M bits =  1,048,576 bits

0.5 M bits / 4000 bits=  131.07  

hence approximately 131 packets/ sec is required to flood the target organization

4 0
3 years ago
With a C program (memory map), data in _____ is initialized by the kernel to arithmetic 0 or null pointers before the program st
jolli1 [7]

Answer:

The answer is "  Uninitialized data segment ".

Explanation:

It (memory map) field whenever a C program is locked to run, the kernels must allocate information into 0 or null pointer in this section until the process runs. This variable, that is outside of any function, has been stored in uninitialized data item by the C statement (like, "long amount[1000];").  

If we did not declare the data segment, it also called bss, in which all block which begins with the symbol and is called for an old assembly language operator.

3 0
4 years ago
Robert is working on an image as part of his school project. he has to do multiple edits on the file. what is a good practice fo
kenny6666 [7]
D, save the file in multiple formats at the beginning
8 0
3 years ago
Which web design concept is most closely related to elements that symbolize the real world? A. node B. landmark c.metaphor IN D.
sergij07 [2.7K]

Answer:

landmark

Explanation:

6 0
3 years ago
The file extensions .webm, .m4v, and .ogv are used for:
Angelina_Jolie [31]
Audio and video files
5 0
3 years ago
Other questions:
  • What company handles security for a lot of the e-commerce on the internet and also maintains two root name server clusters?
    8·1 answer
  • Which modem settings should be configured on DSL or cable modems?
    14·1 answer
  • What is the core of an operating system that manages memory and devices, maintains the computer’s clock, starts programs, and as
    7·1 answer
  • Which best describes a computer bug? A piece of computer hardware that is out of date or has a newer version a piece of computer
    14·2 answers
  • Describe the concepts of Defense in Depth and Detection in Depth. Compare and contrast. What's different? What's similar?
    9·1 answer
  • What does “default” refer to? the ability to be used as, or directly converted to, cash. the failure to pay back a loan. the amo
    8·1 answer
  • Given the number of every players of two cricket team to find the winner team and find total half-century,in C program
    14·1 answer
  • PLEASE HELP I WILL GIVE BRAINLIEST!!
    8·1 answer
  • What are different between system and application software?​
    14·1 answer
  • Hello can someone help with the output of this please?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!