When testing a database response, ____ characters are inserted in different places to determine vulnerability.
A. single quote
B. asterisk
C. dollar sign
D. percent sign
Answer: A
Computer Science & Information Technology
You might also like to view...
The Report and Group Headers are printed at the top of every page of the report
Indicate whether the statement is true or false
Computer Science & Information Technology
________ allows for the sharing of copies of a presentation, asking for feedback on the shared copies, and then merge the copies with the original
A) Reviewing B) Comparing C) Editing D) Track changes
Computer Science & Information Technology