which type of web-based attack uses the get and post functions of an html form?

Answers

Answer 1

The type of web-based attack that commonly utilizes the GET and POST functions of an HTML form is known as a "Cross-Site Scripting" (XSS) attack.

How to explain the information

XSS attacks occur when an attacker injects malicious scripts into a website's input fields or parameters that are later executed by users' browsers.

In the context of HTML forms, attackers may exploit vulnerabilities by inserting malicious code into input fields that are processed by the server using either the GET or POST methods. When the server generates a response, the injected script is included in the HTML code and sent to the victim's browser. Once the victim's browser receives the response, it interprets the script, potentially allowing the attacker to steal sensitive information, perform unauthorized actions, or modify the website's content.

Learn more about HTML on

https://brainly.com/question/4056554

#SPJ4


Related Questions

Programmers commonly depict inheritance relationships using _____. Select one: a. flowcharts b. pseudocodes c. UML notations d. Venn diagrams.

Answers

Programmers commonly depict inheritance relationships using UML notations (option C)

What are UML notations?

UML (Unified Modeling Language) notations encompass a universally accepted repertoire of symbols and diagrams employed to artistically depict diverse facets of software systems. UML finds extensive employment in the realm of software development, facilitating the modeling, conceptualization, and documentation of intricate software architectures.

UML notations bestow upon us a visual medium through which we can eloquently portray an assortment of elements and interconnections within a software system. This includes classes, objects, inheritances, associations, dependencies, and an array of other essential components.

Learn about UML notations here https://brainly.com/question/10741112

#SPJ4

The _____________ command is used to stop the FOR...NEXT loop prematurely.​

Answers

Answer:

The exit command is used to stop the FOR...NEXT loop prematurely

with what section of sox would the it professional deal the most, and why?

Answers

The IT professional would most likely deal with the section of SOX concerning the protection of financial information. This section requires that companies have processes in place to ensure the accuracy and completeness of financial records, as well as the protection of information from unauthorized access.

The IT professional would deal the most with section 404 of SOX. This section requires companies to assess and report on the effectiveness of their internal controls over financial reporting. The IT professional plays a crucial role in ensuring that the company's information systems are secure and reliable, and that the financial data is accurately recorded and reported. This is important because any weakness or deficiency in the internal controls could lead to financial misstatements or fraud.

Learn more about  IT professional: https://brainly.com/question/29735142

#SPJ11

Why is a positive attitude towards work important

Answers

Answer:

it lets you get more work done

Explanation:

when you have a positive work attitude you want to do more stuff, and when it's bad you won't want to do anything

write a stored procedure named numcarsavailable that takes the desired reservation dates (pick-up and drop-off dates) and car type id and displays how many cars of the desired type are expected to be available during the desired dates.

Answers

One can create a stored procedure called numcarsavailable by utilizing a database schema that includes the Reservations and Cars tables. Reservations table contains data pertaining to car bookings and Cars table includes information regarding available car and example is given below.

What is the procedure  about?

By the use of the code attached, The numcarsavailable stored procedure has been devised with three input variables, namely pick_up_date, drop_off_date, and car_type_id.

Note that the command SET NOCOUNT ON is employed to avoid the retrieval of the number of modified rows as an outcome set. The num_cars_available variable has been set up for the purpose of storing the number of cars currently available.

Learn more about  procedure  from

https://brainly.com/question/31086899

#SPJ4

write a stored procedure named numcarsavailable that takes the desired reservation dates (pick-up and

100 POINTS PLEASE HELP Type the correct answer in the box. Spell all words correctly.
John wants to use graphical elements on his web page. Which image formats should he use to keep the file size manageable?
John should use______ formats to keep the file size manageable.?

Answers

Answer:

On a Web page, we'll assume he'll have simple graphic elements like icons, or other simple low-resolution and a lower number of colors (256-), these are usually better saved in GIF format to take less space, just because of the smaller color map, but PNG could also do a great job and  it offers transparency as well (like GIF does).  For more complex elements (larger size and/o more colors like photos), the best format to save them is probably the PNG one.  They will be compressed but still offer a great quality.

