Company: Accenture Japan
Difficulty: medium
In the following pseudocode, what is the counter's value at the end? Answer in half-width numbers. int n = 10; int counter = 0; for i in [0 to n] for j in [i to n] counter++; 55 66 45 121 Choose the statement that correctly describes SQL injection. Numerous requests or data are sent from numerous computers to a single service to cause the service to be unavailable. Malicious code is injected into the SQL query of the input data in the form of a web application to tamper with the database. A large amount of log data output from various pieces of software and devices such as the OS, databases, applications, and network devices is analyzed. A suspicious program is run in a special region in order to prevent something bad from happening in other regions. A binary program failed to run because it crashed due to lack of memory. Which of the following is NOT an appropriate action to solve this issue? Use garbage collection to prevent certain kinds of memory leaks. Terminate other processes ru