1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tresset_1 [31]
3 years ago
5

A(n) _______ attack attempts to make a server or network unavailable to serve legitimate users by flooding it with attack packet

s.
Computers and Technology
1 answer:
malfutka [58]3 years ago
3 0

Answer:

DoS or Denial of Service

Explanation:

Have a nice day! :)

You might be interested in
A network administrator has been given a network of 172.16.85.0/21 and wants to know the usable range of IP addresses on that su
viktelen [127]

Answer:

The correct answer to the following question will be option C.

172.16.80.1-172.16.87.254

Explanation:

IP Address: IP Address stands for Internet Protocol Address, a unique numerical label allotted to every computer network that are connected to the network of the computer and communicate through the internet protocol.

  • An IP address can be separated by periods and having four numbers that are called Octet. Range of IP address can be from 0 to 255.
  • We have to keep the first 21 bits and start setting all from the 22nd bit on to 0 (zero).
  • To get the suitable and the correct range of the address, we add and subtract 1 from the given broadcast address i.e.,172.16.85.0/21.

So, option C is the right answer and no other option is usable according to the given explanation and the address given by the administrator.

3 0
3 years ago
What type of software resides on a computer’s hard drive, and controls the CPU and all other activity between components?
myrzilka [38]
Operating System  (OS) is the answer.

An application runs in/on an OS.  It is not the OS itself. Like Word or Chrome are applications. 

Systems is too generic and not specific enough to mean anything in this context.  Throw away answer.

Network Operating System does not 'usually' run on a hard drive but on memory chips in things like routers, wireless access points and switches that move network traffic.


3 0
3 years ago
What kinds of circumstances would lead you to writing a function versus using a loop? please explain in simple terms
GREYUIT [131]

Answer:

1. You want to use parameters

2. You don't want your program to run multiple times

3. You want to call that snippet of code throughout your program

hope this helped :D

5 0
3 years ago
Any Body have a zoom class goin on<br> i wanna bomb
Norma-Jean [14]

This site is only for education related questions. You should only answer or ask questions. That's what we are here for. Whoever is reading this answer, please spread it to stop people from zooming, hurting others, or just posting non-related to education questions. Thank you.

6 0
2 years ago
On a web page coded in HTML, there is a sentence that reads, "Welcome to Assessments Section." Sam wants to insert the word "the
Natalka [10]

Answer:

The inserted text will appear as underlined text. The deleted text will appear as strike through text.

Explanation:

In HTML the text which has been inserted will appear as underlined text. It means if we insert something in HTML then it will underline it. This will highlight the text that has been inserted. While on the other hand if we delete some text and replace it with some other text, then it will appear as strikethrough text.

Strikethrough text is the text which is represented with a horizontal line in its center. It represents those words which are added by mistake and are not meant for inclusion.

7 0
3 years ago
Other questions:
  • Which of the following can be both an input device and an output device? mouse. keyboard. display screen. laser printer .
    9·1 answer
  • The eastern front was longer than other fronts of the war true or false
    7·2 answers
  • . Database connectivity software is also known as:
    11·1 answer
  • An Administrator wants to have a thank you email sent after the form on the "Request a Demo" landing page is submitted. Where ca
    12·1 answer
  • Jabria are you smart
    14·2 answers
  • which feature of organisations to manage needs to know about to build and use information system successfully
    6·1 answer
  • Define a new class Fighter that inherits from Spaceship. Add a variable property weapon that defaults to an empty string and a v
    14·1 answer
  • Which factors are involved in search engine optimization​
    10·1 answer
  • Write a static method reOrder56(int[] nums) that return an array that contains exactly the same numbers as the given array, but
    10·1 answer
  • A Python file that contains variables and functions and can be used in other programs is called a
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!