Exploits that use malicious SQL statements to gain unauthorized access to a database are called SQL _____________.?
Fill in the blank(s) with the appropriate word(s).
injection
Computer Science & Information Technology
You might also like to view...
A(n) ________ displays data in two views, From view and Datasheet view, on a single form
A) main form B) subform C) dual form D) split form
Computer Science & Information Technology
Type the filename of the file in the ________ of a PowerPoint presentation
Fill in the blank(s) with correct word
Computer Science & Information Technology