mirror of
https://gitlab.cs.fau.de/ik15ydit/latexandmore.git
synced 2024-11-22 03:49:31 +01:00
small changes
This commit is contained in:
parent
f3540f0126
commit
24ef2d9e8d
@ -1,7 +1,7 @@
|
||||
all: Braindump_SS16.pdf solutions
|
||||
all: klausur_idb_SS16.pdf solutions
|
||||
|
||||
solutions:
|
||||
@pdflatex --jobname=Braindump_SS16_ML "\def\withsolutions{1} \input{Braindump_SS16.tex}"
|
||||
@pdflatex --jobname=klausur_idb_SS16_ML "\def\withsolutions{1} \input{klausur_idb_SS16.tex}"
|
||||
|
||||
continuous: $(PDF).continuous
|
||||
|
||||
|
@ -375,7 +375,7 @@ x & x & x & 0
|
||||
.
|
||||
\end{lstlisting}
|
||||
\solution{
|
||||
\lstinputlisting{tree1.ascii}
|
||||
\lstinputlisting{tree1-sol.ascii}
|
||||
}
|
||||
\textbf{c)} Loesche aus dem folgenden B-Baum den Schluessel 10. Zwischenschritte sind nicht noetig.\\\\
|
||||
\solswitch{\lstinputlisting{tree2.ascii}}{
|
||||
@ -519,10 +519,8 @@ Eher nicht, weil jede versuchte SQL Injection am Integer.parseInt() zerschellt.
|
||||
\vspace{2.5cm}
|
||||
\textbf{b)} Wie kann man das obrige Program SICHER gegen SQL-Injections schuetzen?
|
||||
\solution{
|
||||
\begin{lstlisting}[language=java]
|
||||
preparedStmt.setInt(1, a)
|
||||
preparedStmt.execute();
|
||||
\end{lstlisting}
|
||||
preparedStmt.setInt(1, ai) \\
|
||||
preparedStmt.execute(); \\
|
||||
Aber alleine die Aussage Prepared-Statements empfinde ich hier als wichtig.
|
||||
}
|
||||
\end{document}
|
Loading…
Reference in New Issue
Block a user