web apps

0.0(0)
Studied by 11 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/25

flashcard set

Earn XP

Description and Tags

Last updated 2:01 AM on 2/29/24
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

26 Terms

1
New cards

Rainbow table

Hackers will make a table to common passwords and get all the hashes to check

2
New cards

salt

secret you add on to hash is called

3
New cards

MVC stands for

Model view control/controller

4
New cards

HMAC stands for

Hash-based Message Authentication Code

5
New cards

Regex stands for

regular expression

6
New cards

SQL Injection is best defined as

It puts html into your database and messes it up

7
New cards

Order of CCE

connection, cursor, execute

8
New cards

Primary key

designates column id as unique column

9
New cards

Databases

are optimized for multiple simultaneous random accesses (aka transitions)

10
New cards

Databases transactions are atomic

A single transactions either finishes completely, or nothing changes. No partial updates.

11
New cards

Databases transactions are consistent

Transactions do not violate any integrity constraints (i.e. do not put database in illegal state)

12
New cards

$

Matches the end of a string

13
New cards

Which would be the correct decorator function for the action

<form action=”/testform”>

@app.route(‘/testform’)

14
New cards

Which of the following statements are true

The information for the get method is in the request URL, the information for the post method is in the request header, the GET method is used by default

15
New cards

To enable logging to work you must first:

Put import logging at the top of your python file
Also add logging.basicConfig (level=loggingDEBUG)

16
New cards

crc32

fast, but not secure, useful for checksums

17
New cards

md5

widely used, fairly fast; but not secure (fairly easy to find an x that will hash into a known y).

18
New cards

sha1

popular, fairly secure, but showing vulnerabilities

19
New cards

sha256

good security, slow

20
New cards

Desirable properties of H(x):

it is improbable to generate a specific y, for a given y it is infeasible to find x, modifying x slightly will significantly modify y

21
New cards

{{ and }}

denote an expression that will be output to the final document

22
New cards

{% and %}

denotes a control flow statement like if and for

23
New cards

Major advantages of MVC architecture

Develop modules in parallel, Enhances code re-usability, Higher degree of cohesion, Lower degree of coupling, Scalability

24
New cards

25
New cards

SQL

Structured query language is a standard language for database creation and manipulation

26
New cards

URL routing

allows you to configure an application to accept request URLs that do not map to physical files

Explore top notes

note
NOUNS
Updated 1100d ago
0.0(0)
note
AP Physics 1: Ultimate Guide
Updated 693d ago
0.0(0)
note
CELLULAR RESPIRATION
Updated 1728d ago
0.0(0)
note
Chemistry
Updated 279d ago
0.0(0)
note
Chapter 23- Alkenes
Updated 1278d ago
0.0(0)
note
Chapter 5: Foundations: History
Updated 1082d ago
0.0(0)
note
NOUNS
Updated 1100d ago
0.0(0)
note
AP Physics 1: Ultimate Guide
Updated 693d ago
0.0(0)
note
CELLULAR RESPIRATION
Updated 1728d ago
0.0(0)
note
Chemistry
Updated 279d ago
0.0(0)
note
Chapter 23- Alkenes
Updated 1278d ago
0.0(0)
note
Chapter 5: Foundations: History
Updated 1082d ago
0.0(0)

Explore top flashcards