1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zlopas [31]
3 years ago
8

Describe s computer network that you are familiar with ?

Computers and Technology
1 answer:
lbvjy [14]3 years ago
8 0

Answer:

A computer network, also referred to as a data network, is a series of interconnected nodes that can transmit, receive and exchange data, voice and video traffic.

You might be interested in
Which type of attack broadcasts a network request to multiple computers but changes the address from which the request came to t
aivan3 [116]

Answer:

Smurf attack

Explanation:

In smurf attack is an attack of DDoS type, i.e., Distributed Denial of Service where a network request is broadcast to multiple systems but return IP address of the system sending the request is forged with the victim's IP address.

It is that type of DDoS attack where the Victim's system is flooded with spoofed ping packets. It left the system inoperable and is done by exploiting the Internet Control Message Protocol and IP of the system which is dangerous for both the sending end system and the victim's system.

8 0
3 years ago
You want to search for contacts in your email program. You enter the person’s first name and last name in the search box. You wa
ryzh [129]

Answer:

NOR

Explanation:

6 0
3 years ago
Read 2 more answers
When both gears are the same size what will they produce
djverab [1.8K]

They produce a 1:1 ratio.  The input power is equal to the output power.

7 0
4 years ago
Which file extension takes less storage space?
anyanavicka [17]

I believe the answer would be the JPEG file extension.

4 0
3 years ago
Read 2 more answers
A___________is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its
Molodets [167]

Answer: rootkit

Explanation:

Hi, A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software.

A rootkit provides continued privileged access to a computer while hiding its presence. Because of this hiding characteristic it is very difficult to detect.

Once a rootkit has been installed, it allows someone to have total remote control of a computer and do things such as files executions and system changes.

4 0
3 years ago
Other questions:
  • What does the security element of non-repudiation mean in e-commerce cybersecurity? A. Data needs to be available at all times.
    10·1 answer
  • A graphic design student is putting the finishing touches on her PowerPoint presentation for her speech. She is carefully analyz
    12·1 answer
  • Suppose a computer has 16-bit instructions. The instruction set consists of 32 different operations. All instructions have an op
    7·1 answer
  • Why is ipsec considered to be a transparent security protocol?
    6·1 answer
  • Classify the following skills: preparing a presentation, rebuilding a car, and solving equations.
    11·2 answers
  • _____ was just a sophomore when he began building computers in his dorm room at the University of Texas. His firm would one day
    14·1 answer
  • What is the purpose of the 5 Whys Strategy? How could you use the 5 Whys strategy in your day-to-day life? (Site 2)
    5·1 answer
  • Everyone say bye to brainly cause I’m reporting it for being against the law
    10·2 answers
  • PLEASE HELP ASAP what is the main purpose of electronic speed controller ESC
    9·2 answers
  • Question 3 of 10
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!