What is SQL
Structured Query Language
What is writeline do
prints the program output, debugging information, or any necessary details you want to show
What is authentication
Authentication is the act of proving an assertion, such as the identity of a computer system user.
What is Integrity
internal consistency or lack of corruption in electronic data
What is Legislation
Laws created by parliament
What is SQL Injection
SQL injection is a code injection technique used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution
What is Bool
the Boolean is a data type that has one of two possible values which is intended to represent the two truth values of logic and Boolean algebra.
What is Encryption?
In cryptography, encryption is the process of transforming information in a way that, ideally, only authorized parties can decode
What is accuracy
How well measured, or recorded, the data is (Precision etc)
What is Copyright Act 1968
Recognises that any original work is the property of the person who created it. The creator decides how it is distributed and/or reproduced.
What is programs that use SQL
Netflix, Instagram, Uber, Flipkart, Amazon, and Linkedin, for various purposes such as data extraction, data modification and management, and data-centric analysis.
What is Namespaces
to organize code into logical groups and to prevent name collisions that can occur especially when your code base includes multiple libraries
What is Cloud Saves
Cloud storage is a model of computer data storage in which data, said to be on "the cloud", is stored remotely in logical pools and is accessible to users over a network, typically the Internet
What is authenticity
Has the data come from a reliable and trustworthy source?
What is Privacy act 1988
Rules for the collection, storage, and communication of personal information
What is the most commonly used SQL statement
SELECT is probably the most commonly-used SQL statement.
What is Public do.
an access modifier for types and type members.
What is Types of Backup?
Full backup: The most basic and comprehensive backup method, where all data is sent to another location.
Incremental backup: Backs up all files that have changed since the last backup occurred.
Differential backup: Backs up only copies of all files that have changed since the last full backup.
What is reasonableness
Is the data plausible/logical enough to satisfy ‘common sense’. Data that passes electronic validation, may still be unreasonable
What is Health Records Act 2001
Collection and handling of health information in public and private sector
What is 3 ways you can Exploit SQL Programs
In-band SQLi. The attacker uses the same channel of communication to launch their attacks and to gather their results. ...
Inferential (Blind) SQLi. The attacker sends data payloads to the server and observes the response and behavior of the server to learn more about its structure. ...
Out-of-band SQLi.
What is the line of code to Create an XML
var xmlDocument = new XmlDocument(); var xmlNode=xmlDocument.CreateNode(XmlNodeType.XmlDeclaration,"outputs","namespace"); xmlDocument.AppendChild(xmlNode); var xmlElement = xmlDocument.CreateElement("", "output", ""); xmlDocument.AppendChild(xmlElement);
What is ways of Phising
Phishing is a form of social engineering and a scam where attackers deceive people into revealing sensitive information or installing malware such as viruses, worms, adware, or ransomware.
What is relevance
Does the data about males, relate to females? Some will, some won’t. US school data can we use that in AUS schools?
What is the cover of Copyright Act 1968
Transfer media to other formats (CD → MP3) for personal use. Record TV/Radio for personal use. ‘Fair use’ - education, review, satire