1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
astraxan [27]
3 years ago
5

Adam is evaluating the security of a web server before it goes live. He believes that an issue in the code allows an SQL injecti

on attack against the server. What term describes the issue that Adam discovered?
Computers and Technology
1 answer:
allsm [11]3 years ago
4 0

Answer:

Vulnerability

Explanation:

Vulnerability: In information security, Vulnerability is defined as a weakness or flaw in the system which leaves it wide open to attackers to gain sensitive/confidential information and cause severe damage to the organization.

What can happen?

If this weakness doesn’t get treated, then the SQL injection attack is most likely to happen which will result in sensitive database being stolen by the hackers. This can cause serious implications for any organization hence it very important to take such vulnerabilities very seriously and dealt accordingly.

You might be interested in
If your database is in archivelog mode, how can you force an archive?
MA_775_DIABLO [31]

Answer: (B) Issue an alter system switch logfile command.

Explanation:

 When the database is in the archive log mode then, the issue in the alter system switch logfile command force the particular switch. It basically produce achieve redo log which is smaller in the size by the dedicated size of the parameter log buffer.

It also govern the particular size of the RAM (Random access memory) buffer by redo log.  This command is basically faster to return in the program by the use of redo log.

On the other hand, all the options are incorrect as this command only alter the system and does not alter the database. Therefore, Option (B) is correct.

 

8 0
3 years ago
The _____ component of a decision support system (DSS) includes mathematical and statistical models that, along with the databas
Ira Lisetskai [31]
Model Base. Hope it helps
5 0
3 years ago
The camera on a phone or laptop can be used to track a user's eye movements. Which of these is NOT one of the possible applicati
AnnyKZ [126]

Answer:

The question is incomplete. The full question is the following one:

"The camera on a phone or laptop can be used to track a user's eye movements. Which of these is NOT one of the possible applications of this technology (as listed in the course reading):

All of these ARE:

Measuring the user's intelligence,

Gathering marketing information for advertisers,

Detecting cognitive disorders."

The correct answer is: "Measuring the user's intelligence".

Explanation:

This technology is also known as eye tracking technology and has to do with a sensor that tracks eye movement and interaction with machines, such as mobiles and computers. The only option which does not apply to this technology and its features is the first one, "Measuring the user's intelligence", because "intelligence" is very subjective and abstract, it is not something a sensor can measure, although eye tracking technology can measure the amount of production concerning certain topics, the level of interest, attention, and interaction, and some cognitive disorders people behave, such as Attention Deficit Hyperactivity Disorder (ADHD). Besides that, companies, agencies, and institutional systems may track and gather people's eye movements in order to share them with other companies, agencies, and institutions for improving marketing, production, and interests.

(ps: mark as brainliest, please?!)

8 0
2 years ago
It creates an SQL statement to find the project that has the most employees from the same department. If more than one project m
NARA [144]

Answer:

Check the explanation

Explanation:

As per requirement submitted above kindly find below solution.

This demonstration is using SQL Server.

Table Names used as

department

project

works_on

SQL query :

select proj_name,dept_name,count(emp_no) as 'most employees ' from

project,department,works_on

where

project.proj_no=works_on. proj_no and

department. dept_no=works_on. dept_no

group by proj_name,dept_name

having count(emp_no)=(

select max(empCount) from (

select proj_name,dept_name,count(emp_no) empCount from project,department,works_on where project. proj_no=works_on. proj_no and department. dept_no=works_on. dept_no

group by proj_name,dept_name) as emp);

6 0
3 years ago
How does a computer work
ivann1987 [24]

Answer:

computer works on electricity

Explanation:

6 0
2 years ago
Other questions:
  • Explain how the principles underlying agile methods lead to accelerated development and deployment of software.
    6·1 answer
  • Whats the Sioux City school wifi?
    15·2 answers
  • Not providing guarding or fall protection for workers on a 25-foot scaffold. The resulting fall would most likely end in death,
    6·1 answer
  • What specific type of tools can assist teams by identifying attacks and indicators of compromise by collecting, aggregating, and
    8·1 answer
  • You run the ipconfig command on your computer, and it reports an IP address of 169.254.75.10 on the Ethernet interface. Which de
    8·1 answer
  • 1. Caches are important to providing a high-performance memory hierarchy to processors. Below is a list of 32-bit memory address
    7·1 answer
  • Jim wants to buy a car, but he’ll probably only need it for a couple of years. He has a short commute to work, so he won’t be pu
    10·1 answer
  • When does MMF2 inactivate an Active object? A. When the score is higher than the game's previous high score B. When the player d
    15·1 answer
  • Is spin to win paying or is a scam app​
    6·2 answers
  • What type of databases is not limited by the data’s physical location?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!