Spammers can defeat the registration process of free email services by launching a coordinated attack that can sign up for thousands of untraceable email accounts. what is this type of attack known as:_____.

Answers

Answer 1

Answer:

DDOS OR DOS

Explanation:

im sure its either DOS or DDOS(distributed denial of service)


Related Questions

How is the development of SaaS related to cloud computing?

Answers

Answer:

SaaS cloud allows it to take advantage of the efficiencies of resource pooling and cost effective pricing models of cloud- based infrastructure

You took a picture of the beach, and there's a seagull sitting in the sand that you want to remove. What do you use to draw and AUTOMATICALLY remove the seagull, replacing it with more sand?

Answers

Answer: You can use a special type of editor to remove anything you want, and have that place filled in so its not blank space.

BUT: I am not sure of a specific one.

Look at the color key below the map that shows the overall performance range. What is the range for 1 Year Performance? How does it compare to the 1 Day Performance range?

Answers

A performance range simply means the threshold and maximum percentage of shares that may become earned.

What is a performance range?

Your information is incomplete. Therefore, an overview will be given. A performance range is the maximum percentage if shares that may become earned shares due to the attainment of the requirements of the performance.

It should be noted that in this case, the opportunity to incentivize performance will be associated with the relative performance.

Learn more about performance on:

https://brainly.com/question/26256535

What are different social phenomenas are you aware of that used part of a social movement, change, or cause

Answers

Answer:

Social change in the broadest sense is any change in social relations. Viewed this way, social change is an ever-present phenomenon in any society.

Explanation:

Question 2 of 10
A game has a function that requires the player sprite to first collect a banana
and then collect a coin, after which the game ends, and the player wins.
Which word is the Boolean operator that should be used in the program to
indicate this set of conditions?
A. Not
B. And
c. Or
D. After

Answers

Answer:

b

Explanation:

I really don't but I hope its correct

The word that is the Boolean operator that should be used in the program to indicate this set of conditions is And. The Option B.

Which Boolean operator should be used to indicate the specified conditions in the game?

The Boolean operator that should be used in the program to indicate the specified set of conditions, where the player sprite needs to collect a banana and then collect a coin to win the game, is "And."

The "And" operator evaluates to true only when both conditions are met simultaneously, meaning the player must satisfy both conditions of collecting the banana and the coin to trigger the game-winning outcome.

Read more about Boolean operator

brainly.com/question/3445425

#SPJ2

45 points!!!!!
One of the options for a software engineer is to work with the testing team of an SDLC project. In your view, state the pros and cons of placing a junior engineer with the testing team. Analyze it from both the company’s and employee’s points of view.

Answers

The pros and cons of placing a junior engineer with the testing team is that:.

The pros is that they get to learn.The cons is that one has to go back and try to explain things step by step which may slow down the project process.

What are the pros and cons of a software engineer?

The pros of a person as a software engineer are the fact that they gett paid well, they are often respected, and they have the freedom to work from home,

The cons or disadvantages is that they often feels stressed, overwork themselves and others.

Learn more about SDLC project from

https://brainly.com/question/26872062

A team of computer science researchers develop a program for searching trees that can be run in parallel. When they use distributed computing techniques to run the program on six computers in parallel, they find a speedup of 3. In this case, what does a speedup of 3 indicate?

Answers

Answer:

The program completed in a third of the time with six computers versus one computer.

Explanation:

The speedup of a parallel solution is measured in the time it took to complete the task sequentially divided by the time it took to complete the task when done in parallel (or put succinctly, speedup = sequential/parallel).A speedup of 3 means that the program took three times as long on one computer, which is the same thing as saying it took a third of the time with all six computers working in parallel.

Network Security Fun. > Quizzes > Practice Exam (for midterm: m.

Practice Exam (for midterm: mods 1-7)

Started: Mar 11 at 2:07pm

Quiz Instructions

nts

Question 21

1 pts

Sean is an information security architect at a financial firm. As his first project, he must design and build an

efficient, sure-shot, yet cost-effective solution to Tetect and prevent bank credit card fraud. How should Sean

proceed?

O Design a solution that is confined to and hardcoded with a specific place and specific time. If the user

males transaction at a different place or time it will be considered an outlier and trigger an alert

Answers

Answer : Sean is an information security architect at a financial firm. As his first project, he must design and build an efficient, sure-shot, yet cost-effective solution to Detect and prevent bank credit card fraud. How should Sean proceed? O Design a solution that is confined to and hardcoded with a specific place and specific time.

