The term vulnerability describes the issue that Adam discovered.
b. vulnerability
<u>Explanation:</u>
SQL injection attack is an attack in which an external party can execute SQL commands on the database that serves as a back-end for a particular website. The SQL commands can be used to modify the contents of the website, modify the records, delete the records, and retrieve confidential information as well.
As Adam believes that the code has an issue that allows a SQL injection attack, the term that best describes the issue that he discovered is vulnerability. The website is vulnerable since the code does not have a proper procedure to tackle a situation of SQL injection attack.
Answer:A conversation between co-workers
Explanation:
It stores data and retrieving digital information using one or more rigid rapidly rotating disks (platters) coated in magnetic material
Answer:
b. Any metadata that an online tool produces (for example, data about a student’s usage of a tool, or how much time it took them to take an assessment or look at a video) is not protected if it is not tied to any identifying information.
Explanation:
The content form educational tools that are online that is not protected under FERPA(Family Education Rights and Privacy Act) is any metadata that is produced by the online tool.That metadata can contain data about student's usage of a tool etc.
FERPA governs the access educational information and records by public entities.