1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
enot [183]
3 years ago
11

Dyn is a cloud-based internet performance management company that provides DNS services for internet websites. It was attacked w

ith _________ in 2016.
Computers and Technology
1 answer:
notsponge [240]3 years ago
8 0

Answer: ......

Explanation: yes

You might be interested in
What do you like to play
Ad libitum [116K]

Answer:I like to play sports

Explanation:

3 0
3 years ago
Read 2 more answers
Which of the following devices is used to connect a computer to a network
CaHeK987 [17]
Most are wireless routers, meaning converged devices that include a WAP,router<span>, and often an </span>Ethernet switch<span> in the same device.</span>
3 0
3 years ago
Which implementation has the worst time complexity?
Nata [24]

Answer:

China and Michigan hskbvd

8 0
3 years ago
Which of the following is a valid IP address that can be used on the Internet (meaning the public addressing scheme)? Group of a
VladimirAG [237]

Answer:

168.16.1.1 is correct.

Explanation:

168.16.1.1 is the legitimate Internet Protocol address that can be used on the Internet.

Internet Protocol 10.10.1.1 and internet Protocol 172.30.1.1 are the private internet protocol addresses so they could not be used on the internet.

The Internet Protocol 234.1.1.1 has been used as a multicast address so they may not be used on the Internet.

7 0
3 years ago
What is network management?
melamori03 [73]
Network management is  a broad range of  functions including activities, methods, procedures and the  use of  tools to administrate,operate,and  reliably maintain computer network system.  <span />
3 0
3 years ago
Other questions:
  • Sean is white hat hacker, who is demonstrating a network level session hijack attacks and as part of it, he has injected malicio
    6·1 answer
  • If a filesystem has a block size of 4096 bytes, this means that a file comprised of only one byte will still use 4096 bytes of s
    12·1 answer
  • You can use Facebook's live feed tool to broadcast content as you post it
    8·2 answers
  • Software that was designed to serve the needs of a specific company or organization is called:
    5·1 answer
  • Describe how communication strengthens relationship at work and, as a result, increases your productivity
    9·1 answer
  • What is adobe photoshop?
    10·2 answers
  • Favorite color should it be stored why?or why not?<br>​
    6·1 answer
  • Which subunit of a heterodimeric cdk is the regulatory subunit?
    6·1 answer
  • Which source would provide the best way to find valid information about climate change
    8·1 answer
  • Which item can be added to Outlook messages, like a Word document or PowerPoint presentation, that takes standard bulleted lists
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!