× Didn't find what you were looking for? Ask a question
Top Posters
Since Sunday
c
5
j
5
a
5
L
5
f
5
j
5
D
4
k
4
y
4
t
4
h
4
l
4
New Topic  
JOHNJAAJ12 JOHNJAAJ12
wrote...
Posts: 492
Rep: 0 0
6 years ago
________ floods a computer with requests until it shuts down denying access to legitimate users.
 
  A) An encryption virus
  B) A DoS attack
  C) A polymorphic virus
  D) Port blocking

- - -

When you buy a textbook online from Amazon.com, you are participating in ________ e-commerce.
 
  A) B2B
  B) C2A
  C) A2C
  D) B2C
Read 49 times
1 Reply
Replies
Answer verified by a subject expert
kodama55kodama55
wrote...
Top Poster
Posts: 779
6 years ago
Sign in or Sign up in seconds to unlock everything for free
1

Related Topics

JOHNJAAJ12 Author
wrote...

6 years ago
Thanks for your help!!
wrote...

Yesterday
Correct Slight Smile TY
wrote...

2 hours ago
Thanks
New Topic      
Explore
Post your homework questions and get free online help from our incredible volunteers
  859 People Browsing
 171 Signed Up Today
Related Images
  
 328
  
 2858
  
 303
Your Opinion
What percentage of nature vs. nurture dictates human intelligence?
Votes: 432