1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
astraxan [27]
3 years ago
5

Adam is evaluating the security of a web server before it goes live. He believes that an issue in the code allows an SQL injecti

on attack against the server. What term describes the issue that Adam discovered?
Computers and Technology
1 answer:
allsm [11]3 years ago
4 0

Answer:

Vulnerability

Explanation:

Vulnerability: In information security, Vulnerability is defined as a weakness or flaw in the system which leaves it wide open to attackers to gain sensitive/confidential information and cause severe damage to the organization.

What can happen?

If this weakness doesn’t get treated, then the SQL injection attack is most likely to happen which will result in sensitive database being stolen by the hackers. This can cause serious implications for any organization hence it very important to take such vulnerabilities very seriously and dealt accordingly.

You might be interested in
What is a computer.<br> who made it , why they made it, and were
blsea [12.9K]
A computer helps us learn connect to people and play games the person who made it was Charles Babbage he made computers in London and it was made by 1791 to 1871 they made it so we can learn see people from far and play
5 0
3 years ago
Something that requests data from a server is known as a ____.
rosijanka [135]

Answer:

It is  called a client.

Explanation:

Any entity that request data from a centralized node in a network (which is called a server, because once received a request, it replies sending the requested piece of data back to the requester) is called a client.

The server can adopt different names based on its role: It can be a file server, an application server, a web server, a mail server etc.

This sharing information paradigm, where the resources are located in one host (server) to be distributed to many hosts (clients)  is called client-server model.

3 0
3 years ago
The following is a training dataset that has ten one dimensional objects.
grandymaker [24]
Yes no no false . . . .
6 0
3 years ago
Làm thế nào để hack mật khẩu trên 1 trang web
Kaylis [27]
Heuwieieididbzhdysudududhhxydydy
3 0
3 years ago
Read 2 more answers
Write the following function without using the C++ string class or any functions in the standard library, including strlen(). Yo
mixer [17]

Answer:

The function in C++ is as follows

int chkInd(string str1, string str2){    

int lenstr1=0;

while(str1[lenstr1] != '\0'){  lenstr1++;  }

int index = 0; int retIndex=0;

for(int i=lenstr1-1;i>=0; i--){

   while (str2[index] != '\0'){

       if (str1[i] == str2[index]){

           retIndex=1;

           break;         }

       else{   retIndex=0;      }

  index++;    }

  if (retIndex == 0){   return i;   }else{return -1;}}

}

Explanation:

This defines the function

int chkInd(string str1, string str2){    

First, the length of str1 is initialized to 0

int lenstr1=0;

The following loop then calculates the length of str1

while(str1[lenstr1] != '\0'){  lenstr1++;  }

This initializes the current index and the returned index to 0

int index = 0; int retIndex=0;

This iterates through str1

for(int i=lenstr1-1;i>=0; i--){

This loop is repeated while there are characters in str2

   while (str2[index] != '\0'){

If current element of str2 and str1 are the same

       if (str1[i] == str2[index]){

Set the returned index to 1

           retIndex=1;

Then exit the loop

           break;         }

If otherwise, set the returned index to 0

       else{   retIndex=0;      }

Increase index by 1

  index++;    }

This returns the calculated returned index; if no matching is found, it returns -1

  if (retIndex == 0){   return i;   }else{return -1;}}

}

5 0
3 years ago
Other questions:
  • Zack wants to be a landscape designer.which qualification would be best prepare him for work in this career
    12·2 answers
  • Mention any six profession related to tourism
    6·2 answers
  • legacy application that has hard-coded static IP addresses and is running on an EC2 instance, what is the best failover solution
    11·1 answer
  • The domain in an email message tells you what?
    11·1 answer
  • What is Server Message Block (SMB) used for in Windows and can a hacker still damage a network using SMB?
    9·2 answers
  • Why do people still use Intel HD graphics for gaming?
    8·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    9·2 answers
  • Como se diz saia em inglês​
    14·2 answers
  • ____ storage is not recommended for long-term archiving because the storage media can degrade over time
    15·1 answer
  • personalization allows customers to modify the standard offering, such as selecting a different home page to be displayed each t
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!