1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zvonat [6]
3 years ago
14

Which web application attack is more likely to extract privacy data elements out of a database?

Computers and Technology
1 answer:
klasskru [66]3 years ago
6 0
<span>The answer is SQL Injection
</span>
This kind of attack is the most prone to extract privacy data elements out of a database. An SQL injection like any other attack may take several attempts to pull it off and is more likely to extract private data. With admin rights or escalated priviledges, SQL injections can be used to enter the database.







You might be interested in
Write a function which sorts the queue in order from the smallest value to the largest value. This should be a modified version
PilotLPTM [1.2K]

Answer:

#include <iostream>

using namespace std;

void swap(int *a,int *b){    //function to interchange values of 2 variables

   int temp=*a;

   *a=*b;

   *b=temp;

}

void sort(int queue[],int n)

{

   int i,j;

   for(i=0;i<n;i++)      //to implement bubble sort

   {

       for(j=0;j<n-i-1;j++)

       {

           if(queue[j]>queue[j+1])

               swap(queue[j],queue[j+1]);    //to swap values of these 2 variables

       }

   }

}

int main()

{

   int queue[]={6,4,2,9,5,1};

   int n=sizeof(queue)/4;  //to find length of array

   sort(queue,n);

   for(int i=0;i<n;i++)

       cout<<queue[i]<<" ";

   return 0;

}

OUTPUT :

1 2 4 5 6 9

Explanation:

In the above code, Queue is implemented using an array and then passed to a function sort, so that the queue can be sorted in ascending order. In the sort function, in each pass 2 adjacent values are compared and if lower index value is greater than the higher one they are swapped using a swap function that is created to interchange the values of 2 variables.

7 0
3 years ago
The security manager assigned a new security administrator the task of implementing secure protocols on all wireless access poin
Marysya12 [62]

Answer:

Good choice, as its one of the most secure wireless communications encryption methods, even though WPA2 would be the best

Explanation:

8 0
4 years ago
If you want to create programs with more detailed images, maybe even characters that you could interact with, what pieces of inf
Oliga [24]

The pieces of information needed in the code to create a more detailed program are the sprite objects

<h3>What are sprites?</h3>

Sprites are program objects that are used in a program to add more features such as detailed images, characters and animations in the program.

The sprite objects are dragged and dropped on the program

Hence, the pieces of information needed are the sprite objects

Read more about object-oriented program at:

brainly.com/question/25649719

6 0
2 years ago
Which option ensures that page break is automatically inserted ahead of a specific paragraph or heading?
xxTIMURxx [149]

Answer:

The "Page breaks before" option is the correct approach.

Explanation:

  • This attribute specifies whether such a page interruption could perhaps appear just before any component to something which applies.
  • This says that you would like this particular section to succeed at the beginning of that same page, irrespective of what it's about, they are being used for paged multimedia, for example, printed publications and otherwise texts or paperwork.
7 0
3 years ago
Pls help!!
alexira [117]

Answer:

4.24

Explanation:

First you find the mean of the data set, which is 7. Then to find standard deviation you have to follow the formula which tells you to subtract the mean from each number under the square root : √(2 - 7)^2 + (9 - 7)^2 + (10 - 7)^2 + (4 - 7)^2 + (8 - 7)^2 + (4 - 7)^2 + (12 - 7). Once you solve the parenthesis you square it, once you square it the negatives won't matter. That will leave you with this : √(25 + 4 + 9 + 9 + 25). The formula tells you to find the sum of those numbers (which is 72) then subtract one from how many numbers there are, 5 - 1 = 4, and divide your sum by that number. So 72 / 4 = 18. Then you find the square root of 18 and that becomes your answer.

7 0
2 years ago
Other questions:
  • What type of code was Pinterest Pin button created in?
    10·1 answer
  • Write a statement that declares an int variable named count.
    9·1 answer
  • How USB FLASH Drives Store Data? Explain, Maximum 5 linesa
    10·1 answer
  • A(n) _________ is a formal access control methodology used to assign a level of confidentiality to an information asset and thus
    6·1 answer
  • The section of the browser window highlighted in yellow is the _____.
    11·1 answer
  • When you buy software, you then own it and can do anything you’d like with it, including giving it to friends to install on thei
    12·1 answer
  • What happens when you apply a theme to a form?
    14·1 answer
  • Write a program to change background colour of your visual basic form with any 3 different events.​
    15·2 answers
  • This is due in like an hour but I'm confused so please do lend assistance
    6·1 answer
  • And<br>Why the computer is called dilligent<br>Versatile machine?give long answer ​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!