Explanation:

100 points yay

But I have only 50

Rework problem 27 from section 2.1 of your text, Involving product codes. For this problem, assume that a product code consists of a digit from the set {2,6,3,9} followed by 4 letters, not necessarily distinct, selected from the set {L,A,J,I,E}. For example, 2EJIL is such a code. (1) Hey many codes are possible? (2) What probablilty should be assigned to each code? (3) What probability should be assigned to the event that the code contains the number 2?

Answers

The number of possible codes is 4 * 5^4 = 2,000.

Each code has an equal probability of 1/2,000.

The probability of a code containing the number 2 is 1/5.

To determine the number of possible codes, we consider that the first digit can be chosen from the set {2, 6, 3, 9}, which gives us 4 options. For the subsequent four letters, each letter can be chosen from the set {L, A, J, I, E}, which gives us 5 options for each letter. Therefore, the total number of possible codes is 4 * 5^4 = 2,000.

Since each code is equally likely to occur, we assign an equal probability to each code. The probability of each code is 1 divided by the total number of possible codes, which is 1/2,000.

To find the probability of a code containing the number 2, we consider that out of the four possible digits in the first position, only one of them is 2. Therefore, the probability of a code containing the number 2 is 1 out of the total number of options for the first digit, which is 1/4. However, this probability only applies to the first digit. The subsequent four letters can be any of the five options, so their probability is independent of the first digit. Thus, the overall probability of a code containing the number 2 is 1/4 * 1 = 1/4.

Learn more about probability here:

https://brainly.com/question/31828911

#SPJ11

What is a difference between Java and Python? (5 points)
a
Java requires brackets to define functions, while Python requires curly braces.
оо
Ob
Python ends lines of code with semicolons, while Java does not.
Python is a statically typed language, while Java is not.
Od
Variable types in Java cannot be changed, while Python allows them to change.

Answers

I'm not sure if this answers your question but I found this online:

The main difference between Java and Python is their conversion; the Java compiler converts the Java source code into an intermediate code called a bytecode while the Python interpreter converts the Python source code into the machine code line by line.

Sorry if this doesn't answer your question.

I'm not sure if this answers your question but I found this online:

The main difference between Java and Python is their conversion; the Java compiler converts the Java source code into an intermediate code called a bytecode while the Python interpreter converts the Python source code into the machine code line by line.

Sorry if this doesn't answer your question.

Do you think cyberbullying is as serious as real-life bullying? Why or why not? Do you
believe that other students can be responsible for taking appropriate action? Do you think
adults get adequately involved? (must write at least 5 complete sentences)

Will give brainliest :)

Answers

Answer:

If you or someone you know is being bullied, there are things you can do to keep yourself and others safe from bullying If you or someone you know is involved in cyberbullying, it is important to document and report the behavior. If you have done everything you can to resolve the situation and nothing has worked, or someone is in immediate danger, there are ways to get help.

Explanation:

Answer:

Yes I think cyberbullying is as serious as real life bullying because it is still a horrible form of bullying only difference is it is online. The person behind it can easily break down a person behind a screen because they are too cowardly and insecure to bully in real life. Cyberbullying also has many of the effects as real life bullying such as depression ,increased anxiety, low self esteem, and mental health issues.

If you are a bystander of bullying no matter how old you are and you are watching it happening without doing any form of action such as telling a grown up or helping out the person yourself your equal of a bully.

Explanation:

real answer

In previous chapters, you created applications for the Greenville Idol competition.

Now, modify your version of the GreenvilleRevenue program created in Chapter 5 so that after the user enters the number of contestants in this year’s competition, the user is prompted for the appropriate number of contestant names and a code for each contestant that indicates the type of talent:

S for singing
D for dancing
M for playing a musical instrument
O for other.
Make sure that all entered codes are valid, and if not, re-prompt the user to enter a correct code. For example, if Y is input, output Y is not a valid code, and re-prompt the user until a valid code is entered.

After contestant data entry is complete, display a count of each type of talent. For example, if there were ten singers, four dancers, seven people who play musical instruments, and one in the other category, the output should be:

The types of talent are:
Singing 10
Dancing 4
Musical instrument 7
Other 1
Then, continuously prompt the user for a talent code until the user enters a sentinel value (the uppercase character Z should be used as the sentinel value).

With each code entry, display a list of the contestants with that code, or display a message that the code is not valid and re-prompt the user. For example, if M is entered, the output might be:

Contestants with talent Musical instrument are:
Michelle
Nick
If U is entered, the output should be U is not a valid code.

