Answer:
This is what we call SQL Injection.
• SQL Injection is when an attacker compromises your database only if it is vulnerable.
• Vulnerability includes leaving an empty ""(value) or forgetting to close anything that could be attacked.
• Ways to prevent injection is to not use string concatenation.
(<em>ex.</em> "hello" + "world")
* Use parameterized queries.
* Immediately get rid of any unused code.
What’s a warning? how do i get one haha
Answer:
For undirected graph n(n-1) for directed graph 
Explanation:
The maximum number of edges for a undirected graph is given by
, where n is number of vertices
The maximum number of edges in directed graph is given by
, where n is number of vertices
The maximum number of edges is greater in undirected graph than directed graph
Answer:
hardware
Explanation:
A voltmeter can be defined as an electrical device used for measure voltage level or the amount of voltage present in a circuit.
In this scenario, an electrician uses a device called a volt meter. The volt meter is an example of hardware.
A hardware refers to any device, machine or equipment that can be handled physically (touched) and seen with the naked eyes. Other hardware components of a computer includes monitor, speaker, central processing unit, motherboard, hard-drive, joystick, mouse, keyboard, etc.
On the other hand, software component of a computer comprises of software application or program that are used by the computer to manage or control software application, computer hardware and user processes. Some examples of software components are operating system, registry keys, antivirus, media player, word processor, etc.
I think the answer is c GIMP