A(n) ____________________ attack is an assault on a network that floods it with so many additional requests that regular traffic is either slowed or completely interrupted.

Answers

Answer 1

Answer:

Denial of Server or DoS

Explanation:

Have a nice day! :)


Related Questions

Which game is better? Among us or ROBLOX -

Answers

Answer:

Both are equally good, but Roblox is better for kids

Explanation:

This is because when you are imposter and kill someone it shows a bone and there is a bit of blood!

Answer:

Gud question...

Explanation:

Among us is violent

Roblox is good for kids

so 50 50

Why won't my brainly account level up?

Answers

Well, you need to have 5 brainiest answers plus 500 points. So, in order to level up in brainly you need 500 plus 5 brainiest.

What is brainly?

Brainly is a Polish company with headquarters in New York City. It is a social learning platform where millions of students and teachers work together to solve academic problems. The mission of Brainly is to encourage students to share and explore knowledge in a collaborative environment.

It can also be used to ask and answer homework questions by students, parents, and teachers. The platform includes n elements such as points and ranks. It encourages users to participate in the online community by answering questions posted by other users. Brainly reported 350 million monthly users as of November 2020, making it the most popular education app in the world.

Learn more about level up

https://brainly.com/question/7853380

#SPJ1

Answer:

This is because to level up, you need a certain number of points and brainliest answers! To get this you can always keep answering questions to get your points up and whenever you complete an answer which is superior than any other, the user may choose to give you brainliest!

Hope this helps, have a lovely day! :)

Which of the following is NOT true about variables?
The value stored by a variable can be changed after it is assigned.
Variables are a name for a spot in the computer's memory.
Variable names can be words: such as temperature or height.
The value stored by a variable cannot be changed after it is assigned.

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The value stored by a variable can be changed after it is assigned(true).

The value of a variable can be changed after it is assigned, for example:

int a=10;

and we can change the value of variable a in letter program such as:

a=15;

Variables are a name for a spot in the computer's memory (true).

it is true, because the variables value stored in the computer's memory and we can access theses values by their name (variable name). so Variables are a name for a spot in the computer's memory.

Variable names can be words: such as temperature or height (true).

Yes, the variable name can be words such as height, width, temperature etc.

The value stored by a variable cannot be changed after it is assigned (false).

It is noted that the value stored by a variable can be changed after it is assigned. However, it is noted that is some programming language, you can't change the value of static variable.

It should be noted that statement that is not true about variables is D:The value stored by a variable cannot be changed after it is assigned.

Variables can be regarded as the names that us been given to computer memory locations, and this is been utilized in storing values in a computer program.

However, it is possible to change the value that is been stored by a variable, Variables can be temperature or height of a system.

We can conclude that value that is been stored by variable can be changed.

Learn more about variables at:

https://brainly.com/question/11388301

Searching a database for a particular record requires an extension.
O True
O False

Answers

Answer:

False

Explanation:

I think it is right, I am not good with a lot of stuff

Answer:

Its True I got it right on ED

Explanation:

When working on electronic devices, what should you use to dissipate any static charge that might damage electronic chips

Answers

Anti-static bracelet/wristband
You put the bracelet on
The clip attached to something that’s very large and metal so that you are “grounded”
This is commonly used by PC builders
When working on electronic devices, what should you use to dissipate any static charge that might damage

Write a function named find_tuple() that takes two_nums as the input, find the tuple with the smallest difference between the 2 elements, and returns it as the function output!

Answers

To create a function named find_tuple() that takes two_nums as the input, find the tuple with the smallest difference between the 2 elements, and returns it as the function output, follow the steps below.

Step 1: Write a function definitionOpen your Python IDLE and create a function definition named find_tuple() by writing the code below:def find_tuple(two_nums): # your code here.

Step 2: Check the length of the input parameterNext, check if the length of the two_nums list is greater than or equal to 2. If it is less than 2, return an empty list. You can use the code below to achieve this:if len(two_nums) < 2: return [].

Step 3: Sort the list of tuples in ascending order of the second elementNext, sort the list of tuples in ascending order of the second element. You can use the sorted() function in Python to achieve this. The code below should help:two_nums = sorted(two_nums, key=lambda x: x[1]).

Step 4: Find the smallest difference between the 2 elements of the tuples.

