1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Amanda [17]
3 years ago
12

A hacker tries to compromise your system by submitting script into a field in a web application that is then stored as data in t

he web site database. The hacker is anticipating when you navigate to the site that your browser will parse the script and execute it. What type of attack is this?
A. Buffer overflow
B. SQL injection
C. Folder traversal
D. Cross-site scripting
Computers and Technology
2 answers:
Sonja [21]3 years ago
5 0

Answer:

D Cross-site Scripting

Explanation:

sdas [7]3 years ago
3 0
D cross-site scripting
You might be interested in
Is OS X a mobile operateing system
hodyreva [135]
Hello Williamsdarlene,
After reading your question, the answer to this question is:
No, OS X is not a mobile operating system. It is for computers.

Hope this helps!
3 0
3 years ago
Read 2 more answers
A small company has a web server in the office that is accessible from the internet. the ip address 192.168.10.15 is assigned to
vaieri [72.5K]
the ip nat inside source command to link the inside local and inside global addresses

I hope this helps! :)
5 0
3 years ago
In this lab, you create a programmer-defined class and then use it in a C++ program. The program should create two Rectangle obj
MakcuM [25]

The program based on the information given is illustrated below.

<h3>What is a program?</h3>

A computer program simply means a sequence of instructions in a programming language that is created for a computer to execute.

It should be noted that computer programs are among the component of software.

The program to create two rectangle objects and get their area and perimeter is depicted:

// Rectangle.cpp

using namespace std;

class Rectangle

{

public:

// Declare public methods here

void setLength(double);

void setWidth(double);

double getLength();

double getWidth();

double calculateArea();

double calculatePerimeter();

private:

// Create length and width here

double length, width;

};

void Rectangle::setLength(double len)

{

length = len;

}

void Rectangle::setWidth(double wid)

{

// write setWidth here

width = wid;

}

double Rectangle::getLength()

{

// write getLength here

return length;

}

double Rectangle::getWidth()

{

// write getWidth here

return width;

}

double Rectangle::calculateArea()

{

// write calculateArea here

return length*width;

}

double Rectangle::calculatePerimeter()

{

// write calculatePerimeter here

return 2*(length+width);

}

// This program uses the programmer-defined Rectangle class.

#include "Rectangle.cpp"

#include <iostream>

using namespace std;

int main()

{

Rectangle rectangle1;

Rectangle rectangle2;

rectangle1.setLength(10.0);

rectangle1.setWidth(5.0);

rectangle2.setLength(7.0);

rectangle2.setWidth(3.0);

cout << "Perimeter of rectangle1 is " << rectangle1.calculatePerimeter() << endl;

cout << "Area of rectangle1 is " << rectangle1.calculateArea() << endl;

cout << "Perimeter of rectangle2 is " << rectangle2.calculatePerimeter() << endl;

cout << "Area of rectangle2 is " << rectangle2.calculateArea() << endl;

return 0;

}

/*

output:

The perimeter of rectangle1 is 30

The area of rectangle1 is 50

The Perimeter of rectangle2 is 20

The area of rectangle2 is 21

*/

Learn more about program on:

brainly.com/question/1538272

#SPJ1

8 0
2 years ago
In a public switched telephone network, lines are terminated at the central office.
FrozenT [24]

Answer:

True.

Explanation:

A Central office or local office in Metropolitan cities is a building or an office where the phone lines coming from a home or office are terminated and connected to a bigger switching system.Central office got the switching equipment which holds the ability to switch calls long-distances or locally.Hence we conclude that the answer is True.

5 0
4 years ago
Write a loop that inputs words until the user enters STOP. After each input, the program should number each entry and print in t
scoray [572]

Answer:

oh wowwwwwwwww

Explanation:

7 0
3 years ago
Read 2 more answers
Other questions:
  • Select the correct answer. Which statement is true about the guardian archetype?
    12·1 answer
  • What is the problem with the code snippet below? public class Test { public static void main(String[] args) { System.out.println
    6·1 answer
  • What is computer. Write full form of mips​
    15·1 answer
  • What is an Algorithm? (might not be in the chapter text). Give an example.
    13·1 answer
  • Monster Collector
    7·1 answer
  • Why I/O modules is needed between system bus<br>and I/O devices?​
    15·1 answer
  • Hard disk works on the following technologies: (i) Technology used within the hard drive to read &amp; write data to the drive a
    11·1 answer
  • A drive is small enough to be carried in one's pocket.
    6·1 answer
  • Noi needs to send some documents to a client in another company. Which device can she use to make digital copies of the paper fi
    13·2 answers
  • Computer science student jones has been assigned a project on how to set up sniffer. What just he keep in mind as part of the pr
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!