1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ICE Princess25 [194]
3 years ago
14

What are stored procedures? What kind of attack do stored procedures protect from? Identify two reasons why stored procedures ar

e a good mitigation against the specific attack. g
Computers and Technology
1 answer:
Yuki888 [10]3 years ago
4 0

Answer:

Stored procedures or procedures are subroutines or subprograms in SQL written by the user to accomplish a certain task. it helps to mitigate SQL injection by using markers as placeholders for data input and it streams the query statement and data separately in the database.

Explanation:

The stored procedure used in SQL is a user-defined function. Unlike built-in functions like pi(), they must be called to use them.

SQL injection in query statements is written by hackers to bypass conditions, especially when trying to gain access to other user accounts. Stored procedures use markers or placeholders to prevent this.

You might be interested in
Calculate the weighted grade for each student that appears in the data file. You may calculate the grade based on total earned p
lutik1710 [3]

Answer:

I don't know the answer, sorry

6 0
3 years ago
Timur was making a presentation regarding how attackers break passwords. His presentation demonstrated the attack technique that
kakasveta [241]

Answer:

The answer of the following question is Brute force attack .

Explanation:

A brute force attack is the error and trial method that is used by an application program to decode the encrypted data like passwords or the Data Encryption Standard (DES) keys, which through an exhaustive effort (by using brute force) rather than the employing an intellectual strategies.

7 0
3 years ago
Write a program that outputs "Hello World!" For ALL labs, end with newline (unless otherwise stated).
Vesnalui [34]

The program that output "Hello World " is represented as follows:

print("Hello World")

<h3 /><h3>Code explanation:</h3>

The code is written in python.

We use the print statement to print out the string word "Hello world".

When the code is run, the output of the code will be "Hello world".

"Hello world" is a string.

learn more on python code here: brainly.com/question/21497685?referrer=searchResults

8 0
3 years ago
List seven basic internet components found in a computer tower
Alexxandr [17]
A Mouse and a Keyboard are examples of eternal input devices. The monitor, printer, speaker and Fash drive are all external output devices. Seven basic internal components in a computer tower are the power supply unit, central processing unit, hard disk drive, RAM modules, motherboard, video card and a sound card.
8 0
3 years ago
Read 2 more answers
Suppose two computers (A &amp; B) are directly connected through Ethernet cable. A is sending data to B, Sketch the waveform pro
ICE Princess25 [194]

Answer:

Physical / Data link layer

Explanation:

If two computers (A & B) are directly connected through Ethernet cable. A is sending data to B, the data would be transmitted if the network is clear but if the network is not clear, the transmission would wait until the network is clear.

The Open Systems Interconnection model (OSI model) has seven layers each with its own function.

The physical layer is the first layer responsible for data transmission over a physical link. The data packets are converted to signals over a transmission media like ethernet cable.

The data link layer is the second layer in the OSI layer responsible for transmission of data packets between nodes in a network. It also provides a way of detecting errors and correcting this errors produced as a result of data transmission.

4 0
3 years ago
Other questions:
  • In C++ Please :
    6·1 answer
  • Software that translates the sound of human voice into text is called:________.
    14·1 answer
  • What type of Microsoft Server serves as an email server?
    7·2 answers
  • How we can earn from an app​
    12·1 answer
  • Differentiate between tabular and column form layout​
    14·1 answer
  • I'm making a game. I'm trying to make it so that instead of how I currently have it, starting whenever I click the screen, it st
    6·1 answer
  • What is the difference between posting and transfer in ICT please I need the answer before TMR​
    9·1 answer
  • FoRWarD MaRcH AND hERe We Go MEMbers of the agEncy BaKuGO AHHHHHHHHH-
    10·2 answers
  • What is the first phase of the project process?
    14·2 answers
  • When can screentips be useful? when finding a tab when looking for a command when pinning the ribbon when using a command.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!