using numerous computers to inundate and overwhelm the network from numerous launch points is called

Answers

Answer 1

Using numerous computers to inundate and overwhelm the network from numerous launch points is called: a DDos attack


Related Questions

what is thisssssssss please answer

Answers

Answer:

first of all, are you a snake? And also that is a spotlight.

Explanation:

Imagine that your parents were starting a small business, and they wanted to upgrade their data storage. Would you recommend a fileserver, network
attached storage, or the cloud?
Why?
What are some possible disadvantages of your recommendation that they should be aware of?

Answers

Answer:

I would recommend the cloud because they can access their data on every single device. There are virtually no disadvantages to the cloud.

Explanation:

Hope this helps.

People who connect one network to another within the company or even across organizations are A. central connectors. B. boundary spanners. C. external specialists. D. peripheral specialists.

Answers

People who connect one network to another within the company or even across organizations are boundary spanners.  

People who serve as ambassadors to linking information and communications on informal networks within different department in an organisation and with other organisations or personnel  far and near for the good of their organisation are called Boundary Spanners.

The importance of Boundary  spanning in organisation includes

Exchange of expertise informationNurturing of connections with people from different part s of the world.Improved innovation in businesses

See more here: https://brainly.com/question/14728967

You can point your router to a DNS server for name resolution simply by configuring the ____ command.

Answers

You can point your router to a DNS server for name resolution simply by configuring the IP name-server command:  IP name-server.

DNS is an abbreviation for domain name system and it refers to a naming database in which internet domain names or website URLs are stored and translated into their respective internet protocol (IP) address.

Hence, a domain name system (DNS) is used to connect a uniform resource locator (URL) or a web address with its internet protocol (IP) address.

In Computer Networking, when an IP name-server command is configured on a router, it enables the user the ability or opportunity to point it to a domain name system (DNS) server for name resolution or translation into an internet protocol (IP) address.

Read more: https://brainly.com/question/17273205

Which objects appear on the slide after she clicks ok? Check all that apply.

Answers

Answer:

A table with sample values

A chart with sample values

Explanation:

Answer:

I don’t know I just need points

Explanation:

If an Intel central processing unit (CPU) has two physical processing cores but is able to make the operating system software act as if it using four processing cores, what technology is that processor using

Answers

Answer:

A Quad-core CPU

Explanation:

because it acts as if it uses four processing cores, so it will be using the Quad-core for the Central Prossesing Unit (CPU)

what was your first pokemon game


if you have not played one just comment don't answer

Answers

Answer:

FireRed & LeafGreen

Explanation:

so if it's mobile games then Pokémon go
but if it's Nintendo games then probably sword and shield cos you can catch pretty much every Pokémon.

From a data modeling point of view, _____ data refer to data whose values change over time and for which one must keep a history of the data changes.

Answers

Answer:

From a data modeling point of view, time-variant data refer to data whose values change over time and for which one must keep a history of the data changes.

pls explain the special keys on a keyboard and their functions ...eg shift key,control key​

Answers

Tab- used to advance the cursor to the next tab stop.

Shift- allows you to type capital letters and the symbols at the top of the keys

Control-  enabling other keys on the keyboard to perform secondary functions

Alt- used to change (alternate) the function of other pressed keys

CapsLock- causes all letters of bicameral scripts to be generated in capital letters.

Answer:

Multiple functions

Explanation:

If you'd like an answer to the purpose of the shift key and the control key, then I'll answer those two, specifically. Tell me if you'd like any more assistance afterwards! ( :

#1: Shift key: This key's basic function is this: when you hold down on it as well as a letter key (e.g. f ), then it will automatically make that letter uppercase.

For example, in this sentence I typed F while pressing the shift key as well:

Frederick looked out the window.

While in this one, I didn't.

frederick looked out the window.

My computer automatically tells me that the spelling of Frederick I used in the second sentence is wrong, since Frederick is proper - and is the beginning of a sentence.

#2: Control key: This key allows you to to do some pretty cool things, depending on which key you click it with.

For example, ctrl + j generates a document download page, while ctrl + d opens a bookmark page? option.

I hope this was very helpful, and let me know if you need any further assistance in the future! ( :

Write a function that will receive 5 numbers from a user (inputted one at a time-- use reassignment!) and will count then print how many of the numbers are odd.

Answers

The program is an illustration of loops.

Loops are used to perform repetitive operations

The function in Python where comments are used to explain each line is as follows:

#This defines the function

def count_odd(mylist):

   #This initializes the count variable to 0

   count = 0

   #This iterates through the list

   for i in mylist:

       #This checks if the current list element is not even

       if not i%2 == 0:

           #If yes, this increments the count variable by 1

           count+=1

   #This returns the count of odd numbers

   return(count)

Read more about similar programs at:

https://brainly.com/question/18269390

which of these is not enumerated as a motivation to create accessible web content?

Answers

Answer:

Which of what?

