173. An attacker uses a communication channel within an operating system that is neither designed nor...
182. Which of the following is used to indicate a single-line comment in structured query language...