Now, iterate through the sorted list of tuples, calculate the difference between the second and first elements of each tuple and return the tuple with the smallest difference.

You can use the code below:diff = float("inf") for i in range(len(two_nums) - 1): if two_nums[i + 1][1] - two_nums[i][1] < diff: diff = two_nums[i + 1][1] - two_nums[i][1] result = [two_nums[i], two_nums[i + 1]]return result # your code hereStep 5: Return an empty list if the difference between the 2 elements of the smallest tuple is greater than or equal to 100,'Finally, if the difference between the 2 elements of the smallest tuple is greater than or equal to 100, return an empty list. You can use the code below to achieve this:if diff >= 100: return []

To create a function named find_tuple() that takes two_nums as the input, find the tuple with the smallest difference between the 2 elements, and returns it as the function output, follow these steps:First, create a function definition named find_tuple(). In the function definition, you should take two_nums as an input parameter. Next, check if the length of two_nums is greater than or equal to 2.

If the length of the two_nums list is less than 2, return an empty list.Sort the list of tuples in ascending order of the second element. You can use the sorted() function in Python to achieve this. Now, iterate through the sorted list of tuples, calculate the difference between the second and first elements of each tuple and return the tuple with the smallest difference.Finally, if the difference between the 2 elements of the smallest tuple is greater than or equal to 100, return an empty list.

A function named find_tuple() was created to take two_nums as the input and find the tuple with the smallest difference between the 2 elements, and return it as the function output.

This function checked if the length of the two_nums list is greater than or equal to 2, sorted the list of tuples in ascending order of the second element, and found the tuple with the smallest difference. If the difference between the 2 elements of the smallest tuple is greater than or equal to 100, it returned an empty list.

To know more about Python  :

brainly.com/question/30391554

#SPJ11

What is the purpose of an attribute in HTML?
A.
It is a property that changes the default behavior of an element.
B.
It is an empty element.
C.
It consists of a start tag and an end tag.
D.
It is a tag without angular brackets.

It is not C.

Answers

A. It is a property that changes the default behavior of an element.

the report style you select does not control the overall formatting of your report is it true ? word

Answers

Question is that it is true that the report style you select in Microsoft Word does not control the overall formatting of your report.

When you select a report style in Word, it primarily affects the formatting of headings, titles, and subheadings within your report. However, the overall formatting, such as page margins, font styles, and line spacing, is controlled by the document's default settings or the formatting you manually apply.

So, even if you choose a different report style, it won't automatically change the overall formatting of your report. You would need to adjust the formatting settings or manually apply formatting changes to achieve the desired overall appearance of your report.

To know more about microsoft visit:

https://brainly.com/question/33891422

#SPJ11

write a cashregister class that can be used with the retail item class you modified in programming challenge 7

Answers

A CashRegister class can be created to work with the modified RetailItem class from Programming Challenge 7.

The CashRegister class is designed to handle the functionality related to managing the purchase of items and calculating the total cost. It can be used in conjunction with the modified RetailItem class, which contains information about individual items such as their description, price, and quantity.

The CashRegister class would typically include methods for adding items to the purchase, updating the number of items, calculating the subtotal, applying discounts or taxes if needed, and providing the final total cost of the purchase. It would interact with the RetailItem class objects to access the relevant item information for these calculations.

By separating the responsibilities of managing the purchase and the individual items, the CashRegister class provides a modular and organized approach to handling retail transactions. It allows for easy integration with the modified RetailItem class, providing a comprehensive solution for retail point-of-sale systems.

Learn more about CashRegister here:

https://brainly.com/question/23552083

#SPJ11

Which web source citations are formatted according to MLA guidelines? Check all that apply.
“Nelson Mandela, Anti-Apartheid Icon and Father of Modern South Africa, Dies.” Karimi, Faith. CNN. Turner Broadcasting. 5 Dec. 2013. Web. 1 Mar. 2014.
“Nelson Mandela Biography.” Bio.com. A&E Television Networks, n.d. Web. 28 Feb. 2014.
Hallengren, Anders. “Nelson Mandela and the Rainbow of Culture.” Nobel Prize. Nobel Media, n.d. Web. 1 Mar. 2014.
“Nelson Mandela, Champion of Freedom.” History. The History Channel. Web. 1 Mar. 2014.
“The Long Walk is Over.” The Economist. The Economist Newspaper, 5 Dec. 2013. Web. 1 Mar. 2014.

