1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mashcka [7]
3 years ago
11

While using a Web-based order form, an attacker enters an unusually large value in the Quantity field. The value she entered is

so large that it exceeds the maximum value supported by the variable type used to store the quantity in the Web application. This causes the value of the quantity variable to wrap around to the minimum possible value, which is a negative number. As a result, the Web application processes the order as a return instead of a purchase, and the attacker's account is refunded a large sum of money. What type of attack has occurred in this scenario
Computers and Technology
1 answer:
maxonik [38]3 years ago
6 0

Answer: integer overflow

Explanation:

The type of attack has occurred in this scenario is a integer overflow. An integer overflow occurs when there's an attempt by an arithmetic operation to create a numeric value which is outside the range which the given numbers are able to represent.

In this, the integer overflow occurs when the result of the integer operation cannot be able to fit in the allocated memory space which then brings about an unexpected result.

You might be interested in
-Convert the 1's complement 10111010 to decimal
frez [133]

Answer:

69

Explanation:

We are given a 1's complement of a number.So to convert it to the original number we have again take the 1's complement of the given 1's complement to convert it to the original number.We can do that by converting all 0's to 1's adn all 1's to 0's.

1's complement= 10111010

original number=01000101

Then to convert the binary number to the decimal number we have multiply each bit with the respective exponent of 2.The exponent of the LSB is 0 and it increases as we move to MSB by 1.

So the calculations are as  following:-

(01000101)₂ = (0 × 2⁷) + (1 × 2⁶) + (0 × 2⁵) + (0 × 2⁴) + (0 × 2³) + (1 × 2²) + (0 × 2¹) + (1 × 2⁰) = (69)₁₀

7 0
3 years ago
Read 2 more answers
An equation that performs a calculation is a formula. True or false quest
Natali5045456 [20]
This is a TRUE statements
6 0
3 years ago
The overall cost of wiring in addressable fire alarm system is significantly cheaper than the conventional one. Why is it so?
stellarik [79]

Answer:

Yes, The overall cost of wiring in addressable fire alarm system is significantly cheaper than the conventional one.But the addressale fire alram system is more reliable than a conventional system.

Explanation:

Conventional systems are hardware-based and use analog technology. where addressable fire alarm use digital technology. addressable system is generally more reliable than a conventional system mainly due to how the different systems are wired. With a conventional system, if a device’s wire is damaged or severed, its signal and the signal of other devices down the line cannot be transmitted to the control panel.

With an addressable system, both ends of the wire connect to the control panel. Therefore, if one end becomes damaged or severed, signals can still reach the control panel through the other end of the loop. In addressable systems, a device can be removed or disabled and it will not affect the other devices in the loop.

7 0
3 years ago
What is the equivalent of film speed in digital cameras?
elena55 [62]
The equivalent of film speed in a digital camera is going to be sensitivity. This will make the correct answer B. 
3 0
3 years ago
Read 2 more answers
True or false: Concurrent validation is more time consuming to measure than predictive validation because it involves a wait per
nikdorinn [45]

This is false, I hope this helps you with your task

4 0
2 years ago
Other questions:
  • What can a folder on a computer contain?
    13·2 answers
  • What is a benifit of having a client/server network?
    6·1 answer
  • If your problem is caused by a bad hardware or software installation and you get an error message the first time you restart the
    6·1 answer
  • Jim has documented a use case that describes the functionality of a system as "To compute gross pay, multiply the hours worked t
    11·1 answer
  • Which are benefits of group discussions? Check all that apply. Learning becomes more interesting. Students engage in learning. L
    12·2 answers
  • Write Java code that creates an array of n integers myArray, by taking n integers from the user with duplications, and do the fo
    8·1 answer
  • What feature is available to add a suggestion in the margin of someone else's document?​
    15·1 answer
  • In a finite state machine, state transitions happen only: a. When the reset causes a clock pulse on the D outputs of the flip-fl
    11·1 answer
  • What is the full form of the OS?​
    15·2 answers
  • Computers that are joined together are called networks true or false
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!