1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mashcka [7]
3 years ago
11

While using a Web-based order form, an attacker enters an unusually large value in the Quantity field. The value she entered is

so large that it exceeds the maximum value supported by the variable type used to store the quantity in the Web application. This causes the value of the quantity variable to wrap around to the minimum possible value, which is a negative number. As a result, the Web application processes the order as a return instead of a purchase, and the attacker's account is refunded a large sum of money. What type of attack has occurred in this scenario
Computers and Technology
1 answer:
maxonik [38]3 years ago
6 0

Answer: integer overflow

Explanation:

The type of attack has occurred in this scenario is a integer overflow. An integer overflow occurs when there's an attempt by an arithmetic operation to create a numeric value which is outside the range which the given numbers are able to represent.

In this, the integer overflow occurs when the result of the integer operation cannot be able to fit in the allocated memory space which then brings about an unexpected result.

You might be interested in
What is the output of the following code snippet? int i = 1; while (i != 9) { System.out.print(i + " "); i++; if (i == 9) { Syst
Monica [59]

Answer:

1 2 3 4 5 6 7 8 End

Explanation:

int i = 1;

while (i != 9){

  System.out.print (i + " ");

  i ++;

  if (i == 9){

     System.out.println("End");

  }

}

7 0
2 years ago
Determine the value of X if (211) base x = (152) base 8, how to do this?
Alex
 we translate the following statement given in terms of logarithms. 211 base x can be expressed into log 211 / log x while 152 base 8 can be expressed int o log 152 over log 8. In this case,
log 211 / log x = log 152 / log 8log x = 0.962x = 10^0.962 = 9.1632
7 0
3 years ago
Felicia is a computer programmer.
dolphi86 [110]

A: SSD, HDD, CPU or RAM

Whether you go with the faster SSD or slower but larger HDD, keep in mind you may end up needing a drive large enough to run a dual boot system if you plan on coding in multiple environments. Virtualization of other operating systems is another option, but that requires a fast CPU and a large amount of RAM to work well.

B: Ram because its larger than the others, and will work better.

C: i don't really have a suggested system but here

You may appreciate the seamless experience iOS offers, the flexibility of Android or the familiarity of Windows with your everyday PC. It might take some time to acclimate to a new system, so it may be best to stick with what you know.

Please consider marking brainliest.. thx

8 0
3 years ago
Some problems are better solved by a computer and some are better solved by humans.
aalyn [17]

Answer:

I say when u don't know the answer completly.

3 0
3 years ago
How operands are fetched from or stored into memory using different ways?
Mila [183]
<span>The operand is part of the instruction and is fetched from code memory following the instruction opcode.
</span><span>The value is stored in memory, and the specific address is held in a register</span>
6 0
4 years ago
Other questions:
  • Walter’s health insurance premium increased by 22 percent this year. Now he pays $488 every month for health insurance. What was
    10·1 answer
  • Identify requirements that should be considered when determining the locations and features of firewalls. What are some importan
    5·1 answer
  • Which social network site has 1.5 billion actives users per month?
    15·1 answer
  • Which term refers to the blank areas surrounding a document page? *
    15·1 answer
  • _____________ describes the abstraction of web-based computers, resources, and services that system developers can utilize to im
    12·1 answer
  • Which of the following is a real job title on The interactive media career pathway?
    6·2 answers
  • How are web design &amp; web development different from each other?
    9·1 answer
  • Which type of protocol allows for a secure data transmission using encryption methods?
    7·1 answer
  • Who is your favorite person from squid game?
    13·2 answers
  • A system administrator issues the command ps on a server that is running the Linux operating system. What is the purpose of this
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!