1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lions [1.4K]
2 years ago
13

You have been trying all day to check your direct messages on social media. The site is really slow to load and sometimes you ca

n't even get to it at all. Your friends seem to be having the same problem. What could be happening? It might be getting hit with a DDoS attack. You might have malware preventing you from getting to the site. Your firewall is blocking the site. The site is undergoing upgrades and will be back soon.
Computers and Technology
1 answer:
evablogger [386]2 years ago
4 0

Answer:

It is D : It might be getting hit with a DDoS attack

Explanation:

Thank you for asking and I don't want any thanks. I just want to help. Oh and do you play Ro blocks? :D

Sry if I spelt it wrong, they censored it

Ro blox

You might be interested in
Which data validation alert style should you use to prevent the user from entering invalid data?
mario62 [17]

Answer:

stop

Explanation:

If you set the error alert style to Stop, then you are asking Excel to prevent the user from typing in an invalid value.

5 0
3 years ago
To add an animation to a slide in PowerPoint Online, what is the first step you need to complete?
velikii [3]

To add an animation to a slide in PowerPoint Online, what is the first step you need to complete is to Select the Text object.

<h3>How do you  add animations to text?</h3>

The steps are:

  • Select the object or text that is to be animated.

  • Select Animations and then choose the one that you want.

  • Select Effect Options and then choose the one you want.

Note that To add an animation to a slide in PowerPoint Online, what is the first step you need to complete is to Select the Text object as one needs to choose a slide, select an object before one can add animation.

Learn more about animation from

brainly.com/question/18260878

#SPJ1

6 0
2 years ago
At the end of the day, you finish a job only to find that the user you were doing it for had to leave. What should you do
Vika [28.1K]

The way to proceed in the situation presented would be:

  • Finish the process started to help that user and continue with the other tasks of the day.

<h3>How to serve a customer properly?</h3>

In different work positions we have the possibility of personally or virtually assisting clients by carrying out procedures to help them improve their service or experience with the company.

Companies have developed complete customer service systems so that their employees know how to proceed in different specific situations in which their customers require help.

In the situation described, the most appropriate thing would be to finish the process required by the user and continue with the other tasks of the day that were planned.

Learn more about job in: brainly.com/question/2018598

7 0
2 years ago
What are the reasons why organizations opt for a certificate
Nata [24]

Answer:

Because it helps you prove that you're you to third parties who wouldn't know otherwise. A CA helps you to establish trust with others because they're trusted for issuing valid, reliable certificates — and that trust is integral to public key infrastructure (PKI).

Explanation:

with this info I believe it is a A and C

6 0
3 years ago
A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such
finlep [7]

Answer:

A <u>rootkit</u> is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as trojans, viruses, or worms.

Explanation:

A <u>rootkit</u> is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as trojans, viruses, or worms. Where a Rootkit provides features like remote access to users, it also opens ways for attackers. It helps in hiding the malicious software. Rootkits can be installed on the victim systems by phishing attack or social engineering techniques ..

6 0
3 years ago
Other questions:
  • Data cannot be sorted of filtered accurately if there are ________.
    10·2 answers
  • To begin importing data from an excel spreadsheet, click on the ____ tab on the ribbon.
    11·1 answer
  • Ben's team is working on an English project. The members want to see everyone's progress on their part of the project. What tech
    7·2 answers
  • Understanding Sequential Statements Summary
    15·1 answer
  • What will the document.write() statement display, given the following code snippet? var scores = new Array[94, 90, 88, 82, 73, 7
    6·1 answer
  • According to the video, some workers who work for themselves, such as Actors, Musicians, or Writers, may have what sort of worke
    7·1 answer
  • The REPE prefix does which of the following ?a. Repeats an instruction while the zero flag is clearb. Repeats an instruction whi
    13·2 answers
  • Help fast plzzzzzzzzzzzz ​
    10·2 answers
  • 6. The following is a dump of a DATA chunk in hexadecimal format. 00000015 00000005 0003000A 00000000 48656C6C 6F000000 a. Is th
    7·1 answer
  • There is a surplus of scientific researchers for a vaccine. This means the demand for this career has
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!