Answers

The citation that is formatted according to MLA guidelines is:
“Nelson Mandela, Anti-Apartheid Icon and Father of Modern South Africa, Dies.” Karimi, Faith. CNN. Turner Broadcasting. 5 Dec. 2013. Web. 1 Mar. 2014.

What is Apartheid?
Apartheid was a system of institutional racial segregation and discrimination that was implemented in South Africa from 1948 to the early 1990s. It was a policy of the government that aimed to maintain white minority rule and power by segregating people of different races, and denying non-whites their basic rights and freedoms.

This citation follows the basic MLA format for citing a web source. It includes the following elements:

Author's name: Karimi, Faith.Title of the article: "Nelson Mandela, Anti-Apartheid Icon and Father of Modern South Africa, Dies."Name of the website: CNN.Name of the publisher: Turner Broadcasting.Date of publication: 5 Dec. 2013.Medium of publication: Web.Date of access: 1 Mar. 2014.

None of the other citations are formatted according to MLA guidelines because they either have missing or incorrect elements. For example, the citation for "Nelson Mandela Biography" does not include the date of publication, and the citation for "Nelson Mandela and the Rainbow of Culture" does not include the name of the publisher. The citation for "Nelson Mandela, Champion of Freedom" does not include the date of publication or the name of the publisher. The citation for "The Long Walk is Over" includes the date of publication, but it does not include the name of the publisher, and the title is not italicized.

To know more about citation visit:
https://brainly.com/question/29885383
#SPJ1


Stephen is slowing down as he approaches a red light. He is looking in his mirror to switch lanes and misjudges how close Keisha's car is, rear-ending her car. When
they get out and assess the damage, Keisha's bumper will need to be replaced. What type(s) of insurance could Stephen use to cover this accident? Explain.
Krisha had some discomfort in her neck at the time of the accident but thought it was minor and would go away. A week or so after the accident, Keisha finally goes
What t) of insurance could Keisha use to cover this accident?

Answers

The type of insurance that Stephen could use to cover this accident is known as liability coverage

What t) of insurance could Keisha use to cover this accident?

The insurance that Keisha could use to cover this accident is personal injury protection.

In the case above, The type of insurance that Stephen could use to cover this accident is known as liability coverage as damage was one to his property.

Learn more about Property Damage from

https://brainly.com/question/27587802

#SPJ1

Configure Static Routes
Your branch office is connected to the main office and the internet through the SFO router. Both serial interfaces connecting the SFO router to the main office and the internet have been configured and are up. You need to configure static routes on the SFO router for each destination. Use the next hop address when assigning the static routes. Your ISP's address is 160.12.99.1. Use the show cdp neighbors detail command to discover the next hop address for the 10.0.0.0 network.
In this lab, your task is to:
Configure a static route to 10.0.0.0/8 network.
Configure a default route to the internet.
Save your changes to the startup-config file.

Answers

To configure a static route to the 10.0.0.0/8 network, and to configure a default route to the internet, and then save changes to the startup-config file, follow these steps:

Step 1: First, log in to the router and go to configuration mode by typing "configure terminal".

Step 2: Next, configure a static route to the 10.0.0.0/8 network by typing the following command: ip route 10.0.0.0 255.0.0.0 [next hop address]The next hop address can be found by using the show cdp neighbors detail command.

Step 3: Then, configure a default route to the internet by typing the following command: ip route 0.0.0.0 0.0.0.0 160.12.99.1. This command will forward all packets that do not match any of the existing routes to the next hop address 160.12.99.1, which is the ISP's address.

Step 4: Finally, save your changes to the startup-config file by typing the following command: copy running-config startup-config. This will save the current configuration as the startup-config file. The router will use this file when it boots up or if the configuration is reset.

Static routes are the most common type of routing used on small to medium-sized networks. A static route is a route that is manually configured by a network administrator, as opposed to one that is learned dynamically through a routing protocol. Static routes are typically used to specify a gateway of last resort or to route traffic to a specific destination.

Learn more about Static routes:

https://brainly.com/question/6783973

#SPJ11

what is the main purpose of pseudocode?


