1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
finlep [7]
3 years ago
11

How do you think the people responsible for the web server, the web pages, and scripts could have prevented these vulnerabilitie

s
Computers and Technology
1 answer:
mojhsa [17]3 years ago
6 0

<u>Incomplete question. </u>However, I provided definitions of key terms.

<u>Explanation:</u>

One may wonder: what is a web server? In simple terms and this context, it is a software application that web users access hosted files. In other words, it serves what is on the web to end-users.

Web pages, on the other hand, is a unique document format opened on the web.

While <u>scripts</u> are customized computer language that determines how contents on web pages interact and how they are shown to users, examples include;

  • JavaScript,
  • PHP
  • XML, etc.

Many web experts <u>recommend </u>that in other to protect web pages from vulnerabilities, they should ensure their website should be issued an HTTPS (HyperText Transfer Protocol) certificate.

You might be interested in
You are going to create an Arduino sketch where you have two push buttons, one piezo, one
Elanso [62]

Answer:

asw

Explanation:

4 0
3 years ago
The working window of a presentation is the _____.
stepan [7]
The answer would be slide
8 0
4 years ago
Read 2 more answers
What kind of skills does an electronics engineering tech need as requirement in the workplace?
eduard

Answer:

Electrical and electronics engineering technicians should also possess the following specific qualities: Logical-thinking skills. Electrical and electronics engineering technicians must isolate and then identify problems for the engineering staff to work on. They need good reasoning skills to identify and fix problems.

Explanation:

3 0
3 years ago
Richard is shopping online and has to enter a password to access his bank account. Which method attribute will securely submit h
kotykmax [81]

Answer:

password

Explanation:

It is certainly the password method attribute, and this can enable Richard to securely submit the credentials. If we set the method attribute or input type as a password, then the password is sent in the encrypted form, and it remains secure. And hence, the password cannot be copied by anybody, and it remains safe. This is the characteristic of a secure web form. And remember we are dealing with an HTML form.

6 0
3 years ago
Read 2 more answers
Which of the following are considerations in e-commerce and e-government Internet sites? Check all of the boxes that apply.
vovangra [49]

Answer:

protection of sensitive information

Explanation:

6 0
3 years ago
Other questions:
  • Lindsay owns a candy store that typically makes all if its sales to tourists visiting a nearby zoo. Why might she decide to set
    14·2 answers
  • Because HTML was designed as a cross-platform language, it is the preferred method of communicating with back-end databases. Tru
    8·1 answer
  • In Windows 2000 and later, the ____ command shows you the file owner if you have multiple users on the system or network.
    15·1 answer
  • For which is a chart Legend used
    5·2 answers
  • Write a static method named listcountriesoforigin, to be added to the bowl class, which is passed an array of bowl objects, and
    13·1 answer
  • The following processes are being scheduled using a preemptive, round-robin scheduling algorithm. Each process is assigned a num
    6·1 answer
  • Question 1 :George, a user, is having trouble connecting to network resources, including shared folders on the local network and
    7·1 answer
  • Split a string by string.
    6·1 answer
  • Wireless networks use radio frequency (RF) or radio techniques, which allows wireless transmissions to reach out in all directio
    6·1 answer
  • A ____________ is a collection of infected IT devices that an attacker or attack group controls.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!