using numerous computers to inundate and overwhelm the network from numerous launch points is called

Answers

Answer 1

Using numerous computers to inundate and overwhelm the network from numerous launch points is called: a DDos attack


Related Questions

WILL MARK A BRAINLIEST!!! PLS HELP!!!




Never gonna give you up
Never gonna let you down
Never gonna run around and desert you
Never gonna make you cry
Never gonna say goodbye
Never gonna tell a lie and hurt you

Answers

Answer:

We've known each other for so long

Your heart's been aching but you're too shy to say it

Inside we both know what's been going on

We know the game and we're gonna play it

And if you ask me how I'm feeling

Don't tell me you're too blind to see

The __________ algorithm takes the ciphertext and the secret key and produces the original plaintext

Answers

The answer is decryption

At the data science laboratory, the data scientists and data engineers are required to process millions of data every second to predict weather patterns and abnormalities. The data is then sent to all employees over a network, using a server.

State the type of computer system that is required for EACH of the following purposes..

Processing of scientific data ...........

Distribution of data over a network

Working from home .....

Answers

Answer:

the type of computer system that is required for processing of scientific data is : supercomputer

for distribution of data over a network :Client/server computing

working from home :A laptop

The computer that's needed for processing scientific data is the supercomputer.

The computer that is needed for the distribution of data over a network is the client or server computer while the computer that's needed for working from home is a laptop.

A supercomputer simply means a computer that has a high level of performance and has thousands of processors. The server computer provides functionality for other devices.

Learn more about computers on:

https://brainly.com/question/24540334

Convert the binary (base-2) number 1110 1001 to decimal (base-10).

Answers

Answer:

233

Explanation:

alright bro, listen. lets do some QUICK MAFFS.

from right to left.. we start from 1, and then double the number. so it would kind of look like this:

128 64 32 16  8 4 2 1

ok so whenever you are converting binary to decimal, make sure you have those numbers underneath the ones and zeroes.

[tex]1 \ \ \ \ \ 1 \ \ 1 \ \ \ 0 \ \ 1 \ 0 \ 0 \ 1\\128 \ 64 \ 32 \ 16 \ \ 8 \ 4 \ 2 \ 1[/tex]

ok so you see how the ones and zeroes are perfectly above the reference we are using?

so each one that has a one, add the number underneath it together

128 + 64 + 32 + 8 + 1

equals 233

LISTEN. STAY AWESOME GAMER!

A __________ is a thorough examination of each aspect of a network to determine how it may be compromised.

Answers

Answer:

A posture assessment. :3

John is given a laptop for official use and is on a business trip. When he arrives at his hotel, he turns on his laptop and finds a wireless accesspoint with the name of the hotel, which he connects to for sending official communications. He may become a victim of which wireless threat

Answers

Answer:

Evil Twins Attack

Explanation:

When John connects to the wireless access point with the name of the hotel, it could be a fake SSID created by a hacker. When John connects to this "evil twin" the hacker can start to steal data.

4.10.4 Inventory codehs python
i have no idea on how tp fix this, pls help:(

Answers

Answer:

between line 23 and 24, add:

    if num > 0:

(and indent the next line)

Explanation:

You want to suppress the "Now we have 0 left" message, and an additional if statement will do that for you.

In this exercise we want to use computer and python knowledge to write the code correctly, so it is necessary to add the following to the informed code:

  if num > 0:

Want to suppress the "Now we have 0 left" message, and an additional so for that is necessary to put between line 23 and 24, the code:

   if num > 0:

See more about computer at brainly.com/question/950632

You want to kill all process IDs of a specific process with a single command. Which command should you use

Answers

Answer:

killall

Explanation:

what is a collection of web pages containing text images audio and videos.​

Answers

Answer: A website..?

can you still receive messages on messenger from a person when you deleted the conversation with them? (But not blocked them)

Answers

yes cause you didn’t block them

PLEASE HELP!!! DECENT AMMOUNT OF POINTS!! DRIVERS ED


An automatic transmission is a mechanism that

A. automatically turns on your car

B. automatically turns off your car

C. selects the best gear for the situation

D. Connect your radio to air signals

Answers

Answer:

c. Selects the best gear for the situation.

Explanation:

You are designing an exciting new adventure game and you want to attempt to explain where items that are carried by the player are being kept. What inventory system should you use to this? O visual grid approach hyperspace arsenal weighted inventory pseudo-realistic​

Answers

Answer:

hYou are designing an exciting new adventure game and you want to attempt to explain where items that are carried by the player are being kept. What inventory system should you use to this? O visual grid approach hyperspace arsenal weighted inventory pseudo-realistic​

Explanation:

what is a drone satellite?​

Answers

Answer:

A satellite that can be controlled where to go.

