________ floods a computer with requests until it shuts down and refuses to answer any requests for information

A) A polymorphic virus B) Pretexting
C) A Trojan horse D) A DDoS attack


D

Computer Science & Information Technology

You might also like to view...

Which of the following would be the most appropriate to use to locate a specific file or app?

A) Windows Defender B) Switch list C) File Explorer D) Internet Explorer

Computer Science & Information Technology

Match the following terms with their description

I. File Explorer II. Window III. Ribbon IV. Title bar V. Address bar A. Contains control buttons to minimize, maximize, restore down, and close a window B. A rectangular frame that displays a program, folder, or file C. Formerly known as Windows Explorer D. Includes Back and Forward buttons in File Explorer E. Allows users to interact with the operating system using tabs at the top of the File Explorer screen

Computer Science & Information Technology

You can move to the previous or next sheet by pressing the ____ keys.

A. Alt + Page Up or Alt + Page Down B. Ctrl + Page Up or Ctrl + Page Down C. Tab + Page Up or Tab + Page Down D. F4 + Page Up or F4 + Page Down

Computer Science & Information Technology

Rogue Wi-Fi hotspots imitate free hotspots and capture information, such as usernames and passwords, sent by users to legitimate sites.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology