what kinds of damage can a malicious actor do with a sqli attack? a. change passwords b. reduce prices on ecommerce sites c. insert users into database table d. drop database tables entirely e. create logins

Answers

Answer 1

Answer:

D

Explanation:

Not 100% sure, but its the most probable.


Related Questions

In fedora 20, the logging system used to record the messages normally stored within the boot.log, messages, and syslog files has been replaced by a journaling database system called?

Answers

The logging system which has replaced the journaling database system for use in recording messages that are normally stored within the boot.log is Journald.

What is Journald?

Journald refers to a logging system service which allows for messages to be stored and does so in an easier way so that system administrators can find relevant and interesting information when they look through log messages.

In the past, these messages that Journald now stores would have been stored in boot.log, messages, and syslog files but thanks to Journald using the special file format which is made especially for log messages, this has changed.

Find out more on log messages at https://brainly.com/question/4595770?referrer=searchResults

#SPJ1

Initially licensed and used in NeXT software by Steve Jobs, then used later to code Mac OS X for Apple.

Answers

The term that is being referred here is "Objective-C". It was initially licensed and used in NeXT software by Steve Jobs, who co-founded the company after leaving Apple in the 1980s.

Objective-C was initially licensed and used in NeXT software by Steve Jobs.

Steve Jobs and his team developed Objective-C as an object-oriented programming language that could be used for building software applications. Later on, when Jobs returned to Apple in the late 1990s, Objective-C was used to code Mac OS X, which was a major overhaul of the company's flagship operating system. Today, Objective-C is still used by some developers, but it has largely been replaced by newer programming languages like Swift.

To learn more about Apple visit : https://brainly.com/question/28732063

#SPJ11

what is meant by artificial intellgence?​

Answers

the theory and development of computer systems able to perform tasks normally requiring human intelligence, such as visual perception, speech recognition, decision-making, and translation between languages.

Question 4 of 20
most applications will ask you to provide all of the following information
except
a. the date you can start work
b. the dates and hours you are available to work.
c. your desired salary or wage.
d. which of your previous jobs you didn't like.

Answers

Most applications will ask you to provide all of the following information except (d) which of your previous jobs you didn't like. The correct option is D.

Job applications typically require information such as your availability to start work, your preferred work schedule, and your desired salary or wage, as these are relevant to the employer's needs and decision-making process. However, they do not generally ask for personal opinions or preferences about previous jobs, as this is not relevant to the current application.

When filling out job applications, focus on providing the necessary information, such as your availability and desired compensation, and avoid discussing any negative experiences with previous jobs. The correct option is D.

To know more about decision-making process visit:

https://brainly.com/question/29772020

#SPJ11

how to create a calculated field in a query in access 2016 design view

Answers

To create a calculated field in a query in Access 2016 Design View, enter the formula in an empty cell in the Field row and provide a name for the calculated field in the column header.

To create a calculated field in a query in Access 2016 Design View, follow these steps:

1. Open Microsoft Access 2016 and navigate to the Database Tools tab.

2. Click on the Query Design button to open the Query Design View.

3. Select the table or tables you want to include in the query by clicking on them in the Show Table dialog box. Click on the Add button to add them to the query design.

4. Drag and drop the desired fields from the table(s) onto the query design grid.

5. In the empty cell in the Field row where you want to create the calculated field, type the formula for the calculation.

  - Use field names, mathematical operators (+, -, *, /), functions, and parentheses to construct the formula.

  - For example, if you want to calculate the total cost by multiplying the quantity field with the price field, the formula would be: TotalCost: [Quantity] * [Price]

6. Press Enter to finish typing the formula. Access will recognize it as a calculated field.

7. Provide a name for the calculated field by typing it in the header of the column (e.g., "TotalCost").

8. Run the query by clicking on the Run button in the Query Design toolbar. The results will display the calculated field along with the other fields in the query.

To know more about mathematical operators, visit:

https://brainly.com/question/28362686

#SPJ11

The current chief executive and financial officers have only been employed by ABC Company for the past five months of year 2. ABC Company is presenting comparative financial statements on Years 1 and 2, both of which were audited by William Jones, CPA. For which year( s) should Jones obtain written representations from these two individuals?

Answers

Answer:

Explanation:

Jones should obtain written representations from the current chief executive and financial officers for Year 2

Written representations are obtained to confirm the completeness and accuracy of financial statements and to ensure that all necessary information has been disclosed. In this scenario, since the current chief executive and financial officers have only been employed for the past five months of Year 2, they can provide representations for their tenure during that year.

As the financial statements for both Year 1 and Year 2 are being presented, it is important to obtain written representations specifically for Year 2 to ensure that any changes or significant events during that period are properly addressed and disclosed in the financial statements.

By obtaining written representations from the individuals for Year 2, it helps to provide a comprehensive and accurate representation of the financial statements for that specific period.

Learn more about the importance of obtaining written representations from key individuals to support the accuracy and completeness of audited financial statements.

https://brainly.in/question/48936475

#SPJ11

Identify the parts of it, Give at least three web browser that you usually used to visit a website.​

Answers

Answer:

Chrome, Safari, Microsoft Edge

Explanation:

Web browsers such as Chrome, Safari, Microsoft Edge would allow you to visit a website  

4. Are instructions designed to ensure that your manufacturing processes are consistent, timely and repeatable.
A. Management
B. Quality
C. SOP
D. SWI

Answers

Answer:

SWI

Explanation:

SWI (Standardized Work Instructions) are instructions designed to ensure that your manufacturing processes are consistent, timely and repeatable

How can we use sprites to help us keep track of lots of information in our programs?

Answers

Explanation:

what kind of sprites do you mean?

You don't have to answer them all, just give me 2 or 3. Thanks

1. What is the definition of a computer system?

2. What are the basic components of a computer system?

3. What is a Microprocessor?

4. Name some of the latest Computer Processors?

5. What is an operating system? Name some of the popular OS.

6. What are primary memory and secondary memory?

7. What is a chipset?

8. What do you know about the OSI Model?

9. What is the difference between system software and application software?

10. Difference between a router, modem, and switch?

11. What is a framework?

12. What is cryptography?

Answers

Answer:

5. iOS and Android are some popular OS’.

Explanation:

What is a program that includes a function parameter capable of doing?
O
A. Passing data to a function whenever it is called
B. Storing data after a function is called
C. Returning data after a function completes a task
D. Ensuring that all function calls in the program are identical

Answers

A software program that includes a function parameter is capable of: A. passing data to a function whenever it is called.

What is a function parameter?

A function parameter can be defined as a special kind of variable which is used in a function to point to a data that is provided as input into the function.

This ultimately implies that, a software program that is coded by a software developer or programmer to include a function parameter is capable of passing data to a function as an input, whenever it is called.

Read more on function parameter here: brainly.com/question/20264183

What is burning in Computers and technology

Answers

The reason the term "burn" is used is because the CD-writer, or burner, literally burns the data onto a writable CD. The laser in a CD-writer can be cranked up to a more powerful level than an ordinary CD-ROM laser. This enables it to engrave thousands of 1's and 0's onto a CD.

So that is why people talk about "burning" songs or files to CDs. They could just say they are "writing" the data to a CD, and it would make sense, but people seem to think "burning" sounds cooler.

Answer:

Burn-in is a test in which a system or component is made to run for an extended period of time to detect problems. Burn-in may be conducted to ensure that a device or system functions properly before it leaves the manufacturing plant or may be part of a repair or maintenance routine.

Explanation:

hope this helps

A swimmer covers 180m in 20 seconds. How many metres does she swim in one second?​

Answers

Answer:

9 meters per second

Explanation:

180/20= 9

which of the methods below are static methods? i. length ii. substring iii. pow iv. sqrt group of answer choices only iii and iv only i, ii and iii all the methods are static only ii and iv

Answers

Only ii and iv that is substring & sqrt  are static methods.

What is substring  ?

A substring is a segment of the named string. A substring is, in other words, a subset of another String. The built-in substring() method of the Java String class allows one to extract a substring from a given string using index values that are specified as parameters. A frequently used java.lang function is substring. Creates smaller strings from a larger one using the string class. Since strings in Java are immutable, the original string is left unchanged and a new string is returned by the method.

To know more about substring  , visit

https://brainly.com/question/28290531

#SPJ4

When you slam on the brakes in a car, it stops - but many things are actually
happening under the hood that the driver doesn't need to care about. What
other examples can you describe where abstraction is used to reduce
complexity? *

Answers

Answer:

the pistons of the car slow down

Explanation:

Some examples of how abstraction is used to simplify complex systems:

Programming LanguagesOperating Systems

What are other abstraction  examples

Abstraction is an important  idea in computer science and software engineering. It tries to make things less complicated and easier to handle.

Programming languages like Python, Java, and C++ make it easier for developers to code without worrying about the inner workings of a computer. Programmers can write code using simpler instructions without needing to think about how the computer works inside.

Operating systems are like a middleman between the stuff inside your computer and the programs you use. They make it easier for everything to work together. They control things like memory and processors, and help apps work with hardware without needing to know the specific details of the hardware.

Read more about abstraction  here:

https://brainly.com/question/7994244

#SPJ3

Assume that a file containing a series of integers is named numbers.txt. write a program that calculates the average of all the numbers stored in the file and prints the average to the screen. sample run 49.6

Answers

A Python program is given below that calculates the average of all the numbers stored in the file and prints the average to the screen:

# Open the file for reading

with open("numbers.txt", "r") as file:

   # Initialize variables for sum and count

   total = 0

   count = 0    

   # Loop through each line in the file

   for line in file:

       # Convert the line to an integer and add it to the sum

       total += int(line)

       # Increment the count

       count += 1

   

   # Calculate the average and print it to the screen

   average = total / count

   print("The average of the numbers is:", average)

Explanation:

The code opens the file for reading using the open() function and the "with" statement, which ensures that the file is properly closed after the code finishes executing. It then initializes two variables, total and count, to keep track of the sum of the numbers in the file and the number of numbers in the file, respectively. The code then loops through each line in the file using a for loop, converts each line to an integer using the int() function, adds it to the total variable, and increments the count variable. After the loop finishes, the code calculates the average of the numbers by dividing the total variable by the count variable, and assigns the result to the average variable. Finally, the code prints the average of the numbers to the screen using the print() function, along with a message indicating what the value represents.

To know more about Python Programming click here:

https://brainly.com/question/13246781

#SPJ11

Which statement is most accurate?Batteries with higher voltage will always produce a lower current rating than batteries with low voltages. Voltage is not a good indicator of electrical current that batteries can produce. A 1.5 volt battery has less ability to move electrons than a 6 volt battery. A 12 volt battery creates more electrical pressure than a 24 volt battery.

Answers

A 12 volt battery creates more electrical pressure than a 24 volt battery.

What is meant by volt?

-A measurement of the electromotive force and electrical potential difference between two places in a conducting wire carrying a continuous current of one amp when the power applied between these two sites is equal to one watt.

-A volt is defined as the energy consumption of one joule for every coulomb of electrical charge. 1V = 1J/C.

One volt is the difference in potential between two locations in a wire carrying one ampere of current when the power expended between the places is one watt.

-Volts are units of electrical potential, potential difference, and electromotive force in the metre-kilogram-second system (SI).

To know more about volt visit:-

brainly.com/question/27861305

#SPJ1

Different types of computer and state the major difference between them

Answers

Desktop computers are typically larger, stationary computers that sit on a desk or table, while laptops are smaller, portable computers that can be carried around.

What is the computers?

Servers are powerful computers designed to handle network resources and provide services to other computers, while workstations are high-performance computers used for specialized tasks such as graphic design or video editing.

Gaming computers are optimized for gaming performance with high-end hardware, while business computers are designed for productivity and typically come with business-oriented features such as security and manageability.All-in-one computers combine the monitor and computer components into a single unit, while traditional desktop computers have separate monitors and system units.Tablets are portable touchscreen devices that are smaller and more lightweight than laptops, and they are typically used for browsing, media consumption, and casual computing tasks.Embedded systems are specialized computers integrated into other devices, such as appliances, cars, and industrial equipment, and they are designed for specific tasks and functions.

Lastly, Wearable computers are small, portable devices that can be worn on the body, such as smartwatches or fitness trackers, and they are designed for monitoring health, fitness, or other specialized functions.

Read more about computer here:

https://brainly.com/question/24540334

#SPJ1

Which of the following will NOT correctly increment the value by one of a previously initialized integer variable named counter?


counter + 1;

counter++;

counter = counter + 1;

counter += 1;

All of the above will correctly increment the value by one.

Answers

counter + 1; will raise the value by one but it will not set the value of counter to itself + 1, therefore,

counter + 1; is the correct answer

Which of these might be an example of an advertiser's target group? A. People who watch a variety of TV shows B. People the advertiser knows nothing about C. People who live in the same region of the country D. People who have no access to media

Answers

An example of an advertiser's target group is: B. People the advertiser knows nothing about.

What is an advertisement?

An advertisement can be defined as a group of consumer promotions programs which is designed and developed with the sole intention of making the various goods or services that are being offered by a business firm to become known, popular and familiar to all of its customers and potential customers.

This ultimately implies that, consumer promotions programs such as online display and television advertisements, can help a business firm in the following positive ways:

To generate store traffic.To enhance brand loyalty.To facilitate and influence the final decision of a customer to purchase an item.

In this context, we can infer and logically deduce that an example of an advertiser's target group is people the advertiser knows nothing about.

Read more on advertisements here: https://brainly.com/question/1658517

#SPJ1

When do I use while loops

Answers

Answer:

When you dont know how long the loop is going to run for

Explanation:

What is output by the following code? Select all that apply.

c = 2




while (c < 12):

print (c)
c = c + 3
Group of answer choices

3

4

6

7

9

2

10

5

12

8

1

11

Answers

Note that the output of the code given above is: 5.

What is the explanation of the above analogy?

Given that the value of c is 2

2 < 12 (true statement)

print

c = c + 3

i.e, c = 2+3

Therefore, the answer is 5.

It is to be noted that in computer programming, computer code is a set of instructions or a set of rules expressed in a specific programming language (i.e., the source code). It is also the name given to the source code after it has been compiled and is ready to execute on a computer (i.e., the object code).

Learn more about codes:
https://brainly.com/question/28848004
#SPJ1

What are two advantages for computer programmers of using GitHub as a
collaborative tool when writing code?
A. No additional software installation is needed to view different
types of files.
B. Changes can be integrated into the finished main body of code..
C. Group members can indicate on a schedule when they are
unavailable.
D. Developers can share code online so it can be accessed and
worked on from anywhere.

Answers

The  two advantages for computer programmers of using GitHub as a collaborative tool when writing code are:

Changes can be integrated into the finished main body of code.Developers can share code online so it can be accessed and worked on from anywhere.What is GitHub advantages?

GitHub is known to be a form of a website that is made by developers and programmers to help them together to work on code.

The key benefit of GitHub is mainly version control system that gives room for for seamless collaboration and it is one that does not compromise the integrity of the original project.

So, The  two advantages for computer programmers of using GitHub as a collaborative tool when writing code are:

Changes can be integrated into the finished main body of code.Developers can share code online so it can be accessed and worked on from anywhere.

Learn more about computer programmers from

https://brainly.com/question/23275071

#SPJ1

The Johari Window is an important device to help explore the role
A)coding plays in communication.
B)interpretation plays in clarifying understanding.
C)feedback plays in negative relationships.
D)self-disclosure plays in communication.
E)affection needs play in strong relationships.

Answers

The Johari Window focuses more on self-awareness, disclosure, and building positive relationships.

The Johari Window is a useful tool for understanding various aspects of communication. It sheds light on the role of self-disclosure in communication, the importance of interpretation in clarifying understanding, and the significance of affectionate needs in building strong relationships. However, it does not specifically address feedback in negative relationships or the role Ajcoding plays in communication.

The Johari Window is a model that helps individuals understand and analyze different aspects of communication and interpersonal relationships. It consists of four quadrants: Open, Blind, Hidden, and Unknown.

Self-disclosure plays a significant role in communication and is associated with the Open quadrant of the Johari Window. By sharing personal information, thoughts, and feelings with others, individuals can establish trust, foster understanding, and deepen connections.

Interpretation, on the other hand, is not directly addressed by the Johari Window. However, it can be seen as a part of the communication process that takes place in the Open quadrant. Through active listening, clarifying questions, and seeking feedback, individuals can enhance their understanding and interpretation of the messages being communicated.

While feedback is important in communication, the Johari Window does not specifically address its role in negative relationships. Feedback can be valuable in identifying and addressing issues, improving communication, and resolving conflicts. However, the Johari Window focuses more on self-awareness, disclosure, and building positive relationships.

Similarly, the Johari Window does not explicitly explore the role of Ajcoding in communication. Ajcoding might refer to a specific aspect or term related to communication that is not commonly associated with the Johari Window.

Lastly, the Johari Window does not directly address the role of affectionate needs in relationships. However, it does provide a framework for understanding self-disclosure and interpersonal dynamics, which can contribute to the development of strong and meaningful relationships that fulfill affectionate needs.

To learn more about Johari window visit:

brainly.com/question/30395639

#SPJ11

Using the Internet and Provided Materials, prepare a brief paper that answers the following questions: 1. Define the Term Personally Identifiable Information (PII), provide examples of what constitutes PII. 2. Identify existing Laws and/or Regulations that provide for the protection of PII. Explain any specific requirements business are tasked with doing with respect to protecting PII. 3. Identify and discuss any types of Internal Controls that business could use to comply with Pll requirements. Use APA formatting, Your paper should be no longer then two pages in length. Please include a Bibliographypof reference sources used. QBO Assignment

Answers

The term PII refers to information that can be used to identify an individual personally. It includes information such as name, address, email, phone number, date of birth, and social security number. When this information is combined, it can be used to compromise an individual's privacy or financial security. Businesses and organizations should take steps to safeguard this type of data to avoid data breaches and identity theft.



Laws and regulations that provide for the protection of PII include the General Data Protection Regulation (GDPR), the Health Insurance Portability and Accountability Act (HIPAA), the Children's Online Privacy Protection Act (COPPA), and the Fair Credit Reporting Act (FCRA). Specific requirements that businesses are tasked with doing to protect PII depend on the type of information they collect and the industries in which they operate.

Internal controls that businesses could use to comply with PII requirements include access controls, data encryption, network segmentation, and monitoring. Access controls limit who can access sensitive data and help prevent unauthorized access. Data encryption helps protect PII during transmission and storage. Network segmentation helps prevent data breaches by separating sensitive data from other types of data. Monitoring involves keeping an eye on network activity and identifying unusual activity that could indicate a data breach.
In conclusion, businesses should take PII protection seriously to safeguard the privacy and financial security of their clients. By following existing laws and regulations and implementing internal controls, businesses can mitigate the risks associated with PII.


Learn more about Personally Identifiable Information here,
https://brainly.com/question/30023988

#SPJ11

The information about a file as owner, group, rights etc. are stored
Select one:
a. globally, in in-memory structure maintained by the operating system
b. globally, in the global on-disk structure for each file system
c. globally, in the global on-disk structure stored maintained by the operating system
d. locally, with other file attributes

Answers

locally, with other file attributes. The information about a file as owner, group, rights etc. is stored locally, along with other file attributes, on the file system where the file is located. This information is specific to each individual file and is not stored globally across all file systems or maintained in-memory by the operating system.
Your answer: d. locally, with other file attributes

The information about a file as owner, group, rights, etc. are stored locally, with other file attributes.In Unix-based operating systems, this information is stored in the file's inode (index node), which is a data structure that stores information about the file such as its ownership, permissions, timestamps, and location on disk. When a file is created, its inode is also created, and the file's attributes are stored in the inode. Each file on the system has its own unique inode, which contains information about that specific file. The inode is usually located near the beginning of the file system, and it is accessed by the operating system whenever the file is accessed or modified. The inode provides a way for the operating system to quickly retrieve information about the file without having to scan the entire file system.

To learn more about maintained  click on the link below:

brainly.com/question/26180134

#SPJ11

The information about a file as owner, group, rights, etc. is stored globally, in the global on-disk structure maintained by the operating system. Option c.

This information is not stored in an in-memory structure maintained by the operating system, but rather in a permanent storage location on the disk.

The file system maintains a global on-disk structure that contains information about files, including their ownership, permissions, and other attributes. This information is stored in the file's inode (index node) on Unix/Linux file systems, or in the file's metadata on Windows file systems.

Learn more about global on-disk structure: https://brainly.in/question/54972502

#SPJ11

make this the most disliked post

Answers

Answer: if you give me a brainest i will

Explanation:

Write a declaration that creates an Arc object that is centered at point (50, 50) and sweeps across the top half of the underlying ellipse. Base it on an ellipse with a horizontal radius of 40 and a vertical radius of 100.

Answers

Arc arc = new Arc(50, 50, 40, 100, 0, 180); This declaration creates an Arc object that is centered at point (50, 50) and sweeps across the top half of an ellipse with a horizontal radius of 40 and a vertical radius of 100.

The Arc class is commonly used in computer graphics and represents a portion of an ellipse or a circle. In this case, the start angle is 0 degrees and the sweep angle is 180 degrees, which results in the arc spanning the top half of the ellipse. The parameters specify the center coordinates, radii, and the start and sweep angles of the arc.

Learn more about ellipse  here:

https://brainly.com/question/20393030

#SPJ11

Why do the spelling and grammar checkers in Word miss some errors?
Answer must include 3-5 sentences

Answers

Answer:

Word dose not always catch misspellings why? Its because its a computer program. the program has to run through algorithms (millions a second) and that makes a large margin for error. it  could also be the fact that the misspelling is very uncommon so it dose not recognize it.  

Explanation:

How can the two independent clauses below be combined to form a correct complete sentence? Check all that apply.
Jonas has homework. It isn’t finished.
Jonas has homework, but it isn’t finished.
Jonas has homework that isn’t finished.
Jonas has homework, it isn’t finished.
The homework that Jonas has isn’t finished.
Jonas has homework; isn’t finished.

Answers

Jonas has homework that isn’t finished.
Other Questions
Enter a quadratic polynomial that has a double root at 9. Suppose there is an increase in the wage and the demand for the consumption good falls, what can you say about the supply of labor?. What country controls the island of Socotra? Which of the following refers to the compromise that emerges when decision-making and coordination are evolutionary processes and people use their judgment to address a problem? A. centralizationB. mutual adjustmentC. formalizationD. standardization What is the main purpose of the dinner conversation for Jonas and hisfamily? * The Crossing' challenges viewers' auditory perceptions to... Can someone please help me? :( what is the answer to 7+1+10t What is the solution to the equation? 54. The 45S rRNA is... (mark all that apply) A. Cleaved and THEN modified by snoRNPS B. Cleaved to make snoRNAs C. Modified by snoRNPs at sites complimentary to snoRNAS D. Processed to form rRNAs that are then bound by ribosomal proteins E Cleaved after export to the cytoplasm In the United States, voting is considered a responsibility. Should the United States make voting a duty and require all citizens to vote? Write a short essay that supports your position. The marked price of a stove was $520. A worker bought the stove on hire purchase by making a down payment of $100, and twelve monthly payments of $40 each.How much could she have saved if she had bought the stove for the marked price?A) $40B) $60C) $100D) $140 A factory releases one unit of pollution for each unit of output produced. The marginal cost of production is given by MC=2+Q, where Q is the number of units of output produced. The demand function for the product is given by Q=20-P. The marginal external cost (damage) from pollution is given by MEC=0.5Q. a. What will be the equilibrium price and quantity if the market is left unregulated? b. What is the socially optimal level of output? c. Compute the deadweight loss due to the externality. d. Compute the Rigoxian per-unit tax on output that would result in the socially efficient level of output. Which is the best method to keep the color of green beans in a vegetable salad? Determine the number of valence electrons for each of the atoms. Enter each answer as a numeral. For example, if an atom has two valence electrons, enter the number 2. C: mg: o: xe: For each of the following scenarios-cite the Constitutional answer, the Article and Section of the Constitution. Each problem is worth 2 points. You will receive one point for the correct citation and another for the correct answer.7. President U.R. Able is the President of the United States. He feels that the income tax is too jow and has asked Congress to raise it by legislative action. Congress has refused to act on his request, so Able announced that by his executive control over the Internal Revenue Service, he is by Executive Order going to raise the rate f income tax three percent with or without Congressional approval. Can he do this? PLEASE HELP 25 POINTS pedro ii push for the abolition of slavery despite powerful political and economical interests (which were found all across latin america?) 36 students are in math class and 25% are boys how many girls are there Which of the following flows in the Rock Cycle brings rock material into the Metamorphic Rock reservoir?