Explanation:

When you declare a method, you also need to provide the method ______________, which consists of statements that are executed when the method is called.

Answers

When you declare a method, you also need to provide the method body, which consists of statements that are executed when the method is called.

Hope this helps!

In the 1990s, DVDs replaced audiocassettes and floppy disks as the storage media of choice for music and computers. At which stage of the product life cycle is the DVD today

Answers

Answer:

Maturity

Explanation:

7.4 Lesson Practice (projectstem): what is output if the user is enters 2?​

Answers

Answer:

18

Explanation:

lets go step by step.

the function called tryIt has a value, a variable named "a". this "a" variable will be whatever the user enters when the program says, Enter a number.

ok so if we enter "a" as 2, and b in the function will always be 7, and 2 + 7 equals 9,

and the ans variable (short for answer) will take the result of the function (9) and multiply it by 2,

then the answer is 18

What is row and column? class 9​

Answers

Answer:

just click the picture

Explanation:

plz mark me a BRAINLEST plss I just need it

What are some ethical issues related to data mining? In other words, what are some ways that companies may gather or use data that are not appropriate?

Answers

Data mining is not an easy task, as the algorithms used can get very complex and data is not always available at one place. It needs to be integrated from various heterogeneous data sources. These factors also create some issues. Here in this tutorial, we will discuss the major issues regarding −
Mining Methodology and User Interaction
Performance Issues
Diverse Data Types Issues

whats the task of one of the computers in network called?

a. hardware server
b. software server
c. Web server ​

Answers

The answer that’s gonna be followed is a:hardware server I’m sure

Answer:

C

Explanation:

I guess that's the answer

Which invention provided instant communication and information to a massive audience for the first time? a. Intranet c. Video b. Television d. Internet Please select the best answer from the choices provided A B C D.

Answers

Answer:

B. television

Explanation:

Answer:bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb

Explanation:

How to edit an existing recipient list? class 9 for(3 marks)​

Answers

Answer:

(Archives) Microsoft Word 2003: Mail Merge: Working with the Recipient List

Last updated Monday, Aug. 31, 2020, at 10:35 a.m.

This article is based on legacy software.

For a successful Mail Merge, you will need to establish a recipient list, also referred to as the data source. This contains the information that will vary with each record, such as names or identification numbers. If you are creating a mailing list, for example, names and addresses will be included in your data source.

You can either create a new data source or use a pre-existing source, such as your Outlook Contacts. You may also wish to alter the entries in your data source without having to open it, change the appropriate entries, and then save the changes. Mail Merge allows you to specify which individual entries you want to include as well as add and delete data document entries and fields.

Creating a New Data Source

Before creating the data document, take a moment to plan out the information you want to include. While creating your data document, you can add or remove fields to tailor the document to suit your needs. Creating a new data source is an option in the third step of the Mail Merge Wizard.

__________ is a procedure that allows communicating parties to verify that received or stored messages are authentic.

Answers

Answer:

Message authentication

Explanation:

On average, people spend about _____ minutes per day on apps that do not make them feel good such as apps for dating, social networking, gaming, entertainment, news, and web browsing .

Answers

Averagely, people (end users) spend about 27 minutes per day on software applications (programs) that do not make them feel good.

A software can be defined as a collection of data or set of executable instructions (codes) that is typically used to instruct a computer on how it should perform a specific task and solve a particular problem.

Basically, software applications (programs) are broadly categorized into three (3) main groups and these are;

System softwareUtility softwareApplication software

An application software is typically designed and developed for the performance of a specific task rather than the operation of a computer system.

According to an American survey, people (end users) averagely spend about 27 minutes per day on software applications (programs) that do not make them feel good such as those focused on:

Social networkingDatingEntertainmentGamingNewsWeb browsing

On the other hand, people (end users) averagely spend about 9 minutes per day on software applications (programs) that make them feel good such as those focused on:

HealthExerciseReadingRelaxationEducation

Find more information: https://brainly.com/question/14379808

PLEASE HELP! WILL MARK AS BRAINLIEST JavaScript can be implemented using the _________ HTML tags in a web page.​

Answers

Answer:

JavaScript can be implemented using JavaScript statements that are placed within the ...  HTML tag

Explanation:

Similar how CSS is applied to your HTML page, JavaScript is as well. JavaScript just needs one friend in the world of HTML—the script> element—unlike CSS, which employs link> elements to apply external stylesheets and style> elements to apply internal stylesheets to HTML. Let's find out how this operates.

What JavaScript, implemented using JavaScript statements?

Script statements in Java. JavaScript's statements are the instructions that inform the browser what to do. Semicolons are used to separate statements (;). The JavaScript code is made up of JavaScript statements, which the browser translates line by line.