Answers

Start by prompting the user to enter the number of contestants in the competition. Use a loop to enter the contestant data. For each contestant, prompt the user to enter the contestant's name and a code for the type of talent.

Check that the code is valid and if not, re-prompt the user until a valid code is entered. After all contestant data has been entered, display a count of each type of talent.

What is Loop?

Loop is a programming structure that enables a set of instructions to be repeatedly executed until a condition is satisfied. It provides the ability to execute a block of code multiple times, which can be very useful for performing repetitive tasks. Loops can also be used to iterate through data structures such as arrays and objects, which allows for the efficient manipulation of data.

To know more about Loop

brainly.com/question/19706610

#SPJ1

explain paper based system, web based system, early
personal computer technology and
electronic database base systems in 20 mins please

Answers

A paper-based system is a method of organizing and storing information using physical documents such as paper files, folders, and cabinets. In this system, data is recorded and stored on paper documents, which are then manually sorted, filed, and retrieved when needed.


Early personal computer technology refers to the early stages of personal computer development and usage. In the 1970s and 1980s, personal computers were introduced to the market, enabling individuals to have their own computer at home or in the office. These early personal computers were typically standalone devices that stored data on floppy disks or hard drives.

Electronic database-based systems are methods of organizing and storing information using electronic databases. In this system, data is stored and managed using specialized software that allows for efficient storage, retrieval, and manipulation of data.

To know more about organizing visit:

brainly.com/question/28363906

#SPJ11

Me ayudan por fa es para un examen

Me ayudan por fa es para un examen

Answers

Answer:

the image is a bit blurry for me to see

how do you determine whether a column contains one of a particular set of values without using an and condition?

Answers

In order to determine whether a column contains one of a particular set of values without using an AND condition, one can use the IN operator. The IN operator enables a user to specify multiple values in a WHERE clause and retrieve only those rows where a column matches at least one value in the specified set.

The IN operator in SQL is a comparison operator that allows us to define multiple values in a WHERE clause. It is used to retrieve rows based on a specific set of values in a specified column.

The syntax of the IN operator in SQL is as follows:
SELECT column_name(s)
FROM table_name
WHERE column_name IN (value1, value2, ...);

Here is an example to illustrate the use of the IN operator:

Suppose we have a table named "employees" with columns "emp_id", "emp_name", and "emp_dept". To retrieve rows where the "emp_dept" column contains either "Sales" or "Marketing" we would use the following query:

SELECT *
FROM employees
WHERE emp_dept IN ('Sales', 'Marketing');

This query will return all rows where the "emp_dept" column contains either "Sales" or "Marketing". The IN operator allows for more concise and efficient querying of large datasets.

To know about employees visit:

https://brainly.com/question/18633637

#SPJ11

¿ Porque la madera presenta mayor resistencia a ser cortada en sentido travesal que en sentido longitudinal

Answers

A medida que crece un árbol, la mayoría de las células de madera se alinean con el eje del tronco, la rama o la raíz. Estas células están compuestas por haces largos y delgados de fibras, aproximadamente 100 veces más largas que anchas. Esto es lo que le da a la madera su dirección de grano.

La madera es más fuerte en la dirección paralela al grano. Debido a esto, las propiedades de resistencia y rigidez de los paneles estructurales de madera son mayores en la dirección paralela al eje de resistencia que perpendicular a él

What is hierarchy/hierarchical?

Answers

Answer:

A hierarchical is an organizational structure in which items are ranked according to levels of importance. Most governments, corporations and organized religions are hierarchical

This question is for programming in swift playground in learn to code 2 world creation the question is : how do you a lock that controls a platform to make it go up . I will give brainliest if your answer works please respond quickly

Answers

The most effective ways to lock that controls a platform to make it go up is by using a Good power words grab attention. If we used it  and provoke a response, the audience reading will increase by placing them in crucial parts of your message.

In computer and technology, Swift Playgrounds generally can be defined as an educational tool and development environment for the Swift programming language developed by Apple Inc., Swift Playgrounds  technology initially announced at the WWDC 2016 conference. There are several powerful words that can be used to attract someone, such as Evaluate, Formulate, Describe, Support, Trace, Analyze, Infer, Explain, Summarize, Compare, Contrast, and also Predict.

