1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Amanda [17]
3 years ago
12

A hacker tries to compromise your system by submitting script into a field in a web application that is then stored as data in t

he web site database. The hacker is anticipating when you navigate to the site that your browser will parse the script and execute it. What type of attack is this?
A. Buffer overflow
B. SQL injection
C. Folder traversal
D. Cross-site scripting
Computers and Technology
2 answers:
Sonja [21]3 years ago
5 0

Answer:

D Cross-site Scripting

Explanation:

sdas [7]3 years ago
3 0
D cross-site scripting
You might be interested in
You want to multiply 50 in cell D3 by 8.90 in cell E3. Which formula should you use?
Effectus [21]

Answer:

The formula is =D3*E3

Explanation:

To multiply the items in 2 cells, the formula like every other in excel begins with = .

to multiply 50 in cell D3 by 8.90 in cell E3 the formula to be used is

=D3*E3

This will multiply the numbers in both cell and show as 445.

7 0
4 years ago
What is a computing event
Firdavs [7]

Answer:

an event in a computing contex, is an action or occurence that can be identifided by a program and has significance for system hardware or software. events can be user- generated such as keystrokes and mouseclicks, or system generated, such as program loading,running out of memory and errors.

Explanation:

HOPE IT HELPS PO(◍•ᴗ•◍)❤

3 0
3 years ago
1. Write a while loop that lets the user enter a number. The number should be multiplied by 10, and the result assigned to a var
shutvik [7]

Answer:

import java.util.Scanner;

public class num6 {

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       int product=0;

       do{

           System.out.println("Enter a number");

           int num = in.nextInt();

           product = num*10;

           System.out.println("The product is " + product);

       }while (product<100);

  }

}

Explanation:

In the Java program above, The user will be prompted to enter a number.

The number is multiplied by 10 and assigned to a variable called product.

A do....while loop has been implemented to check the variable product

As long as this variable is less than 10, the user will be prompted to enter another number.

3 0
3 years ago
At the Transport layer of the OSI, what is used to find and communicate with a particular application running on a host?
ivanzaharov [21]

Answer:

Port number

Explanation:

Port numbers are used in the identification of a particular process for forwarding some form of network message such as the internet when it reaches a server. It is usually a 16-bit integer that is unsigned and found in header that is appended to a message unit.  At the OSI transport layer, port numbers are used in searching and communicating with a specific application that is running on a host server.

4 0
3 years ago
Name 6 examples of how telemedicine is used in healthcare
swat32

Answer:

The digital transmission of medical imaging, remote medical diagnosis and evaluations, and video consultations with specialists are all examples of telemedicine.

Explanation:

3 0
3 years ago
Other questions:
  • Which spereadsheet type will determine<br> how well a bussiness has done over the past year
    11·1 answer
  • A(n) ____ database is an application appropriate for an object-oriented database that contains text links to other types of docu
    7·1 answer
  • Where can you make changes to AutoCorrect?
    14·2 answers
  • You are required to design a 4-bit even up-counter using D flip flop by converting combinational circuit to sequential circuit.
    15·1 answer
  • The file format that an application can always open a named collection of data on a storage medium such as a hard disk or usb fl
    13·1 answer
  • Which principle suggests that specific single responsibility interfaces are better than one general purpose interface?
    13·1 answer
  • Write a Unix (Linux) find-like command (myFind) in Python3 where the function will return the full paths of all the files contai
    9·1 answer
  • Which UML relationships should be used between a subclass and a superclass? For example, suppose there is an interface or abstra
    5·1 answer
  • Look at (d), is it accurate? ​
    9·2 answers
  • Which is the smallest form of data <br>a)bit <br>b)byte<br>c)nibble<br>d)8 binary digits<br>​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!