1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zalisa [80]
4 years ago
15

What occurs when an application sends user-fed data directly to a web browser without authenticating or deleting the content? Cr

oss-site occurs when an application sends user-fed data directly to a web browser without authenticating or deleting the content.
Computers and Technology
1 answer:
Lina20 [59]4 years ago
6 0

Cross-Site Request Forgery

CSRF is a type of a malicious exploit or an attack vector that forces a user to transmit unauthorized commands that the web application trust. Malicious websites can transmit such commands through hidden forms or specially crafted image tags. Unlike Cross-Site Scripting (XSS) where the victim’s trust for a website is exploited, the website’s trust in CSRF for a victim’s browser is exploited.

You might be interested in
You are going to interview a small business owner about creating a database for his sandwich shop and bakery. Make a list of que
sveticcg [70]

Answer:

  1. what is your background? education  and work experience?
  2. Tell about description of your business.
  3. How society will be benefited by our business?
  4. What skills are necessary to run this business?
  5. Do you know who are your competitors?
  6. How will you launch your business in market ? How will you make people aware of your business?
  7. Where do you see your business in upcoming years?
  8. What will you do with the profits?
  9. What if u face all loss in this business any other option?
  10. Do you have employees for this business?

7 0
3 years ago
ASAP PLS I DON T HAVE ENOUGH TIME
velikii [3]

Answer:

The font-style property allows you to make text appear italicized (i.e. sloped, or slanted).

em {

 font-style: italic;

}

Explanation:

This property accepts one of three possible values: normal, italic, and oblique.

If a given font family has an italic or oblique face embedded, the browser will select that face. If no italic or oblique face is available, the browser will mimic the sloping effect. If italic is defined and there is no italic face available, the browser will look for an oblique face before it tries to mimic the italic. The same applies to oblique; it too will look first for an italic face.

To prevent the browser from adding a mimicked, or synthesized, version of the italic or oblique face, you may use the font-synthesis property (if supported).

8 0
2 years ago
Which of the following is true of Shareable Content Object Reference Model (SCORM)? Group of answer choices guidelines that allo
dalvyx [7]

Answer:

The correct answer to the following question will be Option B (Control how well the e-learning artifacts interact technically with LMS).

Explanation:

SCORM seems to be a compilation of requirements and criteria for commodities used during e-learning. This describes the different ways to communicate here between information or data on the customer side as well as the run-time context.

  • The specification also specifies how to bundle e-learning material for functionality, this is achieved by using the Bundle Exchange Format, an exchangeable ZIP file.
  • It is essentially a manual that informs developers as well as content providers on how to make their apps or programs compliant with several other e-learning apps including applications.

The other three options are not related to the given scenario. So that option B is the right answer.

6 0
3 years ago
Write a program whose input is two integers and whose output is the two integers swapped.
Tpy6a [65]

Answer:

The program to this question can be given as:

Program:

#include <iostream>  //header file

using namespace std;   //using namespace.

void SwapValues(int* userVal1, int* userVal2); //function declaration.

void SwapValues(int* userVal1, int* userVal2) //function definition.

{ //function body.

//perform swapping

   int t = *userVal1;  

   *userVal1 = *userVal2;

   *userVal2 = t;

}

int main() //main method  

{

int n1, n2; //define variable

cout<<"Enter first number :"; //message

cin>>n1; //input by user.

cout<<"Enter second number :"; //message  

cin>>n2; //input by user.

SwapValues(&n1,&n2); //calling function.

cout<<"Swapped values"<<endl;

cout<<"first number is :"<<n1<<endl; //print value

cout<<"second number is:"<<n2<<endl; //print value

return 0;

}

Output:

Enter first number :3

Enter second number :8

Swapped values

first number is :8

second number is :3

Explanation:

The description of the above C++ language program can be given as:

  • In the program, firstly we include the header file. Then we declare and define a function that is "SwapValues()" function in the function we pass two integer variable that is "userVal1 and userVal2" inside a function, we define an integer variable that is "t" and perform swapping.  
  • Then we define the main function in the main function we define two variables that is "n1 and n2" this variable is used to take value-form user. then we pass this value to function and print the function values.

5 0
3 years ago
Java: which expression is evaluated first
nignag [31]

Answer:c ll d  

Explanation:

cus they are inside ()--parantheses

5 0
3 years ago
Other questions:
  • explain why the intangibility of software systems poses special problems for software project management.
    13·1 answer
  • A host sends a packet to a local server on the company's wired ethernet lan via an access point. how many frames are necessary f
    6·1 answer
  • Which of the following statements are true regarding Steve Jobs and Steve Wozniak? Select 3 options.
    5·2 answers
  • What is a premium?
    14·2 answers
  • in access, entering the search criteria "B?" would yield which of the following results? a. bentonville b. be c. brimingham d. b
    14·1 answer
  • Create a do-while loop that asks the user to enter two numbers. The numbers should be added and the sum displayed. The loop shou
    5·1 answer
  • Clicking a _____ name opens a drop-down list of commands and options. Select one: a. menu b. status bar c. ribbon d. toolbar
    15·1 answer
  • How do i solve this?
    11·1 answer
  • The Monte Carlo method is commonly used to approximate areas or volumes of shapes. In this problem, we will use Monte Carlo to f
    12·1 answer
  • Answer this pls ASAP
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!