Here you can learn more about swift playground https://brainly.com/question/30270752

#SPJ1

I need help with this codehs assignment.

I need help with this codehs assignment.

Answers

Note that the completed Javascript code is given as follows;

var BOTTOM_RADIUS = 100;

var RATE_OF_DECAY = 0.58;

var RADIUS = 1;

function start() {

 while (RADIUS > BOTTOM_RADIUS) {

   RADIUS *= RATE_OF_DECAY;

   // do something with the updated RADIUS value

 }

}

What is the explanation for the above?


Assuming that the function declaration is fixed, the above stated code would create a loop that reduces the value of the RADIUS variable by multiplying it by the RATE OF DECAY constant until it becomes less than or equal to the BOTTOM RADIUS constant.

The loop would continue to execute as long as the RADIUS value is greater than BOTTOM_RADIUS.

The loop body could be modified to perform some action with the updated RADIUS value, such as drawing a circle with that radius.

Learn more about Javascript Code at:

https://brainly.com/question/30151273

#SPJ1

In order to create a chart, which of the following must be selected?
O Data tools
O Worksheet tab
O Data source
O Table styles

Answers

A chart is the graphical presentation of data and is a part of the data visualization. The data is represented by the symbols and bars in a bar chart.

They are often sued to show large quantities of data in a simple and understandable form. For making a chart first we need to select data tools and then design tools.

Hence the option A is correct.

Learn more about the order to create a chart.

brainly.com/question/22004535.

scheduling is approximated by predicting the next CPU burst with an exponential average of the measured lengths of previous CPU bursts.

Answers

SJF scheduling is approximated by predicting the next CPU burst with an exponential average of the measured lengths of previous CPU bursts.

What is SJF in operating system?

SJF is a term that connote Shortest Job First. It is said to be a type of CPU scheduling whose algorithm is linked with each as it is said to process the length of the next CPU burst.

Note that for one to be able to know the time for the next CPU burst to take place, one need to take the SJF into consideration as that is its function.

Hence, SJF scheduling is approximated by predicting the next CPU burst with an exponential average of the measured lengths of previous CPU bursts.

See options below

A) Multilevel queue

B) RR

C) FCFS

D) SJF

Learn more about scheduling from

https://brainly.com/question/19309520

#SPJ1

The main purpose of encryption is to make data ________.

compact
presentable
standardized
unreadable

Answers

Answer:

compact

Explanation:

because it is the main purpose of encryption

Remote workers in an organization use company-provided laptops with locally installed applications and locally stored data Users can store data on a remote server using an encrypted connection. The organization discovered data stored on a laptop had been made available to the public. Which of the following security solutions would mitigate the risk of future data disclosures?(A) FDE(B) TPM(C) HIDS(D) VPN

Answers

Remote workers can use the security solutions that would mitigate the risk of future data disclosures via the use of FDE.

What is FDE in security?

Full disk encryption (FDE) is known to be a kid of a security measures that is often taken so as to help in the protection of all data saved on a hard drive from any kind of unauthorized access through the use of disk-level encryption.

Therefore, Remote workers can use the security solutions that would mitigate the risk of future data disclosures via the use of FDE.

Learn more about Remote workers from

https://brainly.com/question/26512743

#SPJ1

Understand different customer types and analyze how customers make buying decisions.

Answers

There are several types of customers, such as individual consumers, businesses, government agencies, and non-profit organizations.

What are their characteristics?

Each customer type has unique characteristics and factors that influence their buying decisions. Individual consumers often make buying decisions based on personal preferences, brand reputation, and price.

Businesses focus on the quality, cost, and reliability of products and services, as well as the potential return on investment.

Government agencies consider factors such as budget constraints, regulations, and the ability to meet specific needs.

Non-profit organizations often prioritize the impact and social responsibility of their purchasing decisions.

Ultimately, customers make buying decisions based on a combination of rational and emotional factors that align with their goals and values.

Read more about customers here:

https://brainly.com/question/26313265

#SPJ1

what does a computer do with what it receives from the interpreter?

Answers

Answer:

it executes whatever it receives from the interpreter

What is the final value of x (after this code has executed)?

int x = 0;

for (x = 0; x < 200; x++)

{

System.out.println(x);

}

Answers

Answer:

199

Explanation:

i starts at 0. One more than 0 is one. Until you get 199.  

