Defensive programming is sometimes referred to as _________.
A. variable programming
B. secure programming
C. interpretive programming
D. chroot programming
B. secure programming
Computer Science & Information Technology
You might also like to view...
A(n) ________ is a graphical object on a form or a report that is used to display
data, perform an action, or make a form or report easier to read. A) text box B) mask C) dialog D) control
Computer Science & Information Technology
Internet Explorer protected mode helps protect against which computer threat?
A) virus infections B) malware being installed on your computer C) hackers seeing your personal data D) unauthorized user logon
Computer Science & Information Technology