Answer:
Stored procedures or procedures are subroutines or subprograms in SQL written by the user to accomplish a certain task. it helps to mitigate SQL injection by using markers as placeholders for data input and it streams the query statement and data separately in the database.
Explanation:
The stored procedure used in SQL is a user-defined function. Unlike built-in functions like pi(), they must be called to use them.
SQL injection in query statements is written by hackers to bypass conditions, especially when trying to gain access to other user accounts. Stored procedures use markers or placeholders to prevent this.
Rerouting traffic using ARP poisoning is an attack on both the functionality and confidentiality of a network. This is also known as ARP spoofing. This type of attack takes a legitimate IP address of another host and causes traffic redirection to an infected page.
It is grouped according to raster and vector format. Raster format are images used in a computer or printed. Vector format stores data and is compressed.
Examples of common raster formats usually used in a computer are; jpeg, png, bitmap, and gif. Vector formats are; CGM, SVG and 3D vector.