1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marysya [2.9K]
3 years ago
14

A reflective cross-site scripting attack (like the one in this lab) is a __________ attack in which all input shows output on th

e user’s/attacker’s screen and does not modify data stored on the server.
Computers and Technology
1 answer:
Murrr4er [49]3 years ago
6 0

Answer:

" Non-persistent" is the right response.

Explanation:

  • A cross-site category of screenplay whereby harmful material would have to include a transaction to have been transmitted to that same web application or user's device is a Non-persistent attack.
  • Developers can upload profiles with publicly available information via social media platforms or virtual communication or interaction.
You might be interested in
Data is physically transmitted from one computer or terminal to another in the ________ layer. physical transport application te
omeli [17]

Answer:

The correct answer to the following question will be "Physical".

Explanation:

  • The lowest layer of the OSI model is the physical layer. It's in charge of transferring bits through one device to the next.
  • This layer isn't worried about the importance of the components and deals with setting up a connection to the node of the network and transmitting and receiving a signal.

Therefore, the Physical layer is the right answer.

7 0
4 years ago
The principle of time preference requries a larger payment in the future than the present. Which situation best illustrates this
gladu [14]
The answer is letter C.
3 0
3 years ago
Which option is used to ensure the integrity and authenticity of a Word document but requires additional services to be availabl
mel-nik [20]

Answer:

Digital signature.

Explanation:

Digital signature is used to ensure the integrity and authenticity of a Word document but requires additional services to be available on the internal network.

This is important as it makes sure that the file is authentic and not malware.

3 0
3 years ago
Read 2 more answers
There’s only one game mode that stars with the letter ‘e’ in CS:GO. Which of the options below is it?
77julia77 [94]

Answer: elimination mission easy points love csgo btw

Explanation:

6 0
3 years ago
Read 2 more answers
The "odd/even factorial" of a positive integer n is represented as n and is defined non-recursively as: (n)(n-2)(n-4)...(4)(2) i
adoni [48]

Answer:

The function definition to this question can be described as follows:

long oddevenfact(int y) //defining a method oddevenfact

{

//defining conditional statement    

if (y>2) //check value is greater then 2

{

return( oddevenfact(y-2) * (long) y); //return value

}

else //else

{

return((long) y); //return its value

}

}

Explanation:

The description of the above method definition can be described as follows:

  • In the above method definition a long method "oddevenfact" is declared, which accepts an integer variable "y" as its arguments, and return value as long.
  • Inside the method, a conditional statement is used, in if the block, it checks a value, that is value is greater then 2, and inside the block, a recursive function is used, that calculates its factor, and returns its value in long type.  
  • If the condition is not true, it will go to else block and return in long type value.
3 0
3 years ago
Other questions:
  • Emma wants to create a web page for her school’s volleyball team. Which of these could she use?
    7·1 answer
  • Which mode of IPSec should you use to assure the integrity and confidentiality of data within the same LAN?a. AH promiscuous mod
    6·1 answer
  • What device can boost an analog signal? a digital signal?
    12·1 answer
  • Describe how operating system use the following security tools: firewall, automatic updating, antivirus software, spyware and ma
    11·1 answer
  • Discuss the causes ,symptoms, preventive measures and treatment of AIDS​
    6·2 answers
  • When the computer is turned on, the operating system is loaded from the hard disk to the _________________. *​
    10·1 answer
  • Which type of computer is the fastest?
    7·1 answer
  • A folder is a collection of related of data is true or false​
    10·2 answers
  • The BIOS performs most of the calculations, which enable a computer to function and is sometimes referred to as the “brain” of t
    8·1 answer
  • Do software engineers save millions of dollars in usa
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!