1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yulyashka [42]
3 years ago
13

Which vulnerability can occur if a programmer does not properly validate user input and allows an attacker to include unintended

SQL input that can be passed to a database?
Computers and Technology
1 answer:
sergiy2304 [10]3 years ago
6 0

Answer:

SQL injection

Explanation:

SQL injection is a vulnerability in databases that occurs when user input is not properly validated. Hackers are able to input SQL query statements to bypass the use of the actual user name and password to gain access to the account.

Using placeholders in programmed SQL statements mitigates the effects of SQL injection.

You might be interested in
What are the steps to creating a blank database? Use the drop-down menus to complete them.
Alenkasestr [34]

Answer:

What are the steps to creating a blank database? Use the drop-down menus to complete them.

click the file tab, and click new

Under the available Templates category, click Blank Database.

Specify a name and location for the database.

Click create.

Explanation:

Just did it on Edge :)

5 0
3 years ago
What is an Algorithm? (might not be in the chapter text). Give an example.
Rashid [163]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

An algorithm is the list of a finite set of instructions and rules that a computer needs to do to complete a task in order to solve a problem.

In short, an algorithm is a series of instructions that are implemented step by step to solve a problem. For example, you could consider a pizza recipe an algorithm for making a pizza in an everyday life routine. But when you are talking about using algorithms in computation and in mathematics. It means that solving a problem using a series of steps step by step.

For example, your everyday tasks aligned on a google calendar and remind you about your tasks using the alarm, etc- how to implement this using set of instructions and rules- is an algorithm.

Solving a quadratic equation is another example of an algorithm.

Binary search, array sorting are an example of an algorithm in computation. Because these algorithms based on the execution of step-by-step instruction to solve a problem such as sorting a list of numbers etc.  

6 0
3 years ago
Question 1 of 10 Which type of information systems personnel are involved in organizing information so that users can access it
sergij07 [2.7K]
Option D is correct. If we want multiple users to access data, we will organise that data in Database we can then be accessed whenever needed.
6 0
3 years ago
Information systems security is the collection of activities that protect the information system and the data stored in it.
ivann1987 [24]

Answer:

The answer is A. True.

Explanation:

Information systems security,refers to all the methods involved with assuring information integrity as well as keeping it confidential, and available.

It can also be defined as -

The detection and provisoon of solutions to security breaches.

Access controls, which prevents unauthorized system access.

Protection of information either in transit or in a storage area.

3 0
3 years ago
Why crt and plasma are not used in laptop ?​
AlekseyPX

Answer:

Plasma monitors are power hungry devices 2 - 3 times more than a CRT monitor making this technology unfit for use in portable devices like laptop computers where batteries are used as the power source. Plasma monitors are extremely susceptible to screen burn.

Explanation: pls mark my answer as brainlist

6 0
3 years ago
Other questions:
  • Write a program that calculates an adult's fat-burning heart rate, which is 70% of 220 minus the person's age. Complete fat_burn
    10·1 answer
  • Consider the following network: proxy-cache On average there are 35 objects downloaded per second, and the average object size i
    14·1 answer
  • A _______ area network is a type of wireless network that works within your immediate surroundings to connect cell phones to hea
    9·2 answers
  • Explain briefly the purpose of the Computer Management Console in Microsoft Windows.
    12·1 answer
  • Write a complete Java program called Stewie2 that prints the following output. Use at least one static method besides main. ////
    9·2 answers
  • Operating systems provide a measure of security by allowing users to access to those resources they've been cleared to use as we
    8·1 answer
  • In addition to paying $100 per month for health insurance, sam is responsible for paying her first $500 of medical bills every y
    10·1 answer
  • What is the term for an understanding about the processes that underlie memory, which emerges and improves during middle childho
    7·2 answers
  • Write pseudocode for the question below:
    15·1 answer
  • It is possible to create a share that is invisible to users browsing the network simply by appending what character to the end o
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!