Defensive programming is sometimes referred to as _________.
A. variable programming
B. secure programming
C. interpretive programming
D. chroot programming
B. secure programming
Computer Science & Information Technology
You might also like to view...
For the following Web page, list all of the objects and actions
Computer Science & Information Technology
Referring to the accompanying figure, which callout points to the control that allows you to preview each page?
A. G B. D C. C D. E
Computer Science & Information Technology
Which of the following is the first packet sent in the TCP three-way handshake?
A. RST B. SYN C. ACK D. PSH
Computer Science & Information Technology
The ________ Wizard locates duplicate records in a table
Fill in the blank(s) with correct word
Computer Science & Information Technology