Explanation: Sean is an information security architect at a financial firm. As his first project, he must design and build an efficient, sure-shot, yet cost-effective solution to Detect and prevent bank credit card fraud. How should Sean proceed? O Design a solution that is confined to and hardcoded with a specific place and specific time.

What is the name for the base-2 system used by computers to represent
data?
O A. Unicode
O B. Binary code
C. Hexadecimal code
D. Decimal code

Answers

Answer:

B. Binary Code

Explanation:

Binary code is the base-2 system used by computers to represent data. Binary code consists of 0's and 1's which can be used to represent states such as on or off; go or no-go and more.

Which type of software-based attack tracks all of your browser activity and relays it to cybercriminals?.

Answers

Answer: Spyware

Hope that helps!

Fill in the blank by selecting the correct option. Ethical codes may not address because they are written quite broadly

Answers

Ethical codes may not address all of organization's ethics because they are written mostly by a task force committee of SHRM members and leaders.

What does codes of ethics address?

A code of ethics are known to have or contains some professional conduct outlines. They are regarded as ethical principles that helps to rule  or monitors decisions and behavior at a firm.

They are known to states the  general ways of how employees should behave in the office , as well as some other guidance for settling issues such as harassment, safety, etc.

Learn more about  Ethical codes  from

https://brainly.com/question/24606527

P.W. Singer jokes about how many people are using Wang computers. What point is he making with this joke?

Answers

P.W Singer stated:

"And think about it this way: We don't use Wang computers anymore, or Commodore 64s, kids don't play Atari videogames. Those companies may have been at the forefront of the digital revolution, they're not anymore. Same thing in war. You know the British invent the tank. The Germans figure out how to use the tank better,"

Enjoy

Please have a great day <3

A company has employees who write down passwords, which should be kept private, on sticky notes. Given this scenario, what should the IT security department implement to prevent this type of mishandling of confidential information

Answers

Save the passwords to an encrypted database, saving the passwords as hash values to keep confidentiality.

What is one major reason various industries have adopted the use of automated robotic assembly?.

Answers

The major reason various industries have adopted the use of automated robotic assembly is to increase manufacturing productivity.

What is automated robotic assembly?

Automated robotic assembly is the use of automotive technology to operate different areas in the manufacturing industries.

Automated robotics are used to perform the following tasks:

welding, assembly,shipping, handling raw materials, andproduct packing.

The reason why various industries have adopted the use of automated robotic assembly is that it saves time and there is increase in the amount of products manufactured that when manually handled.

Learn more about automation here:

https://brainly.com/question/11211656

100 points.
What is steganography? Do online research about a tool named Open Stego. Discuss the applications of this tool and explain how it can be used. Then, use Open Stego to encrypt and decrypt messages into pictures. Explain the steps you use to find the hidden messages.

Command line is the user interface in the computer’s operating system and is built into all computers. Do online research and describe how to perform steganography using the command line.

Answers

Steganography is the practice of hiding a secret message inside of (or even on top of) something that is not secret.

The attacker doesn’t need to trick the user into using applications such as Steghide. In this case, the hacker – or pen tester – is “living off the land.” The attacker is using a steganographic application to take advantage of common Windows applications and features such as Excel and PowerShell. All the victim needs to do is read the doc, and an unfortunate series of events begins to occur.

I can't do the Open Stego thingy bc I can't.

If you were designing facial recognition software based on machine learning,
how would you avoid algorithmic bias?
O A. Make sure to avoid using any algorithms in the program
O B. Ask the programmers if they are biased against groups of people
O C. Use training images that show a diverse group of people
D. Use photos with people facing in all different directions

Answers

To avoid algorithmic bias, Ask the programmers if they are biased against groups of people.

How do you avoid an algorithm bias?

The right step is to avoid this kind of bias is to take a record of inventory of the algorithms. Note that Developers can communicate with stakeholders to know more about about how and when algorithms are being applied.

Once you have known the algorithms, then you can appoint a person to monitor the algorithms, mostly among wide groups.

Learn more about algorithm  from

https://brainly.com/question/24953880

Similarities between Off-site and On-site

Answers

Answer:

As adjectives the difference between onsite and offsite

is that onsite is on or at a site while offsite is away from a main location; in a place not owned by a particular organisation.

If a driver update creates a problem, you can __________________ the driver update if the previous drivers were working.

Answers

Answer:

rollback the driver update if the previous drivers were working

Unit 6: Lesson 2 - Coding Activity 3 for projectstem. Org coding thing

Answers

Project Stem was founded as a 501(c)(3) non-profit corporation. Its goal is to help students get the confidence they need to participate, learn, and continue in the subject of computer science.

What is a Coding Activity?

A coding activity refers to activities that help the students learn to code. Some of the activities are designed as:

GamesPuzzles and Actual assignment.

Examples of coding activities could be:

To guide a Jupiter RoverTo create a pixel puzzle etc.

Learn more about Coding Activities are:
https://brainly.com/question/25250444

Select the correct answer from each drop--down menu

Mike wants to prepare a project estimation and incorporate this in a SQA plan. which technique should mike use for this purpose?

Mike should use ______ to prepare a project estimation and incorporate this estimation in an SQA plan. This technique is part of SQA activity of applying _______ engineering.

1. interviews, testing, reviews
2. hardware, software, product

Answers

Mike should use Software quality assurance (SQA) technique.

Mike should use reviews to prepare a project estimation and incorporate this estimation in an SQA plan. This technique is part of SQA activity of applying software engineering.

Which is a SQA technique?

Software quality assurance (SQA) is known to be a type of method used to assures that all software engineering procedures, methods, or activities etc., are been monitored and work with the defined standards.

Note that these defined standards is one that has  one or a composition such as ISO 9000, etc.

Learn more about Software from

brainly.com/question/24930846

Answer:

i dont have the full answer but i do know for sure that

reviews is WRONG

2. software is RIGHT

Explanation:

platooo

When preparing your taxes, what can possibly help
reduce the amount of taxes that you owe?
Stock and savings interest
Sharing what you earned on a W-2 or 1099 form
Having stock dividends
Credits and deductions

Answers

When preparing your taxes, what can help is Sharing what you earned on a W-2 or 1099 form.

What are some expenses that can be taken as a tax deduction?

Note that a  person's Office supplies, credit card processing fees, tax preparation fees, etc., are some expenses that are taken as tax deductions.

Conclusively, Taxes are some amount of money taken by the government from our income. By Sharing what you earned on a W-2 or 1099 form, one can know the amount you earn.

Learn more about taxes from

https://brainly.com/question/25783927

Answer:

When preparing your taxes, credits and deductions can possibly help reduce the amount of taxes that you owe.

Explanation:

The choice of database does not have any impact on the relevancy of search results?

Answers

Answer:

When searching for articles using library databases, the following tips should increase the relevance of your results. Quotation marks around two or more keywords - phrase searching - ensures that the results will include the exact phrase.

Explanation:

The choice of database does impact the relevancy of search results as different databases have varying algorithms and criteria for determining relevance.

The choice of the database can indeed have an impact on the relevancy of search results.

Different databases have varying algorithms and search capabilities, which affect how they index and retrieve information.

Databases might prioritize different criteria for relevance.

Academic databases, for instance, may prioritize scholarly articles based on factors like peer review, citation count, and relevance to a specific field.

This ensures that users searching for academic resources find the most authoritative and credible information.

So, when choosing a database, it's important to consider its specific search algorithms and features to ensure you get the most relevant results for your needs.

To learn more about database visit:

https://brainly.com/question/6447559

#SPJ3

Pls help xD. In pseudocode or python code please. Will mark best answer brainliest. Thx

Answers

Answer:

I'm doing my best to send you my answer,

Explanation:

The coding will be below

What can a company learn by studying website analytics for its website?.

Answers

Answer:

they can learn how people interact with it

Explanation:

scientific name of computer ?

Answers

Answer:

supercomputer. (redirected from scientific computer)

Explanation:

hope it will help you..

Scientific name of computer supercomputer.

What are Supercomputer?

Supercomputing and other computing methods are sometimes used interchangeably. Yet, there are times when the synonyms aren't clear. To assist clarify some similarities and differences between various computer types, here are some common analogies.

While supercomputing typically refers to the process of complex and massive calculations used by supercomputers, high-performance computing (HPC) is the utilization of several supercomputers to execute difficult and huge computations.

Supercomputers are often known as parallel computers since they can perform parallel processing. Parallel processing is the simultaneous use of many Processors to solve a single calculation.

Therefore, Scientific name of computer supercomputer.

To learn more about Supercomputer, refer to the link:

https://brainly.com/question/30227199

#SPJ6

How to transfer polygon from eth to polygon in ledger live

Answers

Import it to there and there it you go!

