1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lutik1710 [3]
2 years ago
5

A web application with an SQL server database is found to be compromised by an attacker. On examination, the email IDs of the da

tabase have been found modified. This was due to improper validation in the input fields exploited by the attacker. What is the probable attack in the above scenario
Computers and Technology
1 answer:
Thepotemich [5.8K]2 years ago
5 0

Answer:

This is what we call SQL Injection.

• SQL Injection is when an attacker compromises your database only if it is vulnerable.

• Vulnerability includes leaving an empty ""(value) or forgetting to close anything that could be attacked.

• Ways to prevent injection is to not use string concatenation.

(<em>ex.</em> "hello" + "world")

*  Use parameterized queries.

*   Immediately get rid of any unused code.

You might be interested in
Could some please answer the question in the pictures? Thank you!! I will also give your brainliest if you give me the right ans
timama [110]

Answer:

1

Explanation:

per page must have 1 body

8 0
2 years ago
Which technique/concept can be use toimplement multiple inheritances<br> in java?
LiRa [457]

Answer:

Interface

Explanation:

Java does not supports multiple inheritance by class, but we can implement multiple inharitacnce in  java using interface, with interface we uses implements keyword.

Example-

Declare interface like below code -

interface parent{

}

and use in child class like below code -

class Child1 implements interface{

}

class Child2 implements interface{

}

8 0
3 years ago
What do you mean by an algorithm?<br>​
Over [174]
A program that can be used in many scenarios
8 0
3 years ago
What is the name of the file in which this
anyanavicka [17]

Answer:

B

Explanation:

i’m an information technology  student and as I remember we used this  name

3 0
3 years ago
A computer's ____ is a collection of programs that manage and coordinate the activities taking place within the computer. It pro
V125BC [204]

Answer: Operating system

Explanation:

  A computer's OS (operating system) is one of the type of computer software and the main function of an operating system is that it helps in managing the hardware, processes, memory and the software of the computer application.

 An operating system basically providing the set of instruction to the computer for the communication purpose and perform various types of task in the computer system.

According to the given question, an operating system is refers to the software program that helps in coordinating all the task and the activities in the computer system.        

 Therefore, Operating system is the correct answer.

3 0
3 years ago
Other questions:
  • Write a SELECT statement that returns these three columns: vendor_nameThe vendor_name column from the Vendors table default_acco
    13·1 answer
  • Small-business owner Marcos set up his Google Ads campaign by thinking of “obvious” keywords off of the top of his head. What's
    15·1 answer
  • A storyboard is an example of an implementation tool.<br><br> A.<br> True<br><br> B.<br> False
    8·2 answers
  • While in slide show mode, if you are not careful you can close the application by clicking the x on the menu bar. question 38 op
    12·2 answers
  • Which of the following is not an advantage of using asynchronous data transmission
    15·1 answer
  • You have been asked to implement a data integrity program to protect data files that need to be electronically downloaded by the
    15·1 answer
  • What provision of the Government Paperwork Elimination Act was designed to encourage a paperless society?
    8·2 answers
  • Before you ever buy your first stock or bond, it's important to understand what type of investor you are. This depends on a numb
    12·1 answer
  • The L-exclusion problem is a variant of the starvation-free mutual exclusion problem. We make two changes: as many as L threads
    15·1 answer
  • Explain any two features of a computer​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!