Pam's boss, Alan, says that she needs to write her software so that it is protected against the security risks of today and tomorrow. How is this even possible, given that we don't even know what the security risks of tomorrow are?
What will be an ideal response?
Alan is probably trying to get Pam to use good software practices, such as code
walkthroughs, software visualization, team programming, and avoid buffer overflows. These
practices can reduce software vulnerabilities that could be exploited in the future.
You might also like to view...
In order to break out of a command or process on a terminal, what keys should you press?
A. ctrl+alt+del B. ctrl+space C. alt+del D. ctrl+c
Which of the following statements is not true about zipped folders?
a. Zipped folders are created with file compression software. b. Zipped folders must be extracted before they can be used. c. Zipped folders can be used only in Windows 7 d. Zipped folders enable files to download quickly.
In Page Break Preview, automatic page breaks are indicated by solid blue lines
Indicate whether the statement is true or false
If a given column displays a series of ____, the information is too wide to display within the width of the column.
A. pound signs B. question marks C. exclamation points D. ampersands