1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kazeer [188]
3 years ago
14

What is denial service attack?

Computers and Technology
2 answers:
san4es73 [151]3 years ago
8 0

Answer:

this is a cyber attack perpretator seeks to make a machine or a network resorce

Explanation:

Korolek [52]3 years ago
3 0

Answer:

a denial-of-service attack is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet

You might be interested in
Damage to which portion of the limbic system results in loss of memory of recent events and difficulty committing anything new t
Vera_Pavlovna [14]

Answer:

Hippocampus.

Explanation:

There are two parts of the limbic system. They are the frontal part which is the amygdala and the posterior part which is the hippocampus.

The hippocampus is an extension of the temporal part  of the cerebral cortex which is a plastic-like structure that can be easily damaged by stimuli. It is packed with densed neurons and forms an S-shape at the extension of the temporal part.

It is responsible for learning and memory and damage to it can result to memory loss of recently learnt information.

8 0
3 years ago
What area contains the command used to customize the print options in microsoft excel?
Nezavi [6.7K]
The answer is Page Layout Ribbon.  The <span>area contains the command used to customize the print options in microsoft excel is Page Layout Ribbon.</span>
4 0
4 years ago
Networking device converts analog signals to digital ones?
iren2701 [21]

Solution:

An analog-to-digital converter, or ADC as it is more commonly called, is a device that converts analog signals into digital signals. Analog information is transmitted by modulating a continuous transmission signal by amplifying a signal's strength or varying its frequency to add or take away data.

This is the required answer.

5 0
3 years ago
In the following four questions, we are sending a 30 Mbit MP3 file from a source host to a destination host. All links in the pa
pantera1 [17]

Answer:

1)we are sending a 30 Mbit MP3 file from a source host to a destination host. All links in the path between source and destination have a transmission rate of 10 Mbps. Assume that the propagation speed is 2 * 108 meters/sec, and the distance between source and destination is 10,000 km. Initially suppose there is only one link between source and destination. Also suppose that the entire MP3 file is sent as one packet. The TRANSMISSION DELAY is:

3 Seconds

2)

we are sending a 30 Mbit MP3 file from a source host to a destination host. All links in the path between source and destination have a transmission rate of 10 Mbps. Assume that the propagation speed is 2 * 108 meters/sec, and the distance between source and destination is 10,000 km. The END TO END DELAY(transmission delay plus propagation delay) is

3.05 seconds

3)

we are sending a 30 Mbit MP3 file from a source host to a destination host. All links in the path between source and destination have a transmission rate of 10 Mbps. Assume that the propagation speed is 2 * 108 meters/sec, and the distance between source and destination is 10,000 km. how many bits will the source have transmitted when the first bit arrives at the destination.

500,000 bits

4)

we are sending a 30 Mbit MP3 file from a source host to a destination host. All links in the path between source and destination have a transmission rate of 10 Mbps. Assume that the propagation speed is 2 * 108 meters/sec, and the distance between source and destination is 10,000 km. Now suppose there are two links between source and destination, with one router connecting the two links. Each link is 5,000 km long. Again suppose the MP3 file is sent as one packet. Suppose there is no congestion, so that the packet is transmitted onto the second link as soon as the router receives the entire packet. The end-to-end delay is

6.1 seconds

5)

we are sending a 30 Mbit MP3 file from a source host to a destination host. All links in the path between source and destination have a transmission rate of 10 Mbps. Assume that the propagation speed is 2 * 108 meters/sec, and the distance between source and destination is 10,000 km. Now suppose that the MP3 file is broken into 3 packets, each of 10 Mbits. Ignore headers that may be added to these packets. Also ignore router processing delays. Assuming store and forward packet switching at the router, the total delay is

4.05 seconds

6)

we are sending a 30 Mbit MP3 file from a source host to a destination host. All links in the path between source and destination have a transmission rate of 10 Mbps. Assume that the propagation speed is 2 * 108 meters/sec, and the distance between source and destination is 10,000 km. Now suppose there is only one link between source and destination, and there are 10 TDM channels in the link. The MP3 file is sent over one of the channels. The end-to-end delay is

30.05 seconds

7)

we are sending a 30 Mbit MP3 file from a source host to a destination host. All links in the path between source and destination have a transmission rate of 10 Mbps. Assume that the propagation speed is 2 * 108 meters/sec, and the distance between source and destination is 10,000 km. Now suppose there is only one link between source and destination, and there are 10 FDM channels in the link. The MP3 file is sent over one of the channels. The end-to-end delay is

30.05 seconds

6 0
3 years ago
A(n) is a place on a computer where you attach a device to exchange data with the computer
natta225 [31]
I think a peripheral device can attach to a computer so that data can be exchanged between it and the operating system.
3 0
3 years ago
Other questions:
  • 3) According to the five-component model of information systems, the ________ component functions as instructions for the people
    8·1 answer
  • If you feel that an OSHA inspection is needed to get hazards corrected at your workplace, which is your best option?
    7·1 answer
  • Which of the following terms describes a type of useful and legitimate software that is distributed by a developer where they do
    10·1 answer
  • A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed
    8·1 answer
  • Which of the following is true about strings?
    15·1 answer
  • Prove that the dual of the exclusive-OR gate is also itscomplement
    10·1 answer
  • Technician A says that volatility describes how hard it is for gasoline to evaporate. Technician B says that Reid vapor pressure
    8·1 answer
  • When using the Photo Album dialog box, a picture
    13·2 answers
  • Select the correct answer..
    6·1 answer
  • Which of the following tabs on the Ribbon contains the commands for adding tables, pictures and shapes into a publication? Quest
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!