Explanation:

John is given a laptop for official use and is on a business trip. When he arrives at his hotel, he turns on his laptop and finds a wireless accesspoint with the name of the hotel, which he connects to for sending official communications. He may become a victim of which wireless threat

Answers

Answer:

Evil Twins Attack

Explanation:

When John connects to the wireless access point with the name of the hotel, it could be a fake SSID created by a hacker. When John connects to this "evil twin" the hacker can start to steal data.

what is the average gradient of the slope along the straight line CD

Answers

Answer:

is there a graph to go with this?

Explanation:

The average gradient of the slope along the straight-line CD is 0.05.

What is the average gradient?

The gradient of the straight line that passes through any two points on a curve is the average gradient between any two points. This is the curve's average gradient between points A and C.

The gradient between lines C and D.

Here, the horizontal distance between points C and D is 2 miles.

Difference in elevation is = 1500 -1000 = 500 ft.

Hence, the gradient is = change in vertical elevation / horizontal distance= 500/2 = 250 ft./mile

or we can take both as the same unit in feet, 1 mile is = 5280 feet. So 2 miles is = 5280 x 2 = 10560 ft.

Gradient is = 500/10560 = .05

Therefore, the graph's slope along the straight CD line has an average gradient of 0.05.

To learn more about average gradient, refer to the link:

https://brainly.com/question/29531399

#SPJ2

The question is incomplete. Your most probably complete question is given below: the graph is added.

In the design phase of the systems development life cycle (SDLC), the _____ design indicates hardware and software, such as specifying Linux servers and Windows clients. Select one:

Answers

Answer:

logical

Explanation:

What are five don’ts of using a computer

Answers

Answer:

Do not eat or drink near technology

Do not open unexpected or unknown email attachments

Do not install unknown programs

Do not forget about updating apps

Do not force anything closed

Do not get it dirty or wet

Do not wash your computer

Do not punch your computer

what is a drone satellite?​

Answers

Answer:

A satellite that can be controlled where to go.

Explanation:

The ___________ method returns the length of an array.

append

input

add

len​

Answers

Answer:

d

Explanation:

The length() method returns the number of characters present in the string.

the envelope method, notebook and pencil, and online software are all methods of ______.

Answers

Answer:

tracking your spending.

The envelope method, notebook and pencil, and online software are all methods of tracking your spending as per the given situation. The correct option is C.

What is software?

A set of instructions, data, or programs used to operate computers and carry out specific tasks is referred to as software. It is the inverse of hardware, which describes the physical characteristics of a computer.

Inner needs to track spending in personal and business activities in order to know financial status and budget effectively with available funds.

Without tracking spending, there is a risk of waste and overspending on unimportant items.

The envelop method entails putting money in different envelops for each category of spending. At the end of the period, you can check the envelops to see how much money was spent in each category.

Keeping track of expenses requires a notebook and a pencil.

QuickBooks online software can be used to track how much an individual or business has spent.

Thus, the correct option is C.

For more details regarding tracking the spend, visit:

https://brainly.com/question/14511380

#SPJ5

Your question seems incomplete, the missing options are:

estimating your unexpected expensesplanning for your futuretracking your spendingunderstanding your current expenses

Which insert image option allows a user to insert images from the internet?

Answers

Answer:

d. Online Pictures

Explanation: is correct

Answer:

online pictures

Explanation:

which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization

Answers

Answer:

Confidential Information

Explanation:

It is predicated on the idea that a person who receives information in confidence should not use or divulge that knowledge without permission. Unauthorized use or disclosure of confidential information may lead to a breach of trust suit.

Confidentiality clauses, often known as "NDA's", are intended to protect and consider important business information. Like as production processes, proprietary formulas, client lists, know-how, concepts, business strategies, and technical information.The unauthorized revelation of this type of material could reasonably be expected to harm our national security.

Therefore, the final answer is "Confidential Information".

Learn more about types of information:

brainly.com/question/13079191

URGENT We use HTML5 in lightweight web pages which load faster and put less strain on web servers.

A. True
B. False

Answers

Answer:

A. true i think?

Explanation:

im not sure but i hope it help

NEED HELP ASAP!!

Given that myGrade = 65, consider the conditional operator (myGrade<=65) ? myGrade+10: myGrade=myGrade+5. What is the value of myGrade after the conditional operator executes?

Answers

Answer:

75 is the answer and marke me as brainleast

Which career path involves working directly with computer networks?

Answers

The career path involves working directly with computer networks are analyst, network manager, and data analyst.

What are Networking?

Networking may be uncomfortable and nearly painful for a few people, however, it is something we have to all do. The truth stays that networking debts for kind of 70 percent of jobs landed via way of means of activity seekers.

Computer networking specialists are in demand, in keeping with a have a look at completed via way of means of IT Career Finder, community administrator activity is ranked in pinnacle 10 positions.

Read more about the networking :

https://brainly.com/question/1027666

#SPJ1

Answer: Computer systems administrator

Explanation:

what allows separate systems to communicate directly with each other, eliminating the need for manual entry into multiple systems?

