Write down the steps to test ACUNETIX website for SQL injection vulnerabilities. Fetch database name, table names and column name by using some cheat codes.
SIKSHAPATH Latest Questions
Q1: Write a Java Program to find the addition of two matrices implemented with inheritance.
The Correlation Coefficient between the two variables was found to be -0.90, which means: a. There is a weak correlation b. There is a very weak negative correlation c. There is a strong correlation d. There is a strong positive correlation
For a regression line through the data, the vertical distance from each data point to the regression line is called residual. (i) Square the residual, and (ii) sum all of the squared errors together. This is the quantity that ordinary ...Read more
The ‘variance inflation factor’ (VIF) can be used to identify this issue a. Homoscedasticity b. Multicollinearity c. Outlier d. Normality
In a simple linear regression problem, a single input variable (x) and a single output variable , the linear equation would be y = ax + b; where a and b are _______ and ________ ...Read more
A system has three resource types (A, B, C) and four processes {P1, P2, P3, P4 }. The total units of system resources are: (8, 5, 4) units of A, B and C, respectively. The maximum demands for each process ...Read more
Which of the following is(are) true for the given function? f:R→R f(x)=x²+2 R is a set of real numbers. A. 𝑓 is not injective B. 𝑓 is bijective C. 𝑓 is surjective D. 𝑓 is not surjective
Which of these method of String class is used to obtain character at specified index? a. char() b. Charat() c. charat() d. charAt()
Web development internshala final test answers 2022 1.Which of the following tags is used to create an unordered (bullet) list? Ans: (A) <ul> [mepr-show rules=”21006″ unauth=”message”] 2.Which of the following is the right way to create a form submit button? Ans: (C ) ...Read more