1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Serga [27]
3 years ago
11

Adam is evaluating the security of a web server before it goes live. He believes that an issue in the code allows an SQL injecti

on attack against the server. What term describes the issue that Adam discovered?
A. threat
b. vulnerability
c. risk
d. impact
Computers and Technology
1 answer:
givi [52]3 years ago
7 0

The term vulnerability describes the issue that Adam discovered.

b. vulnerability

<u>Explanation:</u>

SQL injection attack is an attack in which an external party can execute SQL commands on the database that serves as a back-end for a particular website. The SQL commands can be used to modify the contents of the website, modify the records, delete the records, and retrieve confidential information as well.  

As Adam believes that the code has an issue that allows a SQL injection attack, the term that best describes the issue that he discovered is vulnerability. The website is vulnerable since the code does not have a proper procedure to tackle a situation of SQL injection attack.

You might be interested in
Give your definition of a view. Based on the Academic Database, identify and describe a scenario where it would be necessary to
il63 [147K]

Answer:

A database view is a searchable object in a database that is defined by a query. Though a view doesn't store data, some refer to a views as “virtual tables,” you can query a view like you can a table. A view can combine data from two or more table, using joins, and also just contain a subset of information.

Explanation:

A database view is a subset of a database that is based on a query that runs on one or more database tables. Database views are saved in the database as named queries and can be used to save complete queries that are frequently used.

7 0
3 years ago
The ____ function displays the highest value in a range.
Monica [59]
Max()

------------------------------------------------------------
5 0
4 years ago
Read 2 more answers
You've just installed a new video card in a user's Windows workstation. When the system is powered on the screen is blank. You
valentinak56 [21]

After having verified that the video cable is installed correctly we should check to see that the computer's RAM is correctly fastened to the motherboard and functional.

The question states that the video card being installed is new, therefore we can comfortably assume that the card itself is not the issue. Other computer components that can cause a blank screen immediately upon powering on the workstation are:

  • RAM
  • Hard drive
  • Bad video driver.
  • Monitor input is faulty

however, assuming the installation was performed correctly, it is not likely to be caused by a bad video driver and a faulty monitor input is very improbable given that there are very few ways this can break to begin with.

A bad or missing hard drive may cause this kind of issue because the workstation will not have a windows file to boot. In most cases, this will not cause a completely blank screen without first allowing access to the BIOS.

After having verified that the video cable is installed correctly, the very next thing you should check is if the RAM is installed correctly. This is because the issue explained is exactly what will happen if a workstation attempts to boot without RAM, and also because it is the easiest fix among the possible causes and any troubleshooting should always be performed in order from the easiest fix to the most difficult.

To learn more visit:

brainly.com/question/2160588?referrer=searchResults

8 0
3 years ago
What is an example of a situation in which you might use the append method? In what ways is the append method limited?
Oksanka [162]
If I had an array of the names of people who just walked in the door. I’d append the name of the person who came in next. To update the array.

The append method needs to be looped through to add multiple inputs
5 0
3 years ago
Is MS DOS a network operating system?​
chubhunter [2.5K]

Answer:

Operating systems now use networks to make peer-to-peer connections and also connections to servers for access to file systems and print servers. The three most widely used operating systems are MS-DOS, Microsoft Windows and UNIX.

Explanation:

7 0
3 years ago
Other questions:
  • . Write a recursive function names factorial to compute the factorial of the parameter. Also write the main function, where you
    15·1 answer
  • What is the role of the osi application layer? provides control of all the data flowing between the source and destination devic
    5·1 answer
  • Which of these are forms of data? Check all that apply.
    8·2 answers
  • Identify the use of queue in the process of spooling output to a printer.
    15·1 answer
  • 2. The factorial of a positive integer n is the product of the integers from 1 to n. You can express the factorial of a positive
    6·1 answer
  • 100 tickets are sold in a raffle with one prize. John has 8 tickets, Jamie has 10 tickets, find the probability that John wins
    11·2 answers
  • Digital on a smart phone means the camera is actually zooming in on the photo itself not the subject that you are shooting true
    8·1 answer
  • Explain one way in which programmers may get hired.
    9·1 answer
  • Search the Web for three different employee hiring and termination policies. Review each and look carefully for inconsistencies.
    5·1 answer
  • Which of the following statement is correct ? A . potential difference is measured by ammeter . B . The unit of potential differ
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!