1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Morgarella [4.7K]
3 years ago
12

This is my new horrible subject lol

Computers and Technology
1 answer:
Gre4nikov [31]3 years ago
6 0
It's b...............
You might be interested in
_________ is the amount of data a storage device can move per second from the storage medium to ram.
mote1985 [20]
<span>data transfer rate..</span>
5 0
4 years ago
A DNS server on your client's network is receiving a large number of DNS queries from what appears to be a workstation on their
drek231 [11]

Answer:

The answer is reflective DNS attack

Explanation:

Reflective DNS Attack is used in many distributed DDoS attacks to knock down an internet pipe. The attack is divided in two stages: first  the attacker sends lots of requests to one  or more legitimate DNS servers  while using spoofed source IP of the target person, and then, in the second stage, the DNS server receiving the semi-legitimate requests replies to the spoofed IP, thereby unknowingly lauching an attack on the target computer with responses to requests never sent by the victim.

4 0
4 years ago
Which of the following is an example of a fixed expense clothing or rent or entertainment or food
V125BC [204]
Salutations!

<span>Which is an example of fixed expense?

Rent is an example of fixed expense, It doesn't matter whether you sell a widget or produce thousand of them, you must still pay the rent in any </span><span>circumstances.
</span>
Hope I helped.
5 0
4 years ago
An intentional action designed to prevent legitimate users from making use of a computer service is called
MatroZZZ [7]
Denial of Service Attack. If multiple machines are involved, it's a Distributed Denial of Service Attack.
4 0
4 years ago
Individual mental blocks may cause option
Bond [772]

B. negative attitude option

3 0
3 years ago
Other questions:
  • Consider the following business environment.
    14·1 answer
  • Which of the following is NOT a view which can be chosen for a presentation?
    15·1 answer
  • "the most common way to access the internet is through ________."
    5·1 answer
  • Which are characteristics of a good topic sentence?
    9·1 answer
  • Name the hardware component that performs each of the following functions (1) performs calculation and/or comparisons (2) holds
    9·1 answer
  • Which class of fire extinguisher is appropriate for a fire involving electrical/energized electrical equipment?
    13·2 answers
  • En su cuaderno o carpeta de trabajo realice la conversión del sistema de numeración binario a octal según este ejemplo de manera
    13·1 answer
  • A _____ network security application that Prevents access between a private and trusted network and other untrusted networks
    9·1 answer
  • Computer that process digital as well as analogue signals​
    11·1 answer
  • Ask the user for five-coordinate pairs. Store each pair as a tuple, and store all the pairs in a list. Print the slope between a
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!