A. to debug a program

B. to help the programmer create error-free code

C. to test a program

D. to plan a program

Answers

Answer:

i think correct ans is a) to debug a program


Avi does not want to save his internet browsing details on his computer. What should he do?
Avi should (copy,delete,or save) all the(virus,cookies,or logs) from his system after he has finished browsing.

Avi does not want to save his internet browsing details on his computer. What should he do?Avi should

Answers

He should delete logs.

A camera detector has an array of 4096 by 2048 pixels and uses a colour depth of 16.
Calculate the size of an image taken by this camera; give your answer in MiB.

Answers

The size of an image taken by this camera is approximately 16 MiB.

How to calculate the size of an image?

To calculate the size of the image taken by the camera, we need to know the total number of bits in the image.

The number of pixels in the image is:

4096 pixels × 2048 pixels = 8,388,608 pixels

The colour depth is 16, which means that each pixel can be represented by 16 bits. Therefore, the total number of bits in the image is:

8,388,608 pixels × 16 bits per pixel = 134,217,728 bits

To convert bits to mebibytes (MiB), we divide by 8 and then by 1,048,576:

134,217,728 bits ÷ 8 bits per byte ÷ 1,048,576 bytes per MiB = 16 MiB (rounded to two decimal places)

Learn more about cameras at:

https://brainly.com/question/26320121

#SPJ1

A ________ offers regular podcasts on a consistent theme, designed for a public audience.
A) hashtag
B) retweet
C) podcasting channel
D) programming network
E) microblog

Answers

A podcasting channel (option C) offers regular podcasts on a consistent theme, designed for a public audience.A podcasting channel is a platform that hosts and distributes podcasts on a particular topic or theme, such as news, entertainment, sports, or education.

It typically features a series of episodes that are released on a regular schedule, such as daily, weekly, or monthly, and can be accessed and downloaded by listeners through various podcast apps or streaming services.Hashtags (option A) and retweets (option B) are features of social media platforms such as and are not directly related to podcasting. A programming network (option D) is a broader term that refers to a collection of TV or radio programs that are produced and broadcast by a network. A microblog (option E) is a platform that allows users to post short updates or messages.

To learn more about channel click the link below:

brainly.com/question/21592244

#SPJ11

Which securities protects networks from intruders? *

Application security
Network security
Information security
Operational security

Answers

Answer:

I think it is network security

Explanation:

Heard in an ad before :T

Answer:

Use Kika Clipboard to make paste easypneumonoultramicroscopicsilicovolcanoconiosis

Saujani describes that women are highly underrepresented in STEM careersShe attributes this to women needing more confidence. What study does she describe to back up this idea of women needing more confidence ?

Answers

Answer:

have a nice day! ❤❤

Explanation:

5. Question
Which one of these can connect directly to the Internet?

Answers

Answer: Clients

Explanation:

A Client refers to a computer that is able to connect to a server usually in a network in order to access the services provided by that server.

When a user tries to access the internet, the Client accesses the relevant server and requests the information that the user is requesting. The server then sends this to the client which then formats it in the way that the user can understand. The client is thus the direct connection to the internet.

This question is incomplete because it is lacking the necessary answer options, which I have provided below:

A. Servers.

B. Packets.

C. Internet users.

D. Clients.

So, given your question, the answer option which can connect directly to the Internet is: A. Servers.

A server refers to a specialized computer system that is designed and configured to provide specific remote services for its end users (clients), especially on a request basis.

In Computer and Technology, there are different types of server and these includes:

Print server.File server.Proxy server.Database server.Application server.Virtual server. Web server.

Basically, a server is typically designed and developed to connect directly to the Internet through the use of an intermediary network device such as a router or switch and a wired or wireless network connection.

Read more: https://brainly.com/question/21078428

Infra-Red transmitter and receiver use what type of data transmission? a. spread spectrum b. analog c. binary d. None of the above

Answers

Binary data transmission refers to the use of two distinct signals or states to represent data. In the case of infra-red (IR) transmission, the transmitter emits light in the infrared portion of the electromagnetic spectrum, which is not visible to the human eye. This light is either turned on or off rapidly, creating a binary signal.

The receiver detects this binary signal and translates it back into the original data. This type of data transmission is commonly used in remote controls, such as those for televisions or home entertainment systems. When a button is pressed on the remote control, a binary signal is sent via IR transmission to the receiver, which then interprets the signal and performs the corresponding action.

