A web application server that is compromised in a cross-site scripting attack is said to be

Answers

Answer 1
Cross-site scripting attack ( XSS ) occurs when malicious script are injected into web sites. An attacker uses web application to send malicious code.
Answer:
A web application server that is comprised in a cross-site scripting attack is said to be B. injected.     

Related Questions

tuition $36,620 room and board $12,900 books and fees $2,450 transportation $3,100 other $1,330 . Emily is using the table to determine the minimum amount of money she should save monthly if she is to have enough money to pay for her first year of college. She anticipates receiving $6,000 in grants and has 6 years to save in a college savings account. Without including any interest earned, what is a reasonable estimate of the amount Emily and her family should save each month for the next 6 years to pay for her first year of college?

Answers

Answer:

700

Explanation:

Answer:

b

Explanation:

because i said so brudda

Write a c++ program to solve the factorial problem x! by creating a function that calls itself'

Answers

int factorial(int n)
{
   if (n <= 1) {
      return 1;
   }
   else {
      return n* factorial(n - 1);
   }
}

With recursive functions, always check that there is a certain end criterium. When n<=1, the recursion stops.

An organization's contact information includes its _____.

e-mail address
fax number
logo
name
slogan

Answers

I would say that it probably includes all of these, but if that's not an option, then it's: email address 
Email address hope this helps :)

"giga" can mean both 109 and 230. explain to what each refers. can this cause confusion when reading a computer advertisement?

Answers

Final answer:

The term "giga" refers to 10^9 or one billion in the metric system and 2^30 or slightly more than a billion in computer science. This can cause confusion in computer advertisements as manufacturers and operating systems might use different definitions, affecting the perceived storage capacity.

Explanation:

The term "giga" can indeed refer to two different values. In the metric system, "giga" denotes a factor of 109, which means one billion. For example, one gigabyte (GB) in this context is a billion bytes. However, in computer science, due to the binary nature of computing, "giga" often represents 230, which is 1,073,741,824, slightly more than one billion. This binary-based representation is commonly used to express computer memory and storage capacity.

Given that computers operate in binary code, when measuring memory (RAM) and storage (like hard drives and SSDs), we use multiples of 1024 (which is 210), as opposed to the decimal system's 1000. Therefore, one gigabyte in the context of computer storage is actually 1024 megabytes, not the exact billion that the prefix "giga" initially suggests from a purely decimal perspective.

This dual meaning of "giga" can indeed cause confusion while reading computer advertisements, as some manufacturers may use the decimal representation (109) for storage devices, while operating systems might report storage capacity using the binary representation (230). It's important for consumers to be aware of the context in which "giga" is used to understand the actual capacity of the product they are purchasing.

Tara has found a CTSO she’s interested in joining. How can Tara become a member of the CTSO? Tara can become a member of the CTSO by visiting the school office and paying the membership__________.

Answers

membership fees! hope it helps

Answer:

Fee

Explanation:

you will need to pay a fee.

Jackson is teaching the decimal number system. He wants his students to know how to expand numbers by powers of 10. Which is the correct order in which digits are assigned values in the decimal number system?
A.- Thousand, Hundred, Ten, One
B.- One, Hundred, Ten, Thousand
C.- Zero, One, Hundred, Ten
D.- Zero, Thousand, Hundred, Ten

Answers

Final answer:

The correct order of digit values in the decimal system from highest to lowest is Thousand, Hundred, Ten, One, which aligns with the powers of 10.

Explanation:

The correct order in which digits are assigned values in the decimal number system is Thousand, Hundred, Ten, One. This means that each place value is ten times greater than the place immediately to its right. In decimal number system, the value of digits increase from right to left, with the 'ones' being the smallest and each subsequent place to the left increasing by a power of ten. For example, the number 1234 can be expanded to 1 x 103 + 2 x 102 + 3 x 101 + 4 x 100, which expresses the number in terms of powers of 10.

Final answer:

The digits in the decimal number system are assigned values based on their position, with each position representing a power of 10. The correct order is Thousand, Hundred, Ten, One, which corresponds to the answer choice A.

Explanation:

In the decimal number system, digits are assigned values based on their position relative to the decimal point. Each position represents a power of 10. The correct order in which digits are assigned values from left to right is:

Thousand (103) Hundred (102) Ten (101) One (100)

Thus, the correct answer to the student's question is A. Thousand, Hundred, Ten, One

Remember, when expanding numbers by powers of 10, each place value represents the power (exponent) of 10 that is equal to the number of places the decimal point can be shifted. For example, the number 3 in 300 is in the hundreds place, which means it can be written as 3 x 102.

What is the key function of RAM?

Answers

RAM is considered volatile memory, which means that he stored information is lost when there is no power . So RAM is used by the central processing unit (CPU) when a computer is running to store information that it needs to be used very quickly but it does not store any information permanently .

Which unique address is a 128-bit address written in hexadecimal?

Answers

Every hexadecimal digit represents 4 bits, so the address has 128/4 = 32 digits.

A GUID (Globally Unique IDentifier) has 128 bits. They are usually written like this:

{38a52be4-9352-453e-af97-5c3b448652f0}.

There are different types of guids, depending on how they are generated. The first digit of the third group reveals the type. In the example above it is 4. A type 4 guid is fully random (except of course for the 4).

The ____________ is the number of rectangles an image has in a square inch.
Question 21 options:

A) Compression


B) DPI


B) Resolution


C) Size

Answers

D size




Read more




































Hope,this helped
The answer is C I’m pretty sure

Styles are selected using the _____ tab. file home insert page layout

Answers

It is using the page layout for page styles, home for title/word styles

Answer:

It is using the page layout for page styles, home for title/word styles

Explanation:

Atari licensed a game from taito that became a smash-hit and helped sell the vcs/2600. what is the name of that game?

Answers

Gamastruta I think. 
Hope I helped, Ms. Weasley

Answer:

Space Invaders was a popular Atari game at that time so that might be it.

Explanation:

What is the difference between the file myprogram.java and the file myprogram.class?

Answers

The .java file is the source code, human readable, commented and hopefully a bit pretty. The .class file is the bytecode that the JVM executes, and if you're lucky a human may be able to read some of it. Forget about the other stuff.
Final answer:

The myprogram.java file is where you write your Java source code while the myprogram.class file is the compiled version of that code that the Java Virtual Machine can run.

Explanation:

The difference between the myprogram.java and myprogram.class files lies in their purpose and structure. A myprogram.java file is a source code file, written in the Java programming language. This is the file where you write your code. On the other hand, a myprogram.class file is a compiled Java file. The Java compiler, (javac), reads and executes the source code from the .java file, and turns it into byte code in a .class file which the Java Virtual Machine can then interpret and run as a program.

Learn more about Java file types here:

https://brainly.com/question/35329837

#SPJ2

What is the correct html element for inserting a line break?

Answers

<br> or <br/>

The forward slash can be omitted and still function perfectly fine, unless you are working with XHTML (XML), then do include the forward slash.

It's your personal preference on which one you use, but be consistent! I personally prefer the latter.

Select all the items that determine your preference for a concert ticket. a) band that is playing b) date of the concert c) price of the ticket d) friends that are going

Answers

I believe the answer is A, B, and C

_____ are considered to be the most important element in a computer-based information system.

Answers

Final answer:

The most important elements in a computer-based information system are the central processing unit for data processing efficiency and information as the key commodity in postindustrial societies. The CPU is critical for processing large data sets, and information drives decision-making processes in business and scientific research.

Explanation:

The elements that are considered to be the most important in a computer-based information system vary depending on the context. When discussing the efficiency of processing large amounts of information, the central processing unit (CPU) or microprocessor plays a critical role. It is the CPU that enables digital computers to process vast data sets effectively.

In the context of a postindustrial society, where information systems are a cornerstone of daily operations, the most important commodity is information. Information-driven decision-making processes are essential in business and scientific environments. For instance, computers that can store and perform calculations on extensive data sets are invaluable for scientific research involving molecules and their motions.

The advent of new information technologies like the Internet, GPS, and GIS has dramatically altered the landscape of information availability and utility. High-speed electronic circuits have enabled computers to analyze data with remarkable speed and accuracy, as evidenced by photographic credits to Airman 1st Class Mike Meares of the United States Air Force.

In the business world, there is a heavy reliance on devices and information technology systems; interruptions or failures in these can have significant repercussions on customer service and revenue, as highlighted by the photograph from Rawpixel Ltd/flickr.

Living systems also embody this principle of valuing information highly, as they depend on the storage, retrieval, transmission, and response to information that is vital to their life processes.

Please help me asap...!











Question 1: What is wearable technology? Define the concept in your own words.

Question 2: Why is wearable technology important?

Question 3: How do you think this trend will affect website design?

Question 4: How do you think this new technology will change the way we interact with each other and the Internet?

Answers

1. Wearables are connected devices that measure something or show information. Fitness trackers are the best examples, but also smart watches and body worn wireless heart-rate monitors. They typically communicate with a gateway devices such as your smartphone using bluetooth, but also cellular models that will connect to the internet directly will appear as the next generation.

2. They are instrumental in the trend of gathering as much data about a person as possible. The data can provide insight in your health. Smart watches can make other data even easier available.

3. Websites might become more personal, if they can tailor their content based on the data gathered from wearables.

4. Communication will become easier (augmented reality glasses), and more personal (advertisement based on your behaviour). 

As you are editing code, you notice the lack of semicolons. Why is this important to note?
All programming statements in Java must end with a semicolon.
All class statements in Java must end with a semicolon.
All public statements in Java must end with a semicolon.
All comments in Java must end with a semicolon.

Answers

It's the first one :)

Answer:

All programming statements in Java must end with a semicolon.

Explanation:

Semicolon allows the compiler to know where to end the instructions.

____ is a programming language used to view and manipulate data that is stored in a database.

Answers

SQL (Standard Query Language)

____ is the set of instructions that tells a computer to initialize the motherboard, how to recognize devices connected to the computer, and to start the boot process.

Answers

BIOS, or (Basic Input/Output System)

A type of memory that is expensive and therefore is often used only in cache memory applications.

Answers

SRAM [STATIC] is a type of memory, it is five times faster than DRAM [which is found in most computers] and it depends on the use of electricity. It is designed in such a way that its constant refreshing is not require, it is much more expensive than the DRAM and it is therefore only used in cache memory application.

Answer:

The memory that is expensive and therefore is often used only in cache memory applications is Static RAM (Static RAM).

Further Explanation:

Static RAM (SRAM)- SRAM is random access memory that retains the data in memory as long as the power is supplied to the system. On the other hand, DRAM stores data in the capacitor and the transistor. Static RAM is expensive and five times faster than DRAM (Dynamic Access Memory). SRAM is used in the cache memory of the computer and it is part of the RAM digital to analog converter on a video card.

SRAM holds the data in flip-flops. A flip-flops consists of 4-6 transistors having some wiring but never to be refreshed.

Learn more:

1. A company that allows you to license software monthly to use online is an example of ? brainly.com/question/10410011

2. Prediction accuracy of a neural network depends on _______________ and ______________. brainly.com/question/10599832  

3. The shape of our galaxy was determined ‘on the inside looking out' by surveying the milky way using ____________ telescopes. brainly.com/question/7866623  

4. List 3 characteristics of the ideal encryption scheme. brainly.com/question/3000161

Answer details:

Grade: Senior Secondary School

Subject: Computers and Technology

Chapter: Computer Basics

Keywords:  

Memory, type, expensive, cache memory applications, Static Random Access Memory, Dynamic Memory Access, SRAM, DRAM, transistors, resistors, capacitors, flip flops, cache memory, digital, analog, data, power supply

When you assign a value to an int variable, you do not type any commas; you type only digits and an optional plus or minus sign to indicate a positive or negative integer?

Answers

Negative integer is the correct answer

This type of peripheral is used to interact with, or send data to, the computer. a,CPU b,Input c,Memory d, Output

Answers

b, input

I'm pretty sure, bc CPU is central processing unti which deals with the internal components, output deals with transfers from the computer to an outside source, and memory doesn't have to do with data transfer
Hi!

Whenever we are going to be sending data, this is known as input.

For example, I'm giving input by typing on my keyboard right now. This is sending data to the device.

Hopefully, this helps!

Which piece of equipment installs in a pc and allows the pc connect to a network?

Answers

NIC (Network Interface Card)

What does a process belong to if it no longer belongs to the user linux?

Answers

Unless you create a user linux, there's no user linux.

I think you're asking about zombie processes.

how did josh norman and mike keller provide coverage of katrina?
a. by posting status updates on facebook
b. with series of tweets
c. by writing carefully crafted articles
d. with live updates to a blog

Answers

They wrote live updates to a blog, so D. The blog was called "Eye of the Storm." It was written as a series of personal musings and photographs of places where the storm hit- first hand accounts of the disaster. They received a journalism award for it.

Answer: The correct answer is choice d, with live updates to a blog.

Explanation: Josh Norman and Mike Keller were six months out of college when hurricane Katrina hit. They were two of the few who stayed of their newspaper staff. They created a blog called “Eye of the Storm.” They posted to this blog through the storm, and then later won an award for it.

Which of the following properties of water enables it to move from the the roots to the leaves of a plant?

A.It expands as it freezes.
B.It is an excellent solvent.
C.It exhibits cohesive behavior.
D.It is able to moderate temperature.

Answers

Water's cohesive behavior, caused by hydrogen bonding between water molecules, allows it to move from the roots to the leaves in plants through the transpiration-cohesion-tension mechanism, involving the xylem vessels.

The property of water that enables it to move from the roots to the leaves of a plant is its cohesive behavior. Cohesion is the attraction between water molecules due to hydrogen bonding. This property, along with adhesion (the attraction between water molecules and other molecules), is crucial for the water transport system in plants known as the transpiration-cohesion-tension mechanism. As water evaporates from the leaves during transpiration, it creates a negative pressure that pulls more water upward from the roots through the xylem vessels due to the cohesive forces among water molecules.

When you pass an array as an argument to a function, the function can modify the contents of the array?

Answers

In most languages. Primitive data types ( char, int, float, bool, maybe string ) are usually passed by value, but compound data types are passed by reference, so you're not working on a copy but on the original.

Amitha writes up a one-page summary of a novel during her summer internship at a publishing company. When she reads over the page, she realizes she used the word “foreshadow” seven times, and she would like to reduce the repetition. Which tool would best help Amitha solve this problem?

Answers

The alegged choices are:

A. Spell Checker
B. Thesaurus
C. Acrobat Distiller
D. Find and Replace

The Answer is B.

This is because she can use a Thesaurus to look up SYNONYMS for the word "Foreshadow". Not the Spell Checker, nor the AD, nor the Find and Replace features are able to help in this situation.

The answer is B its the most accurate.

Saving a file as a new filename can be accomplished through the Save As dialog box? True
False

Answers

Your answer would be true, (brainliest answer please)

Why is self-esteem important in self-representation

Answers

Hello! Self-esteem is important in self-representation, because the way you feel yourself can affect how you represent yourself as well. For example, if you have low self-esteem, you may present yourself as sad and shameful. However, if you have high self-esteem, you present confidence and happiness to other people.
Final answer:

Self-esteem influences self-representation by affecting confidence and the ability to form a positive identity, which in turn affects how individuals are perceived and interact with others. The alignment of one's real self with their ideal self contributes to congruence and a robust sense of self-worth.

Explanation:

Self-esteem is pivotal in self-representation because it underpins how individuals perceive themselves and, consequently, how they choose to present themselves to others. A healthy level of self-esteem typically correlates with more positive self-representation, which can lead to positive outcomes in various aspects of life, such as social interactions and professional environments.

During Erikson's toddlerhood stage, a positive self-concept and autonomy contribute to individual confidence in one's abilities. This lays the foundation for future stages, such as adolescence, where individuals re-evaluate their self-concept and embark on identity formation. High levels of self-esteem support adolescents in becoming constructive members of society.

The psychological framework known as "looking-glass self" implies that our self-image is crafted through the perceptions and reactions of others. For example, individuals facing bias or stereotypes may need to work harder to maintain a professional image, as their self-representation could easily be tainted by prejudice.

Impression management is a concept within symbolic interactionism that suggests we use certain behaviors and props to convey a desired impression to others. The congruence between our ideal self and our real self also plays a crucial role in fostering a strong, healthy sense of self-worth.

Other Questions
A school used 15 kilograms of peaches to make 100 cups of fruit salad. what quanity of peaches did the school put in each fruit salad What generalization can you make about the numbers and causes of settler death in 1609 ? (5ab-4a-6)-(4ab-1) find the sum please fast a car with 5 tires (four road tires and a spare in the trunk) travelled 30000 km. All five tires we used equally. How many km of wear are on each tire ? What was happening in germany in the 1920s? In late spring, a student began conducting an investigation about the flower preferences of bees. She counted the number of wildflowers in a small plot and created the following table. Plant Species Number of Plants Dandelion 13 Indian paintbrush 8 Queen Annes lace 20 Thistle 29 She planned to observe the flowers for the next five days for an hour at the same time each afternoon. Then she would plot the data in a multiple line graph to compare the number of bees that visited each flower. Which statement best describes the data in this investigation? The data would be more accurate if she carried out all the observations in one day so weather conditions would be constant. The data would be more valid if she made the observations daily for two months. The data she collected is inaccurate because the investigation is not repeatable. The data she collected cannot be plotted in a line graph because it is qualitative. What is the most likely cause of an ecosystem changing from grasslands to farmland? Which of the following was an important effect of shays rebellion A. More powerful state militias B. More power gig in to congress C. The establishment of a new national military forceD. A convention to revise the articles of confederation is this statement true or false parallels are number from zero degrees to 90 degrees east and from 0 degrees to 90 degrees west.A TRUEB FALSE Why do mr. hooper and elizabeth call of their wedding? What does this mean List three tasks that oceanographers completes most days What is the range off(x) = 5x? After Darwin proposed his ideas about natural selection as a mechanism for evolution, it took time before evolution was generally considered a theory. Why do we now refer to it as a theory Convert 5.764764764 to a rational expression in the form of a over b, where b 0. 5 and 764 over 999 5764 over 9999 5 and 764 over 99 5 and 999 over 764 In what ways do art historians define artistic styles? Answer these french questions thank you! Core conditioning is concerned with the strength and stability of the _______ and _______. The flame from my candle gives off black smoke heat and light what type of changes do these indicate Which is true about scientific theories? (A.)Scientific theories can be rejected by new reliable evidence (B.)Scientific theories can never be proven wrong. (C.) Scientific theories are always unreliable. (D.) Scientific theories prevent new questions from being asked. Steam Workshop Downloader