Defensive programming is sometimes referred to as _________.

A. variable programming
B. secure programming
C. interpretive programming
D. chroot programming

B. secure programming

Computer Science & Information Technology

You might also like to view...

A(n) ________ is a graphical object on a form or a report that is used to display

data, perform an action, or make a form or report easier to read. A) text box B) mask C) dialog D) control

Computer Science & Information Technology

Internet Explorer protected mode helps protect against which computer threat?

A) virus infections B) malware being installed on your computer C) hackers seeing your personal data D) unauthorized user logon

Computer Science & Information Technology