Computer Science, asked by abhineetnuts, 4 months ago

In SQL API, Malicious server side programmability w.r.t stored procedures is avoided through ___________

1. Authentication keys

2. Bounds

3. Multi-tenacy

4. All the options

Answers

Answered by Anonymous
15

Answer:

I think the answer is bounds hope it help you

plzz mark my answer as brainliest

Answered by AadilPradhan
1

In SQL API, Malicious server side programmability w.r.t stored procedures is avoided through bounds.

  • The language-integrated, transactional execution of JavaScript is offered by Azure Cosmos DB. You can create stored procedures, triggers, and user-defined functions (UDFs) in JavaScript while utilising the SQL API in Azure Cosmos DB.
  • JavaScript allows you to create logic that runs inside the database engine.
  • The use of stored procedures is ideal for activities that involve a lot of writing and call for a transaction across a partition key value. Whenever choosing whether to employ stored procedures, focus on encapsulating as many writes as you can.
  • Using stored procedures to batch huge numbers of reads to return to the client will not produce the intended result since, generally speaking, stored procedures are not the most efficient way to execute large numbers of read or query operations.
  • These read-intensive actions ought to be carried out on the client-side using the Cosmos SDK for optimal efficiency.

In SQL API, Malicious server side programmability w.r.t stored procedures is avoided through bounds.

#SPJ2

Similar questions