In what kind of attack can attackers make use of hundreds of thousands of computers under their control in an attack against a single server or network?

Answers

Answer 1

Answer:

distributed denial of service

Explanation:

Answer 2

Answer: DDoS

Explanation:

A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt the normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic.

DDoS attacks achieve effectiveness by utilizing multiple compromised computer systems as sources of attack traffic.


Related Questions


29. Write a program that asks to input any ten numbers and displays sum of them​

Answers

Answer:

Here is the code for a classic C++ program that does it:

--------------------------------------------------------------------------------

#include <iostream>

using namespace std;

int main()

{

   int sum = 0;

   int n;

   cout << "Input 10 numbers: " << endl;

   for (int i = 0; i < 10; i++)

   {

       cin >> n;

       sum += n;

   }

   cout << "Sum of the numbers: " << sum << endl;

}

--------------------------------------------------------------------------------

Explanation:

I'm assuming you know what "include", "using namespace std" and "int main()" do, so I will skip over those.

First, we declare a variable "sum" and initialize it with 0 so we can add numbers to it later.

Then, we declare a variable "n" that will be set as the input of the user.

The "for-loop" will iterate ( go ) from 0 to 9, and will set the value of "n" as the input that is given -> "cin >> n;". After that, we add the value of "n" to the sum variable.

After "i" reaches 9, it will exit the loop and proceed to printing the sum of the numbers.

Hope it helped!

A unique file with a unique name and address that can display ancombination of text, graphics, video,
audio, or animation defines what?
A. web browser
B. web page
C. website
D. web server

Answers

Answer:

B. web page....

How should I represent myself online? ​

Answers

Answer:

no be a b word and dont be toxixc be bc it will come back to u

Explanation:

Which statement opens a text file so that you can retrieve the information it contains?

aFile = open("books.txt","r")

aFile = open("books.txt","s")

aFile = open("books.txt", "w")

aFile = open("books.txt", "a")

Answers

Answer:

Answered below

Explanation:

aFile = open("books.txt", "r")

This code uses the function open() which takes two parameters. The first parameter is the file name while the second parameter is the mode in which you are accessing the file.

The "r" mode opens the file in a reading state. That is, you can only read from the file. This code completes the reading process

aFile.read( )

The "w" mode opens the file so you can write to it and make changes.

The "a" mode opens the file so you can add contents to it.

The statement which opens a text file somthat you can retrieve the information it contains is; aFile = open("books.txt", "r")

Discussion:

The code above uses the function open() which requires two parameters.

First of which is the file name while the second parameter is the mode in which one is accessing the file.

On this note, the "r" mode opens the file in a reading state. This in essence means, you can only read from the file. This code completes the reading process

aFile.read( )

Post Script:

The "w" mode opens the file so one can write to it and make changes.

The "a" mode opens the file so one can add contents to it.

Read more on text file:

https://brainly.com/question/6962696

What is output if the user types in 8

Answers

Answer: 8

And if you hold shift while typing it, it gives *

What task do the referential integrity settings prevent?
a) editing a non-key field in a destination table
b) sharing data from one field between two tables
c) linking a primary key to another table’s primary key
d) deleting a record that has related records in another table

Answers

Answer:

D

Explanation:

Which of the following are examples of software? (Select all that apply)

Answers

Put a photo or something

Answer:

How can we answer with no photo ;(

Explanation:

What is the definition of a flowchart? *

Answers

Answer:

A flowchart is simply a graphical representation of steps. It shows steps in sequential order and is widely used in presenting the flow of algorithms, workflow or processes. Typically, a flowchart shows the steps as boxes of various kinds, and their order by connecting them with arrows.

Explanation:

please can someone help my assignment.​

Answers

Light against dark- Smaller irregularly shaped objects can be used to balance a large flat surface without much detail.

Curved lines or smooth textures Larger areas with smoother, untextured finishes or looks can be balanced with smaller areas with interesting features.

Horizontal lines - The use of elements like arrows and triangles in an image can lead the eye to a certain point in a picture.