The computer is counting as seen below:

0

1

2

....

199

Assign ICD-10-CM code Z01.89 (Encounter for other specified special examinations) and the reason for the nonroutine test when __________.

Answers

ICD-10-CM code Z01.89 (Encounter for other specified special examinations) is assigned and the reason for the nonroutine test when there are special examinations or screening examinations that do not fall into any other codes.

In ICD-10-CM, code Z01.89 (Encounter for other specified special examinations) is used when there are special examinations or screening examinations that do not fall into any other codes. This code is used to classify encounters that do not fall into any other specific codes for specialized examinations. This code is used when a patient has a non-routine test, such as a cancer screening or a test for a genetic disorder, that is not performed as part of their usual care. The code does not include routine physical exams, and it should not be used when the encounter is for surveillance, such as a follow-up visit after cancer treatment. The reason for the non-routine test must be specified, and documentation must include the reason for the test.

ICD-10-CM code Z01.89 (Encounter for other specified special examinations) is assigned and the reason for the nonroutine test when there are special examinations or screening examinations that do not fall into any other codes. This code is used to classify encounters that do not fall into any other specific codes for specialized examinations. The reason for the non-routine test must be specified, and documentation must include the reason for the test.

To know more about genetic disorder visit:
https://brainly.com/question/17404085
#SPJ11

Horizontal and vertical flips are often used to create ___.
(Hint: one word, starts with the letter R, 3 syllables) HELP PLEASE !! PHOTOSHOP CLASS !!

Answers

Answer:

Rotation of an image

Explanation:

The correct answer is -  Rotation of an image

Reason -

When you rotate an object, it moves left or right around an axis and keeps the same face toward you.

When you flip an object, the object turns over, either vertically or horizontally, so that the object is now a mirror image.

you hide three worksheets in a workbook and need to unhide them. how can you accomplish this? select an answer: type the name of the hidden worksheet on the keyboard, then click unhide. right-click any visible sheet, then select which worksheet you want to unhide. right-click the button, then select which worksheet you want to unhide. click the view menu, then select unhide worksheets.

Answers

To unhide the hidden worksheets in a workbook, you can follow a simple process in Microsoft Excel.

The correct way to unhide worksheets is by right-clicking any visible sheet, then selecting which worksheet you want to unhide. Follow these steps:

Open the workbook containing the hidden worksheets.Right-click on the tab of any visible sheet at the bottom of the screen.From the context menu that appears, select "Unhide."A new dialog box will open, displaying a list of all hidden worksheets.Click on the worksheet you want to unhide and then click the "OK" button.

Repeat steps 2-5 for each hidden worksheet you want to unhide.

By right-clicking any visible sheet and selecting the worksheet you want to unhide from the context menu, you can easily unhide multiple hidden worksheets in a workbook.

To learn more about Microsoft Excel, visit:

https://brainly.com/question/24202382

#SPJ11

Complete the missing part of the line to allow you to read the contents of the file.
inFile = ____ ('pets.txt','r')

Answers

Answer: Sorry I’m late but the answer is open

Explanation: Edge 2021

The missing part of the line allows you to read the contents of the file. inFile = Open ('pets.txt','r').

What is the file format?

The term file format refers to that, A standard way the information is encoded for storage in a computer file. It specifies how bits are used to encode information in a digital storage medium. File formats may be either proprietary or free.

The file format is the structure of that file, Which runs a program and displays the contents. As there are many examples like a Microsoft Word document saved in the. DOC file format is best viewed in Microsoft Word. Even if another program can open the file.

Therefore, By the File format allows you to read content and can open up the file format.

Learn more about  file format here:

https://brainly.com/question/1856005

#SPJ2

please convert this for loop into while loop

please convert this for loop into while loop

Answers

Answer:

The code segment was written in Python Programming Language;

The while loop equivalent is as follows:

i = 1

j = 1

while i < 6:

     while j < i + 1:

           print('*',end='')

           j = j + 1

     i = i + 1

     print()

Explanation:

(See attachment for proper format of the program)

In the given lines of code to while loop, the iterating variables i and j were initialised to i;

So, the equivalent program segment (in while loop) must also start by initialising both variables to 1;

i = 1

j = 1

The range of the outer iteration is, i = 1 to 6

The equivalent of this (using while loop) is

while ( i < 6)

Not to forget that variable i has been initialized to 1.