In contrast, spread spectrum and analog data transmission involve more complex signals that allow for greater amounts of data to be transmitted at once. However, for simple data transmission applications such as remote controls, binary transmission via IR is a cost-effective and reliable option.

Infra-Red transmitter and receiver use binary data transmission because the on/off signal of the IR light can be easily translated into a binary signal. This type of transmission is commonly used for simple data transmission applications such as remote controls. Spread spectrum and analog transmission are more complex forms of data transmission that allow for greater amounts of data to be transmitted at once.

To know more about electromagnetic spectrum visit:-

https://brainly.com/question/23727978

#SPJ11

A cpu converts the data entered through the keyboard into output displayed on the monitor.a. Trueb. False

Answers

Answer:

a. True

Explanation:

A CPU (Central Processing Unit) is the primary component of a computer that performs most of the processing and converts the data entered through the keyboard into output displayed on the monitor.

The statement "A CPU converts the data entered through the keyboard into output displayed on the monitor" is true.

Here,

The CPU (Central Processing Unit) of a computer is responsible for processing instructions and data. When you enter data through the keyboard, the CPU processes that input and sends it to the appropriate components, such as the display adapter, which then outputs the data to the monitor for you to see.

So, the CPU plays a crucial role in converting keyboard input into monitor output.

Therefore, the correct answer is option a) True.

Know more about CPU,

https://brainly.com/question/30751834

#SPJ6

please help me!
Memory is used to store programs and data. Identify and describe the two primary types of memory.
1.______
2.______

Answers

Answer: There are two types of memory in primary memory, RAM and ROM. RAM is Random Access Memory which loses its contents when the computer is switched off. ROM is non-volatile; even after you turn off your computer, the contents of ROM will remain.

Explanation:

1. ram {random acess memory

2. rom {read only memory}

______ requires that any electronic communication must be backed up and secured with reasonable disaster recovery infrastructure.

Answers

SOX requirements requires that any electronic communication must be backed up and secured with reasonable disaster recovery infrastructure.

Sarbanes Oxley (SOX) requires that data security policies are being made, effectively communicated and enforced. This is needed for data security as well as protecting financial data needed for normal operations.

SOX requirements are needed to be met so as to perform compliance auditing.

Find out more at: https://brainly.com/question/17157670

3.4.6 colorful bracelet code hs
answer pls

Answers

def small_circle():
circle(10)
left(10)
penup()
forward(20)
pendown()

penup()
backward (100)
right(90)


pendown()
for i in range (12):
color("purple")
begin_fill()
small_circle()
end_fill()
color("blue")
begin_fill()
small_circle()
end_fill()
color("red")
begin_fill()
small_circle()
end_fill()
penup()
setposition(0,0)

Write a SELECT statement that returns four columns from the Invoices table, named Number, Total, Credits, and Balance: Number Column alias for the InvoiceNumber column Total Column alias for the InvoiceTotal column Credits Sum of the PaymentTotal and CreditTotal columns Balance InvoiceTotal minus the sum of PaymentTotal and CreditTotal Use the AS keyword to assign column aliases.

Answers

Answer and Explanation:

For returning four columns from the  Invoices table, named Number, Total, Credits, and Balance the SELECt statement is as follows

Select     Invoice Number     As     Number

              Invoice Total          As      Total

Payment total + credit total  As      Credits

Invoice total

(Payment total + credit total) As     Balance

These are displayed as above

Which symbol is used to indicate that a formula may contain an error?
A. green triangle in upper-left corner of cell
B. an orange circle below the formula result
C. green triangle with question mark inside
D. a wavy purple arrow above the formula result

Answers

Answer:A.

Explanation:

Just had this question if is A

Answer:

its A they right

Explanation:

Critical thinking skills can be applied to reading.


Please select the best answer from the choices provided

T
F

Answers

T

Critical thinking means that you do not just accept what an author presents. By reading critically, you read skeptically, questioning the author against your own knowledge and your own world view. Sometimes your ideas will align with an author's.

Answer:

Explanation:

hello i know the answe and the anwer is TRUE

What standard tcp port is reserved by iana for the openvpn service to operate on?