Converging lines adds a certain flow or depth to the image. It also adds a sense of distance or scale.

Vertical lines Suggest power, growth, and dominance as shown in tall trees and buildings.

Large against small is when Larger elements in one side of the image can be balanced with smaller elements positioned by itself at the far end of the other side of the image.

Diagonal lines suggest peace, calmness, and a sense of restfulness as shown by rivers, streams, paths, and even the human body.

Symmetrical balance is achieved when the two halves of an image are mirror images of each other.

Asymmetrical balance is achieved when the two halves of an image are not mirror images of each other, but they still feel balanced.

Radial balance is achieved when the elements in an image are arranged around a central point.

How to explain the information

Curved lines are often seen as being more organic and natural, while straight lines are seen as being more geometric and artificial. Smooth textures can also create a sense of calm and serenity, while rough textures can create a sense of energy and excitement.

Horizontal lines can create a sense of stability and balance, while vertical lines can create a sense of height and power. Arrows and triangles are directional elements that can be used to lead the eye to a certain point in an image. They can also be used to create a sense of movement or energy.

Learn more about elements on

https://brainly.com/question/20096027

#SPJ1

Drag the tiles to the correct boxes to complete the pairs.
Match the memory type with its function.
ROM
cache
RAM
hard drive
Functions
Memory Type
acts as a buffer between the CPU and main memory
arrowRight
contains data and instructions for current execution
arrowRight
stores data permanently
arrowRight
stores the program required to boot a computer
arrowRight
Next

Your welcome

Answers

I need this answer too can someone please help us out with the right answer ?!

Explanation :

The program that is BEST suited
for managing large amounts of
data is
a Microsoft Publisher
b. Microsoft Word
c. Microsoft PowerPoint
d. Microsoft Access​

Answers

Answer:

everything

Explanation:

cuz I use everything and they all work good

what descriptions can be used for last,first,PR_ID and CID

Answers

Answer:

x r

Explanation:

this is the answer like it thank you

select the correct answer from each drop-down menu. “To clean a computer screen, use ___. To clean a keyboard, use a ___.”

Answers

Answer:

The answers are:

The first drop down menu: Soft cloth

The second drop down menu: Paintbrush

Explanation:

I got it right on the Edmentum test.

The selection of the correct word from each drop-down menu is as follows:

To clean a computer screen, always use a soft cloth.To clean a keyboard, always use a paintbrush.

Why computer screen is used cleaned regularly?

It is important to clean off your computer screen regularly. This is because if you don't clean your screen properly, you could damage it permanently and possibly harm your computer.

Many many people don't know how to properly clean their screens, they are just requested to watch a video available on the Internet. The process of cleaning your computer's hardware makes the entire system run more smoothly and keeps it running longer. It not only protects your investment but the important data stored on it as well.

Therefore, the selection of the correct word from each drop-down menu is well mentioned above.

To learn more about Cleaning computers, refer to the link:

https://brainly.com/question/15080618

#SPJ6

TLE 10 - ICT

In order for computers to network, what are the things you are going to set or configure?

Answers

Answer:

Information And Communication Technology

Which Excel feature should you use to only show values in a column that fit certain criteria?

Answers

Answer:use input

Explanation:

Jane is designing a robotic arm that is required to move like a human arm. Select the simple machine she will use.

Answers

I NEED THIS ANSWER TOO CAN SOMEONE PLEASE HELP US OUT WITH THE RIGHT ANSWER ?!

Explanation:

Answer:

A.   System of Levers

Explanation:

When writing HTML code, what is meant by 'syntax'?​

Answers

Answer:

   Syntax is essentially the punctuation and grammar rules for a computer language.

Explanation:

  Certain characters and words have special meanings and must appear in a particular order for the computer code to make any sense. A simple example from line 3 in Figure 2.2 is the piece of HTML code <head>.

The Advanced Properties sheet enables you to add which of the following?
keywords
category
Author's name
All of the above

Answers

Answer:

All of the above.

