1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
artcher [175]
4 years ago
14

An attacker tried to hack into the database of a reputed organization. The attacker inserted malicious code into the query of a

database. What type of attack was the attacker involved in?
A. input attack
B. spoofing
C. querying
D. phishing
E. forgery
Computers and Technology
1 answer:
babunello [35]4 years ago
4 0

a.) input attack is the correct answer

You might be interested in
Pls help now the question is very hard someone help me pls​
satela [25.4K]

Answer:

The answers are "Option a, Option b, Option d, and Option c".

Explanation:

  • The Traceroute utilizes the "Internet Control Message Protocol" for transmit and receive echo-request and echo-reply messages. This is most often used in the echo packets of specified interval to live (TTL) quantities.
  • The Transport layer will be the next but is usually directly linked with the same name layer in the OSI model. Functions involve message fragmentation, acknowledgment, traffic management, session parallelization, error detection, as well as message rearranging.
  • Leaders generally fully involve one or even more workers in design buildings.
  • 67 was its UDP port number which is used as the port number of a database. So although UDP port number 68 is being used by the client.
4 0
3 years ago
A spreadsheet is an example of a(n):
zhenek [66]

Answer:

general-purpose application

Explanation:

General purpose application

1. These are software applications which can be used for multiple purposes.

2. These applications perform various tasks as per the need of the user. These tasks can vary in complexity and may or may not be related to each other.

3. These applications are useful for almost all categories of users.

Example include spreadsheets which is a primary application for accounting purpose. It can also be used for to store numerical data or other data in an organized format.

Another use of spreadsheets is visible in data analysis. Graphs and charts can be created based on the given numerical data stored in the spreadsheet. This helps in business growth.

Microsoft Excel and Apple Numbers are spreadsheet applications.

Another example is a word application that can be used to prepare document, reports, and flyers also. Microsoft word is a word processor.

Specialized program

1. These are software applications which can be used for special purpose only.

2. These applications can perform only the task for which it is created.

Examples include windows media player. This application can only run media (audio or video) programs.

System application

1. These include operating system and utility applications.

2. The operating system acts as an interface between the user and the hardware resources of the computer.

For example, Windows is an operating system. It is available in various versions.

3. The computer system and its resources, both software and hardware, are maintained and optimized using utility applications.

Anti-virus is an example of utility applications. It protects the computer resources from virus.

Utility applications

4. The computer system and its resources, both software and hardware, are maintained and optimized using utility applications.

5. These applications are mandatory to smooth functioning of a computer.

For example, disk driver, file manager and back up applications help in managing disks and aid in taking back ups and file management is done by file manager

8 0
3 years ago
What is the most credible website or webpage you have ever visited? Why is it so credible? Describe some of the qualities that m
8_murik_8 [283]
— Look for Sites from Established Institutions.
— Look for Sites with Expertise
— Do not click on Commercial Sites
— Beware of Bias
— Check when it was last updated, so you get recent info.
— Check Links
— Avoid Anonymous Authors.
6 0
4 years ago
Read 2 more answers
Windows service accounts will use passwords consisting of at least
KonstantinChe [14]
<span>Windows service accounts will use passwords consisting of at least 15 characters</span>
7 0
4 years ago
Assuming you have a TCF free student checking account, how many maximum overdraft fees can you incur in one day?
kodGreya [7K]

Answer:

8

Explanation:

7 0
3 years ago
Other questions:
  • HURRRYY After pasting the information on the left side of the comparison slide, Jamal notices the text box extends beyond the bo
    9·1 answer
  • What is the new file system available in windows server 2012?
    9·1 answer
  • Assume that scotus is a two-dimensional character array that stores the family names (last names ) of the nine justices on the S
    6·1 answer
  • 11) Write the definition for a child class of Circle named Cylinder. The cylinder should have a double attribute named height. T
    12·1 answer
  • an IPv6 packet has a 40 byte base header, a 20 byte destination options extension header (which is not used for routing) and 200
    5·1 answer
  • Write multiple if statements: If carYear is before 1967, print "Probably has few safety features." (without quotes). If after 19
    11·1 answer
  • Write a Python program that asks the user for a positive, odd value. Once the value is validated determine if the number is Prim
    11·1 answer
  • Define a class Person that represents a person. People have a name, an age, and a phone number. Since people always have a name
    7·2 answers
  • Rewrite the following program segment using a while loop instead of a for loop.
    11·1 answer
  • 1. Technician A says you can identify a hybrid vehicle by the badging on the engine cover. Technician B says you can identify a
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!