1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
atroni [7]
3 years ago
13

________ is the process of inspecting data that has been input to a program to make sure it is valid before using it in a comput

ation.
Computers and Technology
1 answer:
Mumz [18]3 years ago
3 0

Answer:

Hence, <u>Input Validation</u> is the process of inspecting data that has been input to a program to make sure it is valid before using it in a computation.

Explanation:

The input should be validated before further processing to avoid problems in execution of program afterwards.

The process of input validation is defined to make sure that the input is valid.

Hence, <u>Input Validation</u> is the process of inspecting data that has been input to a program to make sure it is valid before using it in a computation ..

You might be interested in
The terminology used to describe a possible path to resolution to a problem from one end to the other is called what?
Ede4ka [16]

The terminology used to describe a possible path to a resolution to a problem from one end to the other is called a solution.

<h3 /><h3>What is terminology?</h3>

The research of these phrases and related applications is known as terminology science. A glossary is a collection of specialist words plus their corresponding interpretations in a given field.

If there is a body or a term which is the need to have a resolution that needs to be made through that the person can evaluate and find a solution for the following situation then that is called a resolution or solution for that particular problem

Learn more about terminology, here:

brainly.com/question/2511894

#SPJ1

6 0
1 year ago
"Which NET command is used on a Windows PC to establish a connection to a shared directory on a remote server?"
Advocard [28]

Answer:

The Tracert command

Explanation:

The tracert command was created to examine the path that packets take as they cross a network and can resolve a hostname by automatically querying a DNS server. The net command is used to manage network computers, servers, printers, and network drives.

6 0
3 years ago
I need help making this table in html code I have some of chart done but idk where to go after the 6:30pm part
Bumek [7]

dvioubfeevuf is hsvqvuvsqv

5 0
3 years ago
Holi alguien sabe como cambiar el gamertag en XBox App (para iOS)?
Schach [20]

Answer:

Hola, cambiar tu gamertag (el nombre o apodo que te identifica en los juegos de XBox en línea) es muy sencillo. Simplemente debes ingresar al menú principal de tu aplicación XBox App, y una vez allí seleccionar la imagen que te identifica como usuario. Al clickear allí, podrás seleccionar la opción Personalizar, donde se desplegará un menú de opciones dentro de las cuales se encontrará la de cambiar tu gamertag o nombre de usuario. Recuerda que solo podrás cambiar tu gamertag en forma gratuita una única vez.

3 0
3 years ago
Biography of bill gates
Juliette [100K]

Answer:

Bill Gates is a technologist, business pioneer, and altruist. He experienced childhood in Seattle, Washington, with a stunning and steady family who empowered his enthusiasm for PCs at an early age. He dropped out of school to begin Microsoft with his beloved companion Paul Allen. He wedded Melinda French in 1994 and they have three kids. Today, Bill and Melinda Gates co-seat the beneficent establishment bearing their names and are cooperating to give their riches back to society.  

Bill experienced childhood in Seattle with his two sisters. His father, William H. Doors II, is a Seattle lawyer and one of the co-seats of the Bill and Melinda Gates Foundation. His late mother, Mary Gates, was a teacher, University of Washington official, and executive of United Way International.

Explanation:

This is just a short biography and not a full one.

5 0
3 years ago
Read 2 more answers
Other questions:
  • _________ is a protocol used by e-mail clients to download e-mails to your computer. (
    6·1 answer
  • Which of the following function headings arevalid? If they are invalid, explain why.
    12·1 answer
  • The term ____ describes primary storage devices that are implemented as microchips, can read and write with equal speed, and can
    8·1 answer
  • Renae wants to write a blog about her favorite sports stars. She wants the blog to be informative and visually appealing, so she
    13·2 answers
  • use the internet to research the SYSTEM account. Why is it nessesary to include this account with full control on a directory
    13·1 answer
  • JPG is considered a lossy file format. What does this mean?
    15·2 answers
  • Which of the following is an input device on a toaster?
    10·2 answers
  • Explain the emerging trends in microcomputer technology in relation to size​
    11·1 answer
  • In order to control access to a company's intranet and other internal networks, all communications pass through a _____ server.
    5·1 answer
  • Which directory contains the initrd file? in suse linux
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!