Explanation:

Microsoft Word refers to a word processing software application or program developed by Microsoft Inc. to enable its users type, format and save text-based documents.

The properties of a document is generally referred to as metadata and it includes details such as keywords, category, subject, title, and author name. These properties when properly entered into a document makes it easier to organize, search and identify the Ms-word document.

Hence, the Advanced Properties sheet of Microsoft Word enables you to add keywords, category and author's name.

You are creating a story map about Mexico. After configuring the web app template, you launch the app to test it. When the app opens, the map is zoomed to the whole world, instead of to Mexico. What actions will fix the problem

Answers

Nbdjsksjsidjdjwkwejd

Which statements about organizing messages in Outlook 2016 are true? Check all that apply. The Categories function is used for grouping different types of messages in your inbox. Renaming a color category is a helpful step before assigning it to a message. Using the Ignore and Clean Up functions can clear up space in your inbox. Marking messages for follow-up will create a new appointment in the Calendar. New folders are saved on the server and are added to the list in the Folder pane. Once you create a new subfolder, messages can be dragged and dropped into it.​

Answers

Answer:

A. B. C. F. G.

Explanation:

Answer:

The Answer is A, B, C, E, F

What is the function of primary keys?



Primary keys facilitates __?__ because they act as unique identifiers

Answers

Answer:

Searching and sorting.

Explanation:

A data dictionary can be defined as a centralized collection of information on a specific data such as attributes, names, fields and definitions that are being used in a computer database system.

In a data dictionary, data elements are combined into records, which are meaningful combinations of data elements that are included in data flows or retained in data stores. This ultimately implies that, a data dictionary found in a computer database system typically contains the records about all the data elements (objects) such as data relationships with other elements, ownership, type, size, primary keys etc. This records are stored and communicated to other data when required or needed.

Basically, when a database management system (DBMS) receives data update requests from application programs, it simply instructs the operating system installed on a server to provide the requested data or informations.

Binary search is an efficient algorithm used to find an item from a sorted list of items by using the run-time complexity of Ο(log n), where n is total number of elements.

Binary search applies the principles of divide and conquer.

A primary key refers to a keyword found in a relational database which uniquely identifies each record contained therein.

A relational database can be defined as a type of database that is structured in a manner that there exists a relationship between its elements. Also, in a relational database, a single space within a row or column contains exactly one value.

Hence, the function of primary keys is that, primary keys facilitates searching and sorting because they act as unique identifiers.

Answer:

Primary keys facilitate table searches because they act as unique identifiers

Explanation:

I have the answer from my notes, and I got it correct on Plato :)

puter Science (IS)
2
3
Complete the sentence.
A
covers several adjacent buildings of a school and business.

Answers

Answer: Campus Area Network

Explanation: Got it right on Edge.

Answer:

Camus Area Network

Explanation:

Just did it Edg 21/22

What is the next line?

>>> tuple B = (5, 7, 5, 10, 2. 7)

>>> tupleB.count(7)

1

0

2

5

Answers

Answer:

Answered below

Explanation:

The next line is 1.

The python count function returns the number of times an element appears in a tuple or a list.

In the tupleB tuple, 7 is passed into the count function. The number of times 7 appears in tupleB is just once alongside 5, 2.7, 10 and 5. Therefore, the count function returns 1 in the next line.

Shelbi likes to play video games on an old Nintendo video game system. No matter how old the cartridge, when she inserts it into the Nintendo console to play, the game loads right away. What type of memory is responsible for this process?

Hard drive
RAM
ROM
Storage

Answers

A: Hard drive!!!!!! Because

Answer:

Hard drive

Explanation:

in java !
For each of the following tasks, draw what the initial array looks like, diagram how you would solve the problem, and draw what the final array looks like. Then use your diagram to write a step by step process to solve the task. The diagram may show several separate steps, or you may want to use arrows to show how the data will be moved. It will be helpful to number the arrows in the order you draw them.