The most widely used JavaScript framework right now is by far, React. Functional programming techniques are used in this basic framework to greatly simplify parallel programming and coding comprehension.

Therefore, JavaScript can be implemented using the (JavaScript statements) HTML tags in a web page.​

Learn more about JavaScript here:

https://brainly.com/question/13089689

#SPJ2

what are the 4 types of satellite?​

Answers

Communications Satellite.

Remote Sensing Satellite.

Drone Satellite.

Ground Satellite.

to center data in a cell, click the ____ button on the ribbon.

Answers

To center data in a cell, click the center  button on the ribbon.

Data in a cell can be aligned either  horizontally or vertically .

For the  horizontal alignments, we have

against the left border, against the right border, and in the centre.

For the  vertical alignments, we have

against the top border, against the bottom border, and in the middle.

To center data, the following steps should be followed.

1.Click the cell where you want to center the data.  

2. Click "Home," then the small arrow in the bottom corner of the "Alignment" area of the ribbon.

3.Click the  drop-down box next to "Horizontal" and choose "Center." Do also for the "Vertical.

Read only memory is primarily used for?

Answers

Answer:

Read-only memory is useful for storing software that is rarely changed during the life of the system, also known as firmware. Software applications (like video games) for programmable devices can be distributed as plug-in cartridges containing ROM.

Hope This Helps!!!

when trying to solve a problem, bret uses a logical, step-by-step formula called

Answers

The logical, step-by-step formula that Bret uses when trying to solve a problem is called an algorithm.

An algorithm refers to a standard formula (procedures) which comprises a set of finite steps or instructions that is typically used for solving a problem on a computer.

This ultimately implies that, an algorithm is a standard, logical formula containing the step-by-step rules for proffering a solution to a particular problem on a computer.

In this context, Bret uses a logical, step-by-step formula called an algorithm, when trying to solve a problem.

Read more on algorithm here: https://brainly.com/question/24793921

When a method in the ________ class returns a reference to a field object, it should return a reference to a copy of the field object to prevent security holes.

Answers

stop normalising the american *smart answer*

What are five don’ts of using a computer

Answers

Answer:

Do not eat or drink near technology

Do not open unexpected or unknown email attachments

Do not install unknown programs

Do not forget about updating apps

Do not force anything closed

Do not get it dirty or wet

Do not wash your computer

Do not punch your computer

Other Questions
help me pleaseeeeeeeeeeee Which of the following does the theory of symbolic interactionism focus on?a.)The social institutions and structures that dominate societyb.)The meaning people gain in society through social communicationc.)The conflict that arises within society because of economic inequalityd.)The unequal treatment of men and women within a society eugne delacroix differs from neoclassical painters in using A player with a positive attitude toward officials demonstrates which of the following? A. Respect and apprehension B. Apprehension and suspicion C. Respect and acceptance D. Acceptance and hostility Please select the best answer from the choices provided. A B C D. what do you call two guys that like math B) Which of thefollowing uses theImperfect tense?A. El ladrn estaba muy contento.B. El ladrn tom el dinero.C. El ladrn escap por la puerta. Need help with this problem A garden table and a bench cost $907 combined. The garden table costs $43 less than the bench. What is the cost of thebench? what does it mean when your pupils dilate when you look at someone Compare your results to the industry ratios and describe what NMC should do to improve its position in the market. I NEED THIS DONE TODAY, ITS VERY LATEWrite a paragraph explaining one of the values of the Latin culture. Include an example from the movie Coco that is a good example of that value and why you think it is a good example. A postpartum woman is being discharged with anticoagulant therapy for treatment of deep vein thrombosis. After teaching the woman about this therapy, the nurse determines that the teaching was successful based on which statement how would a sea-level rise of a few meters over the next few decades affect the global population "I do not feel obliged to believe that the same God who has endowed us with sense, reason, and intellect has intended us to forgo their use."Explain the quote plz help me In agranulocytes, what happens to the cytoplasm as the cell ages? Word Choice and Author's Purpose in warriors don't cryRead the excerpt from Warriors Don't Cry.As hard as I tried not to care, I couldnt start my morning without knowing what the governor, his National Guard, and the school board were up to. I had to face the awful truth. Grandma was right, I was letting those people determine how I felt, and how I lived a great part of my day.What best describes the narrators mood?inspiredmournfulbotheredsympathetic write a paragraph about the game you like the most Dr. Smith purchased a used car for $11,325. Her state charges 8% tax for the car, $53 for license plates, and $40 for a state safety and emissions inspection. How much does she need to pay for these extra charges, not including the price of the car? What is the potential energy of a 10-kg book that is placed on a shelf that is 2.5 meters high? What is 7536 to 1 significant figure