Answer:Weak session ID generation algorithm
Explanation: Session hijacking is the hacking by disguising as the authenticated user and illegally exploit the particular computer session. IP packets are invoked by the disguised attacker into the active session between the legal computer user. It is also called session key.
It gives the hacker to use the data and services of the computer in an unauthorized manner. It arises due to the session of communication are not secure and strong,key used for session is weak etc.
Answer:
The correct answer is JQuery
Explanation:
JQuery
uses CSS to access and manipulate HTML elements.
Answer:
a string
Explanation:
bcz that's the only answer
Answer:
D. When the snowball leaves the play area on the bottom
Answer:
Cursor is the temporary area created when the SQL statement is executed.
Explanation:
Data base management system allows
Entering Data
Housekeeping
Querying data
Printing reports
Cursor contains the information about the selected statement and the rows data accessed by it. This space is used to store the data retrieve from data base
A cursor is used to get rows from the query that has many rows in its result sets a cursor is work as a handle and identifier in SQL query. it is very necessary in SQL because it is an object which is used to store the output of query.
A cursor is used to retrieve rows from a query that has multiple rows in its result set. A cursor is a handle or an identifier for the SQL query and a position within the result set.