Select Bridge to Polygon from the three-dot option for Ethereum. Fill in the amount of ETH one want to bridge onto Polygon in the pop-up window.

What is polygon in ledger live?

Polygon is a Layer 2 solution that aims to fix all of Ethereum's major issues while also making crypto more accessible to the general public.

Popular blockchain networks, such as Ethereum, are overcrowded and costly to use.

Thus, by selecting the Bridge to Polygon from the three-dot option.

For further details about polygon in ledger live, click here:

https://brainly.com/question/14797470

#SPJ4

90 POINTS Hazel is working with a database to help determine if the company she works for is making or losing money. Hazel has organized the expenses category from the smallest expense to the largest expense. Which of the following database features has Hazel employed to organize the data?

A.
sorting

B.
filing

C.
nesting

D.
filtering

Answers

Answer:

a

Explanation:

Answer:

it's A  sorting sorry if it's wrong

Explanation:

When would a flag variable be most useful?
1.when printing the number of items in a list

2.when checking the condition of a variable in a while loop

3.inside a function that prints the largest side of a triangle

4.when initializing a list

Answers

2. When checking the condition of a variable in a while loop.

Which of these is most likely to contribute to the long term of a local ecosystem?

Answers

i would help but you didn’t say what these is

What standard tcp port is reserved by iana for the openvpn service to operate on?

Answers

Answer:

1194 is the OpenVPN port reserved by the IANA

Explanation:

Other Questions
What impact do policy interventions have on the supply and demand equilibrium for a product?. How is a nerve impulse generated when most sensory receptors are activated?. 5h-2g=262h + 2g 2find h and g Please help! These data show the number of miles each of the 9 members of a track team ran for the week.11 11.5 10.5 17 14.5 14.5 18 17 19What is the IQR (interquartile range) for these data?6.257.0014.5017.50 The ______ are a series of fibrous connective tissue membranes covering the central nervous system. Which artist was inspired by the colours of fakarava atoll?. Analyzing Literary Text Unit TestUse the paragraphs to complete the activity,Patrick lived in Emoryville, but every Saturday morning he rode two city buses to his uncle's bookstore in Northview where he worked. He didn't mindthe commute because he loved his job. He loved spending time with his uncle, but he also loved going to work because he had become friends withAndrew, one of his co-workers. The boys would talk about everything from baseball scores to movies to favorite pizza toppings.So this Saturday, when Patrick got to work, he and Andrew got to talking as they always did."Hey, Pat." Andrew said casually"Hey," said Patrick. "Did you have a good week?""Yeah," he said. "Great week. My basketball team made it into the semifinals. The game is tonight. We're playing Emoryville, our nemesis."Before Patrick could say another word, Andrew continued. "I don't like Emoryville. I don't think I could ever be friends with someone from that town. Ourschools are such rivals."Patrick was speechless."Where are you from, Pat? I can't believe I've never asked you that beforerPatrick tumbled over his words. "Not too far from here," he said before he quickly changed the subject to the new shipment of graphic novels.Write a paragraph explaining the structure of the story and how the structure contributes to the meaning of the story, The primary colors are ____________________. Skin cancer is the most common cancer in humans. A prism is created using 2 regular pentagons as bases. the apothem of each pentagon is 2.8 centimeters. a regular pentagonal prism is shown. the apothem of each pentagon is 2.8 centimeters. the height of the prism is (2 x 1). all sides of the pentagon are congruent. which expression represents the volume of the prism, in cubic centimeters? 9x2 7x 14x2 7x 16x2 14x 28x2 14x Buying office space is ______________ in the long run-in comparison to leasing. Which is the correct answer? less difficult less expensive more expensive more difficult which of the following climte has rain in all seasons t divided by 5 = 2.9What step should be performed on both sides of this equation to find the solution?Add 5.Subtract 5.Multiply by 5.Divide by 5. Question 4 of 10What is the name of the planet next to the label A?Solar SystemEARTHSUNO A. VenusB. Mars C. SaturnOD. Mercury Gena and her friends each estimated the quotient of 137.56 divided by 6.12 using compatible numbers. Which shows the best estimate using compatible numbers? Humans use more fresh water for ________ than for any other purpose. what are the ources of information and communication?Describe Choose all of the programs that were part of President Franklin Roosevelt's New Deal. A) Medicare B) War on Poverty C) Civilian Conservation Corps D) Securities and Exchange Commission E) Federal Deposit Insurance Corporation what effect does removing water from milk have on the level of sugar in the milk Help what do I do do i just write y-3x+5 or solve it