________ floods a computer with requests until it shuts down and refuses to answer any requests for information
A) A polymorphic virus B) Pretexting
C) A Trojan horse D) A DDoS attack
D
Computer Science & Information Technology
You might also like to view...
A(n) DTD more precisely defines the structure of the data and specific data restrictions.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
A(n) _________ creates graphics and images for a website, including business logos, digital photography and enhancement, design elements, and other graphic images.?
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology