An intentional action designed to prevent legitimate users from making use of a computer service is called
a. a bombing run.
b. a curtain closer.
c. a denial-of-service attack.
d. an electronic overdose.
e. phreaking.
C
Computer Science & Information Technology
You might also like to view...
A ________ is a category or column of information in a data source
A) title B) header C) record D) footer
Computer Science & Information Technology
The _______ command is used to change a FAT partition to NTFS and preserve the data stored on the FAT partition
Fill in the blank(s) with correct word
Computer Science & Information Technology