Exploits that use malicious SQL statements to gain unauthorized access to a database are called SQL _____________.?

Fill in the blank(s) with the appropriate word(s).

injection

Computer Science & Information Technology

You might also like to view...

A(n) ________ displays data in two views, From view and Datasheet view, on a single form

A) main form B) subform C) dual form D) split form

Computer Science & Information Technology

Type the filename of the file in the ________ of a PowerPoint presentation

Fill in the blank(s) with correct word

Computer Science & Information Technology