Answer the following statements true (T) or false (F)

1. An ASCII character can be encoded as a 1 to 4 byte sequence using
the UTF-8 encoding.
2 . There is a problem anticipating and testing for all potential types of
non-standard inputs that might be exploited by an attacker to subvert a program.
3. Key issues from a software security perspective are whether the implemented algorithm correctly solves the specified problem, whether the machine instructions executed correctly represent the high level algorithm specification, and whether the manipulation of data values in variables is valid and meaningful.
4. Without suitable synchronization of accesses it is possible that values may be corrupted, or changes lost, due to over-lapping access, use, and replacement of shared values.
5. The correct implementation in the case of an atomic operation is to test separately for the presence of the lockfile and to not always attempt to create it.




1. False
2. True
3. True
4. True
5. Fals

Computer Science & Information Technology

You might also like to view...

Which of the following is NOT an Access arithmetic operator?

A) รท B) + C) * D) ^

Computer Science & Information Technology

Images with continuous color are referred to as:

A) video B) graphics C) photos D) sketches

Computer Science & Information Technology