Given an unsorted array of integers create a sorted array by finding the
largest element in the array and swap it with the last position. Then find the largest
element in the array, ignoring the last position, and swap it with the second to last
position. Repeat until you are only considering the first position (element at index 0).
The initial array is : int array[] = {22, 15, 33, 4, 12, 2, 3, 19 };

Answers

Answer: The attached photo is the code I use to sort the array from Greatest to least. If this doesnt help, I'm sorry.

Explanation:

The three greater-than signs, >>>, represent a _____.

A. prompt

B. file-path

C. file name

D. IDLE

Answers

Answer:

it's A. prompt

Explanation:

What does a GPA show

Answers

Answer:

Grade Point Average

Explanation:

Answer:

Your GPA, or Grade Point Average, is a number that indicates how well or how high you scored in your courses on average. It's meant to score you (usually on a GPA scale between 1.0 and 4.0) during your studies and shows whether your overall grades have been high or low.

Explanation:

E-mails that are mailed directly to a consumer without their knowledge or permission are called

Answers

e-mails that are mailed directly to a consumer without knowledge or permission are called spam

Answer:

I thought it was scam, but it was spam lol

Explanation:

Which of the following behaviors does not harm a company if your employment is terminated?

Answers

Answer:

D. notifying your employer of all accounts you have access to, and requesting that they change all passwords before you leave

Explanation:

Assuming your employment is terminated, notifying your employer of all accounts you have access to, and requesting that they change all passwords before you leave is a behavior that would not harm a company. In the true and actual sense, making such suggestions is commendable because it would go a long way to cause more good rather than harm the company.

Some mischievous and malicious employees would rather not tell so they can still have an unauthorized access to the company's account and perpetrate various level of evil.

Hence, it is a good global practice to have a company's login credentials updated whenever an employee's employment is terminated.

As an IT head, you require your employees to login to an intranet portal in your organization. The portal contains a login form in which users have to type their name and password. The password can be a combination of numbers and letters. Which data type is most suitable for a password field?
The (BLANK)data type is most suitable to define a password field.

Answers

Answer:

The answer is Text.

got it right on plato.

I promise you string is NOT the answer it's text

Explanation:

The password data type is most suitable to define a password field.

What is password?

Password is defined as a word, phrase, or string of characters used to distinguish between a procedure or user that is permitted and one that is not. A password is typically a random string of characters made up of letters, numbers, and other symbols. When only numeric characters are allowed, the matching secret is frequently referred to as a personal identification number (PIN).

Most often, passwords are made up of letters, numbers, and spaces. We use string data types as a result. Additionally, it depends on the programming language we are using. NIST advises using sha-256 or better. You will need 256 bits to save this sha-256 hashed password because a hashing method always yields a result of a predetermined length.

Thus, the password data type is most suitable to define a password field.

To learn more about password, refer to the link below:

