Input __________ is commonly done with a loop that iterates as long as an input variable contains bad data.
a. check
b. validation
c. examination
d. priming
b. validation
You might also like to view...
A characteristic of a sort pass is the placement of one or more elements in a ____.
A. sorted list B. stack C. queue D. search tree
What tool is used to verify that all the individual wires are properly connected and in the correct location in a cable?
A. RJ-45 crimper B. Volt meter C. Wire snips D. Cable tester
The ends of a(n) ____________________ path do not connect.
Fill in the blank(s) with the appropriate word(s).
The ______ attacks the ability of a network server to respond to TCP connection requests by overflowing the tables used to manage such connections.
A. DNS amplification attack B. SYN spoofing attack C. basic flooding attack D. poison packet attack