6.2 Data Integrity (3)

Resources | Revision Questions | Computer Science

Login to see all questions

Click on a question to view the answer

1.

Describe and explain three different methods of data verification that can be used during data entry. For each method, explain its advantages and disadvantages.

2.

Question 3

Explain how data validation can be used to prevent SQL injection attacks. Provide an example of a vulnerable SQL query and the corresponding validated query.

3.

Describe and explain three different methods of data verification that can be used during data transfer. For each method, explain its advantages and disadvantages.