https://brainly.com/question/28114889

#SPJ2

Other Questions
Please help to solve this problem.. Two numbers are graphed on the number line below. Consider the inequality t values graphed on the number line make the inequality true?-8 -7 -6 -5 -4 -3 -2 -10t = -3 andrt = 3 and r = -7t = 7 and r = -3t = -7 and r =3My Progress > 4. In snapdragons, a gone that affects flower color has two alleles: red (R) and white(W). In heterozygous individuals, the phenotype is pink.a. What is the genotype of a pink flower?b. Show a cross between two pink snapdragonsand give the expected genotype and phenotype. How are individual atoms of oxygen formed in the stratosphere?a. Individual oxygen atoms are formed when oxygen molecules collide with each other.b. Individual oXygen atoms are formed in the sun.C. Individual oxygen atoms are formed during photosynthesis.d. Individual oxygen atoms are formed when UV rays strike oxygen molecules.THE ANSWERS TO THE WHOLE OZONE TEST 1.D 2.B 3.B 4. C 5.D 6.F 7.A 8.A 9.D 10.F Determine the net force (Fnet) on an object that experiences the forces shown.SP2. Obtain, evaluate, and communicate information about how forces affect the motion of objects..c.Use mathematical representations to calculate magnitudes and vector components for typical forcesincluding gravitational force, normal force, friction forces, tension forces, and spring forces20 N of downward gravity force15 N of rightward applied force20 N of upward normal force10 N of leftward friction force How many moles of iron is 6.022 x 10^22 atoms of iron? (Report answer as a number rounded to one place past the decimal.) * PLZZ SOMEONE DO THE TWO QUESTIONS IN DAY 14. ILL GIVE BRAINLIEST!!!!!!!!! HELP ASAP!! WILL GIVE BRANLIEST!! A small hole in the wing of a space shuttle requires a 16.2 cm2 patch. (b) If the patching material costs NASA $3.58/in2, what is the cost of the patch to the nearest cent? Given the following sequences state the next number 1, 18, 16, 32 ____1, 1, 2, 3, 5, 8, 13, 21 ____-26, -15, -4, 7____256, 225, 196, 169, ____ I WILL GIVE BRAINLIEST PLS HELP ME I NEED HELP!!!!Using the new scale and starting from the origin, where will point A be? A.Fill in the blank with the correct affirmative or negative word.1. No me gusta el arte.voy al museo.2. Hayen mi mochila. Es mi lpiz.3. No hayen la escuela el sbado. Todos estn en casa.4 El alumno no tieneen su mochila.5. No me gusta comida mexicana.como comida mexicana.6. Hayen la cocina, Es me hermano.7. No tengoen mi cuaderno, perd mis papeles.M Europeans were able to dominate Africa & parts of Asia primarily becausea)Christianity appealed to people of those regions c)these areas were not organizedb)there were natural resources thered)they had more advanced technology Compounds Lab ReportInstructions: In this virtual lab you will build chemical compounds from known elements. Record your hypothesis and compound results in the lab report below. You will submit your completed report to your instructor.Note: If you cannot complete this lab as directed, please contact your instructor for assistance.Name and Title:Include your name, instructor's name, date, and name of lab.Objectives(s):In your own words, what is the purpose of this lab?Hypothesis:In this section, please include the if/then statements you developed during your lab activity. These statements reflect your predicted outcomes for the experiment.Procedure:The materials and procedures are listed in your virtual lab. You do not need to repeat them here. However, you should note if you experienced any errors or other factors that might affect your outcome. Using your summary questions at the end of your virtual lab activity, please clearly define the dependent and independent variables of the experiment.Data:Record the composition of each of your compounds below. Be sure to include the number of atoms for each element. An example has been supplied for you.Compound NameChemical FormulaSodium (Na) AtomsCalcium (Ca) AtomsHydrogen (H) AtomsOxygen (O) AtomsCarbon (C) AtomsChlorine (Cl) AtomsEx: SodiumhypochloriteNaClO100101Conclusion:Your conclusion will include a summary of the lab results and an interpretation of the results. Please answer all questions in complete sentences using your own words.Using two to three sentences, summarize what you investigated and observed in this lab.Why do you believe knowing how elements and compounds react together is essential in everyday matters?Some elements are more "reactive" than other elements; why do you think this is?Choose one of the compounds from the table and explain how you know the numbers of atoms in your formula.Is it possible for two different compounds to be made from the exact same two elements? Why or why not? With a limited number of elements (less than 120 are known), does this mean we also have a small number of compounds or do we have a large number of compounds in this world? How did the Republic of Texas encourage immigration? not sure if anyone knows this but if you do please help :) Malika's father also offers to put a gift of money in her savings account. He gives an amount equal to 0.15 times the amount Malika saves. How much money does Malika have in her savings account? (The amount she has in her account is 282 by the way.) Chelsea and Justin have a reading assignment for English class. Chelsea takes 54 minutes to read 27 pages. Justin takes 16 minutes to read 8 pages. Determine how many pages each student can read per minute. Who can read more quickly Claim & Evidence [Sepoy Rebellion] Many enslaved people mixed their native African religions with BLANK.1. Christianity2. american indian religions3. judaismWILL GIVE BRAINLIEST