The range of the inner iteration is, j = 1 to i + 1;

The equivalent of this (using while loop) is

while ( j < i + 1)

Also, not to forget that variable j has been initialized to 1.

The two iteration is then followed by a print statement; print('*',end='')

After the print statement has been executed, the inner loop must be close (thus was done by the statement on line 6, j = j + 1)

As seen in the for loop statements, the outer loop was closed immediately after the inner loop;

The same is done in the while loop statement (on line 7)

The closure of the inner loop is followed by another print statement on line 7 (i = i + 1)

Both loops were followed by a print statement on line 8.

The output of both program is

*

*

*

*

*

please convert this for loop into while loop

Do you think that the United States would have been able to win world war l and world war ll without the help of code talkers?

Answers

Code talkers helped US to win both the world wars. As the code talkers were the persons who are experts in delivering secret messages in both regional languages and English.

A name, code talker, was given to American Indians who used their regional language to convey secret messages in the warzones.

Type 1 code was the first code created. Code talkers had a tough task of keep moving because there was always a threat to the transmitted messages.

To learn more about code talkers,

https://brainly.com/question/27876958

Other Questions
Tayli wishes to advertise her business, so she gives packs of 13 red flyers to each restaurant owner and sets of 20 blue flyers to each clothing store owner. At the end of the day, Tayli realizes that she gave out the same number of red and blue flyers. What is the minimum number of flyers of each color she distributed? In general, becoming more cautious in making decisions is a characteristic of which stage of adulthood? A. Adolescence B. Young adulthood C. Middle adulthood D. Late adulthood Please select the best answer from the choices provided A B C D. Please help me I will give you a thanks in Brilliant Simplify this expression: 10 + 2 Find the value of x will mark BRAINLYList Which paraphrasing mistake has Mea made?She included ideas not found in the original text.She did not properly cite the source material.She misrepresented the ideas in the original text.She used language too close to the source material. What is the most reasonable inference to draw about annes personality from the details in this speech?. Simone is buying pies for a party.One cherry pie costs $7, and oneapple pie costs $5.If Simone needs to buy at least 18pies and has no more than $110 tospend, what is the maximum number of cherry pies she can buy? What makes an unsaturated fat different from a saturated fat, check all the apply Que tipos de personajes hay en las pelculas de terror y policacas? Calculate the future value of a $1 investment paying interest of 12.2% compounded annually. Work out the value of the investment after 1, 5, and 20 years.Calculate the future value of a $1 investment paying interest of 11.9% compounded semiannually. Work out the value of the investment after 1, 5, and 20 years.Calculate the future value of a $1 investment paying 11.7% compounded continuously. Work out the value of the investment after 1, 5, and 20 years.Which investment would you prefer? Consider the equation - 3x2 + 27x - 63 = 0.What is the discriminant of the equation? List 3 common sources of errors in Gram staining technique and theexpected staining results of each error in both Gram-postive andGram-negative bacteria and how to troubleshoot the listed errorpro Question 4 (15 Points, each 5):How would you interpret the coefficient of B in each model? a) Ln(Y) = B + B, Ln(X1) + BLn(X2) + u, 0 b) Y = B + B, Ln(X1) + BLn(X2)+u, c) Ln(Y)=B+ B, X1 + BxX2 + u, Though abraham attempted to save the city, the destruction could not be prevented. god sent two angels into the city to lead out _____ (the nephew of abraham) and his family to safety. 7+-2 is units from 7 in the direction If you allow a heterozygous tall plant that is heterozygous for purple flowers to self-pollinate, how many tall and purple plants would you expect in the F2 generation if you sample 16 individuals What is the center of the circle having an equation of x2 y2 4x 6y 12 0? 100 points!!!!!!!! A box contains 8 rings, 10 necklaces, and 4 pins. If Anya selects 1 piece at random, does NOT replace it, and then picks another, what is the probability that she selected 2 rings? Which of the following statements regarding nonqualified stock options (NQOs) is false?A) If the value of the options that accrue is greater than the bargain element of options exercised, the book-tax difference for that year is unfavorable.B) All stock option-related book-tax differences are temporary.C) No expense recognition is required for NQOs for financial accounting purposes.D) Book-tax differences associated with NQOs may be either permanent or temporary.