1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elanso [62]
2 years ago
12

What does an SQL injection do

Computers and Technology
2 answers:
garri49 [273]2 years ago
8 0
SQL injection is a code injection technique, used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker).
Afina-wow [57]2 years ago
3 0

Answer:

SQL injection is a form of hacking that uses user input fields.

Explanation:

SQL injection is when a piece of code or entire algorithm is input where a program prompts for user input. They can be used to change or access data. To prevent this, a programmer should scrub inputs. Scrubbing data removes slashes and arrows, which or commonly used in code.

You might be interested in
Bcghxdfghncfghndfgxdfgjfjgktyerdgftguj
IgorLugansk [536]

Answer:

Okay

Explanation:

4 0
3 years ago
Read 2 more answers
What is a grant cycle?
Lina20 [59]

Answer:

The grant lifecycle refers to the entire process a grant goes through—from creating the opportunity through implementation and ending with the closeout.

Explanation:

... The grant lifecycle is comprised of three distinct phases: Pre-Award, Award, and Post Award. Hope that this helps you and have a great day :)

5 0
2 years ago
Read 2 more answers
.9 What is Artificial Intelligence?
Serhud [2]
C because bread is not happy with you
8 0
3 years ago
Which of the following is not true of client-server applications?
Sliva [168]

Answer:

B.

Explanation:

Client-server application is a relationship between a client and a server.

In this relationship, the client (a program) requests a service from the server (the other resource).

The statement that is not true about the client-server applications is they include smart phones, tablets, iPads, laptops, desktop computers.

Rest of the statements concerning client-server relationship are true.

Therefore, option B is the answer.

3 0
3 years ago
Suppose Pentax develops a new photo editing software and negotiates agreements with a Vietnamese manufacturer to assemble most P
Elis [28]

Answer:

Contract manufacturing

Explanation:

Contract manufacturing involves outsourcing a portion of a manufacturing process of a product to another company.

5 0
3 years ago
Other questions:
  • The file extensions .webm, .m4v, and .ogv are used for:
    15·1 answer
  • There are a multitude of items that Cyber Security professionals view as attack vectors but none are more prevalent and exploita
    13·1 answer
  • Direct connections provide continuous access to the Internet. Many bandwidth options are associated with direct connections. Whi
    9·1 answer
  • 1) List at least five smaller behaviors you could break the complex behavior "brushing my teeth" into.
    14·2 answers
  • All computers perform disk optimization utilizing the same software.<br><br> true <br> false
    11·1 answer
  • Which of the following is the best example of an installation issue?
    6·2 answers
  • Which statement uses the example type of context clue for the underlined word?
    5·2 answers
  • Please tell fast plzzzzzzz​
    11·1 answer
  • How can you make a search phrase more effective?
    11·1 answer
  • Explain briefly how learning how to follow can make a person a good leader
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!