1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ICE Princess25 [194]
3 years ago
14

What are stored procedures? What kind of attack do stored procedures protect from? Identify two reasons why stored procedures ar

e a good mitigation against the specific attack. g
Computers and Technology
1 answer:
Yuki888 [10]3 years ago
4 0

Answer:

Stored procedures or procedures are subroutines or subprograms in SQL written by the user to accomplish a certain task. it helps to mitigate SQL injection by using markers as placeholders for data input and it streams the query statement and data separately in the database.

Explanation:

The stored procedure used in SQL is a user-defined function. Unlike built-in functions like pi(), they must be called to use them.

SQL injection in query statements is written by hackers to bypass conditions, especially when trying to gain access to other user accounts. Stored procedures use markers or placeholders to prevent this.

You might be interested in
Which option organizes tasks based on importance?
crimeas [40]

The correct answer is B. Prioritized view

Explanation:

The word "priority" is used to describe events, places, people, etc. that are considered of great importance. This means a task that is considered a priority is more important than regular tasks. In this way, in management software such as Outlook that allows users to monitor and manage tasks or things to do, users can organize tasks based on importance by clicking options such as "prioritized" or "prioritized view" that will display task from the most important to the least important. Thus, the option that organizes tasks based on importance is the prioritized view.

7 0
3 years ago
A(n) ____ is a request for specific data from a database.
kotykmax [81]
A query is a request for specific data from a database.
5 0
4 years ago
Write a program that prompts the user to enter their name store this value in a variable called name Prompt the user for their c
Anarel [89]

Answer:

Explanation:

The following code is written in Python. It prompts the user for the name and age, saves them to their own variables. Then it creates and calculates the dogAge variable. Finally, it combines all of this information and prints out the statement.

name = input("Enter your name: ")

age = input("Enter your age: ")

dogAge = int(age) * 7

print("Your name is", name, "and in dog years you are", dogAge, "years old.")

8 0
3 years ago
Explain the importance of determinism in an industrial LAN
nevsk [136]

Explanation:

 Determinism in an industrial local area network (LAN) basically improve the network and allow different types of technology use in various applications.

It basically refers to the network communication that uses various types of technology in the system like time scheduling to improve the deterministic real-time communication. It basically improve the transmission and provide ability to transfer data from one point to another.

The main importance of industrial LAN that it provide more flexible and efficient ethernet network in the system. It provide communication and interconnect various types of devices in the internet for efficient communication.

3 0
3 years ago
What risks, threats, and vulnerabilities are prominent with wlan infrastructures?
vovangra [49]
The threats as well as the risk and vulnerabilities are present with the WLAN. The WLAN would encounter security issues with the range of the signal which is wireless, SSID broadcasting, password security and the packet sniffing or the capturing of signal.
4 0
4 years ago
Other questions:
  • A ____ is text and graphics that print at the bottom of every page.
    12·1 answer
  • The name of the opening that lets light into any camera is called ________.
    11·2 answers
  • List the names of 3 computer scientists
    6·2 answers
  • What type of diagram will you find nodes?
    15·1 answer
  • Use the word bank to identify each description.
    6·1 answer
  • QUESTION 16
    14·1 answer
  • Technical term of stealing personal information in social media.​
    5·1 answer
  • You are reviewing the output of the show interfaces command for the Gi0/1 interface on a switch. You notice a significant number
    12·1 answer
  • Which one causes concerns for institutions or businesses when they are collected stores and they aren’t secured properly?
    5·1 answer
  • In a database, what term is used to describe a group of fields that are all associated with and accessed using single primary ke
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!