Question

DQ2. DOM event handling is one of the areas where different browsers have the least compatibility. This is due to the differe

0 0
Add a comment Improve this question Transcribed image text
Answer #1

1)

Browser compatibility issue is a very large issue faced by web developers. Event handling makes our script more interactive and can perform various actions. But it has browser compatibility issue. The DOM of modern web browsers such as IE5+, NS6+, and Firefox provide expanded methods and flexibility (relative to older browsers) for capturing events. So, we must be careful before using the event handler in javascript.

2)

The main vulnerability of websites lies in its database. Every hackers tries to hack data. So, sql is the most vulnerable part of websites. It holds a lot of data and if breached, a lot of security issue arises. A huge question is asked if your data is not secured. It must have confidentiality,integrity and availability. Kali linux and other hacking platforms have sql injection tools to breach data. Once the sql is accessed, the control of data is gone. They can modify, leak and do whatever they want. So, its very important to keep data safe.

Add a comment
Know the answer?
Add Answer to:
DQ2. DOM event handling is one of the areas where different browsers have the least compatibility....
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for...

    TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for all potential types of non-standard inputs that might be exploited by an attacker to subvert a program. 2. Without suitable synchronization of accesses it is possible that values may be corrupted, or changes lost, due to over-lapping access, use, and replacement of shared values. 3. The biggest change of the nature in Windows XP SP2 was to change all anonymous remote procedure call (RPC)...

  • CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male...

    CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male San Bernardino suspect's iPhone 5c. Cook stated: Antiterrorism We are challenging the FBI's demands with the deepes respect for American democracy and a love of our country. We believe it would be in the best interest of everyone to step back and consider the implications While we believe the FBI's intentions are good, if would be wrong for the w e nt to force...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT