1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lutik1710 [3]
2 years ago
5

A web application with an SQL server database is found to be compromised by an attacker. On examination, the email IDs of the da

tabase have been found modified. This was due to improper validation in the input fields exploited by the attacker. What is the probable attack in the above scenario
Computers and Technology
1 answer:
Thepotemich [5.8K]2 years ago
5 0

Answer:

This is what we call SQL Injection.

• SQL Injection is when an attacker compromises your database only if it is vulnerable.

• Vulnerability includes leaving an empty ""(value) or forgetting to close anything that could be attacked.

• Ways to prevent injection is to not use string concatenation.

(<em>ex.</em> "hello" + "world")

*  Use parameterized queries.

*   Immediately get rid of any unused code.

You might be interested in
Characteristics of a deterministic system<br>​
Fiesta28 [93]

Explanation:

deterministic system is a involved in development of future states of the system is called deterministic determinstic system.

3 0
2 years ago
Host A sends real time voice to Host B over a packet switched network. Host A first converts the analogue voice signal to a digi
DiKsa [7]

Answer:

Time required is 0.007 s

Explanation:

As per the question:

Analog signal to digital bit stream conversion by Host A =64 kbps

Byte packets obtained by Host A = 56 bytes

Rate of transmission = 2 Mbps

Propagation delay = 10 ms = 0.01 s

Now,

Considering the packets' first bit, as its transmission is only after the generation of all the bits in the packet.

Time taken to generate and convert all the bits into digital signal is given by;

t = \frac{Total\ No.\ of\ packets}{A/D\ bit\ stream\ conversion}

t = \frac{56\times 8}{64\times 10^{3}}          (Since, 1 byte = 8 bits)

t = 7 ms = 0.007 s

Time Required for transmission of the packet, t':

t' = \frac{Total\ No.\ of\ packets}{Transmission\ rate}

t' = \frac{56\times 8}{2\times 10^{6}} = 2.24\times 10^{- 4} s

5 0
2 years ago
Technician A says that the purpose of the electrolyte is to allow the escape of hydrogen gas from the battery. Technician B says
kifflom [539]

Answer:

D. Neither Technician A nor B.

Explanation:

D. Neither Technician A nor B.

The electrolyte is a chemical medium that allows the flow of electrical charge between the cathode and anode. When a device is connected to a battery — a light bulb or an electric circuit — chemical reactions occur on the electrodes that create a flow of electrical energy to the device.  

7 0
3 years ago
Use list indexing to print the last element of the list literal value.
AnnZ [28]

Answer:

print(["Not me", "Nor me", "Print me!"][2])

Explanation:

Given

print(["Not me", "Nor me", "Print me!"])

Required

Print last element of the list literal value

The implication of this question is to print "Print me!"

We start by analysing the given list.

The given list has 3 elements

But because indexing of a list starts from 0, the index of the last element will be 3 - 1 = 2

So, to print the last element, we simply direct the print statement to the last index.

This is done as follows

print(["Not me", "Nor me", "Print me!"][2])

The [2] shows that only the literal at the last index will be printed.

This means that the string "Print me!" will be printed.

The code can also be rewritten as follows

mylist = ["Not me", "Nor me", "Print me!"]

print(mylist[2])

Here, the first line stores the list in a variable.

The second line prints the last element of the list literal value which is "Print me!"

4 0
2 years ago
A single user/single ____ operating system allows only one user to run one program at a time
babymother [125]
Single tasking? If the OS's kernel doesn't allow multi-tasking, how does it service interrupts and handle I/O?
6 0
3 years ago
Read 2 more answers
Other questions:
  • You need a version of usb technology that will support older usb devices, of which you have many, as well as newer ones. what wo
    10·1 answer
  • 1. Which of the following is NOT an example of systems software? (Points : 1)
    5·2 answers
  • An image can be copied from the Internet or another location and pasted into Paint.
    13·1 answer
  • A debugging process where you, the programmer, pretend you are a computer and step through each statement while recording the va
    11·1 answer
  • Many contemporary languages allow two kinds of comments: one in which delimiters are used on both ends (multiple-line comments),
    7·1 answer
  • Which is an aspect of structural-level design?
    6·2 answers
  • Which of these organs is not found in the excretory system
    7·2 answers
  • I need help now I really do what is the answer thank you
    5·1 answer
  • Suppose you want to sell your product to of one of the school canteen of El Salvador city thus you conducted study to one of the
    9·1 answer
  • You want to get an average of the number of siblings people in a group have. Which data format would be best for you to receive?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!