Answers

Answer:

1194 is the OpenVPN port reserved by the IANA

Explanation:

designing a website for optimum viewing on smartphones and tablets is referred to as ________.

Answers

Designing a website for optimum viewing on smartphones and tablets is referred to as responsive web design.

Responsive web design is an approach to web design that aims to create websites that can adapt and adjust to different screen sizes and devices, such as smartphones, tablets, and desktop computers. It involves designing websites with flexible layouts, images, and media queries that can respond to the user's screen size and orientation.By using responsive design techniques, a website can provide an optimal viewing and user experience regardless of the device being used. This is important as more and more people are using mobile devices to access the internet, and websites that are not optimized for mobile devices may be difficult to navigate and use on smaller screens.

To know more about Responsive web design visit:

brainly.com/question/30538330

#SPJ11

Which functions are part of the array module? Select 2 options. Assume you have already entered these lines of code.

import array
arr = array.array('b',[5, 1, 2, 7, 6])

arr.index(3)

arr.sort()

arr.find(3)

arr.search(3)

arr.append(3)

Answers

Answer:

arr.index(3)

arr.append(3)

Edge2020

Answer:

arr.index(3)

arr.append(3)

Explanation:

hope you get 100%

Other Questions
5Drag the tiles to the correct boxes to complete the pairs.Match the lines in the poem with the messages they represent.Stars evoke wonder.The night is changeable.Moonlight can be uninviting.And dearer thy beam shall be;For joy to my heartIs the proud partThou bearest in Heaven at night,arrowBothI gazed awhileOn her cold smile;Too coldtoo cold for mearrowBothThere passed, as a shroud,A fleecy cloud,And I turned away to thee,arrowBoth This illustration depicts the martyrdom of William Tyndale in 1536. Tyndale, a Protestant, wrote a number of books and essays criticizing Henry VIII's divorce. Charged with heresy, Tyndale was strangled to death at the stake and then burned. Based on this event, which is the MOST logical conclusion we can make about Henry VIII? Skin cells are lost daily even without injury. The cell cycle responds by promotingreproduction.repair.synthesis.growth. what characteristics of the Inca civilization were similar to those of the Aztec let (-5,6) be a point on the terminal side of 0. find the exact values of cos0, sec0, and cot0 El ESTEREOTIPO ETARIO consiste en discriminar a las personas por Answer the box please which of the following statements about the fern life cycle is false? sporangia produce haploid spores. the sporophyte grows from a gametophyte. the sporophyte is diploid and the gametophyte is haploid. sporangia form on the underside of the gametophyte. Which student is doing work? Sara exerts a 20 N force forward on a bowling ball that rolls forward 1.0 m. Jane exerts a 45 N force upward while holding a ball above the ground. Jim exerts a 65 N force to hold a ball while spinning in a circle. Amy exerts a 55 N force to hold up a bowling ball as she walks toward the bowling lane. 1-4y^2 = 0Solve the equation Suzanne's average daily balance for last month was x dollars. The financecharge was y dollars.a. What was the monthly percentage rate?b. What was the APR? Spanish Only please guys thank u A family has a$128,800,30-yearmortgage at6.6%compounded monthly.(A)Find the monthly payment and the total interest paid.(B)Suppose the family decides to add an extra $100 to its mortgage payment each month starting with the very first payment. How long will it take the family to pay off the mortgage? How much interest will the family save?Question content area bottomPart 1(A) Monthly payment:$822.59822.59(Round to two decimal places.)Part 2Total interest paid:$ ENTER YOUR ANSWER HERE(Round to two decimal places.)Part 3(B) Time:22.1922.19years (Round to two decimal places.)Part 4Total interest saved:ENTER YOUR ANSWER HERE(Round to two decimal places.) Contemporary issue and how they would react John Locke PLS HELP GIVING BRAINLIEST FOR THE CORRECT ANSWER (NEEDS ANSWER IN 5 MINUTES OR ELSE NO BRAINLIEST)What is the last digit of the sum of 11+21+31+...+991? Show that f: K R^n R is continous on a compact set K if and only if the graph of f is a compact set Find the length of EF how does non-point source pollution get into our waterways Write the equation of a line in slope/intercept form given m=0 , and it goes through the point (-2,5). Please help me. Who lives in the Ancient Indus River Valley today?