Answers

connections, allow separate systems to communicate directly with each other, eliminating the need for manual entry into multiple systems. They do not entirely eliminate information redundancy, but they do ensure information consistency among multiple systems.

A health care provider approaches Accenture to help them increase their efficiency through an advanced data science platform.What is the first step Accenture could take?

Answers

Accelerating output and hence, growth of an enterprise is one of the core functions of Accenture. Hence, the first step to be taken by Accenture is to design an Enterprise analytic strategy assessment.

Data science leverages the power of collected data combined with simple and complex machine learning algorithm in other to draw pattern and trends from data.

Since, the healthcare provider is a large enterprise, the first step that should be followed would be to design a strategy to the assess the data available to the organization or enterprise

Hence, the first step is to develop an enterprise analytic strategy assessment.

Learn more : https://brainly.com/question/25602226

what are the 4 types of satellite?​

Answers

Communications Satellite.

Remote Sensing Satellite.

Drone Satellite.

Ground Satellite.

Which of the following developed technologies has NOT greatly increased the speed of information dissemination? A. Smartphones B. E-mail C. Typewriter D. Teleconferencing.

Answers

Answer:Email

Explanation:

Answer:

The answer would be C

Explanation:

What is the difference between Label and value in excel?

Answers

Answer:

The main difference between the label and the value is that the label is what you see within the system itself (or also on the web form if the field can be used in such a feature). ... The value, on the other hand, is what systems read as the name of a field.

Hope it help and if it its correct please give brainliest  

Stay Safe And Healthy  

Thank You

who has played pokemon red, blue, or yellow on the gameboy

Answers

Answer:

I didn't think this would be an actual question... I did- :3

I have, it gets harder near the end

more Or less?

Pick one and be rewarded!!!!!!!

Answers

Answer:

More

Explanation:

hope this is helpful

Other Questions
The rapid activation of bodily systems to cope with a stressor and restore homeostasis is part of the _____ load model. How do I convert 50 years into seconds. Express your answer in scientific notation? In the year 2010, there were 100g of a certain radioactive isotope. Now there are 70g in 2020 remaining. In what year will there be only 25 left? Read this excerpt from The Passing and answer the question.Joe Willows mother, Fannie, was a short, round woman with mottled brown skin and a high shiny forehead that wrinkled when she laughed. Jimmy Bear was her second husband, and they used to pass our house often on their way to town. They had once driven an old Dodge, but it no longer ran, and it now sat lopsided and windowless among the weeds beside their lane. Jimmy Bear was a skinny man, but he had a round, protruding belly and wore his belt under it so it looked as if he carried a basketball inside. He had gaps in his teeth and a rough, guttural laugh and walked with a shuffle.What is the author most likely trying to convey about Joe Willow through the description of his mother and stepfather? Select all that apply.His loyalty is to his mother.He is a hard worker.His fortune is on a downward swing.He comes from a humble background.His parents are unhealthy.He is due some good fortune. What state did frederickdouglas scape to after leaving meryland? Gilbert has an Excel spreadsheet open in Tableau. What did Gilbert have to do to bring the spreadsheet into Tableau? 2000 tennis balls are divided into packs of 3 how many more tennis balls are needed to make another full pack In a paragraph or two, describe how power was divided between the central government and state governments under the Articles of Confederation. Then explain one way in which this division of power weakened the country.The pictures down below also show how it will be graded on so you can know how to make it look good. Third parties have a difficult time winning for all of the following reasons EXCEPT that Multiple Choice it is more difficult for a third party candidate to get on the ballot. most Texans identify with one of the two major parties. general election candidates need a majority to win. representatives run in single-member districts. An item priced at $500 is bought on hire purchase, where $200 deposit is required, along with 12 monthly instalments of $40. How much would be saved if bought with cash? The reaction is at dynamic equilibrium. N2 + 3H2 2NH3Which statement is correct?(1 point)The solution has the same concentrations of nitrogen gas and ammonia.The solution has the same concentrations of nitrogen gas and ammonia.Nitrogen and hydrogen combine at the same rate that ammonia breaks down.Nitrogen and hydrogen combine at the same rate that ammonia breaks down.The solution has the same concentrations of nitrogen and hydrogen gases.The solution has the same concentrations of nitrogen and hydrogen gases.Both directions of the reaction have stopped.Both directions of the reaction have stopped. what specific type of tissue makes up the intervertebral discs type of number that is on top HEY yeah you the one who saw this question yeah if i give you brainly you make a question and give me some ok. Which sentence gives an opinion?A) November is the best month of the year.B) There are 26 letters in the alphabet.C) It is colder in the winter than in the summer.D) Dolphins are mammals, not fish. free 50 points and brainly for me and you 9.2 less than 3 times a number is the same as 21 1/4 Sensory perceptions that are not directly attributable to environmental stimuli are called ____. What happens to the volume of a fixed amount of gas if both the pressure and the absolute temperature are doubled 87 is 12.5% of what number? -2 1/4 x -4/5please help Which of these resources would be of greatest importance to the survival of a civilization? A) gold B) lumber C) oil D) water