1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alexxx [7]
3 years ago
5

Why it is so important for all application builders to always check data received from unknown sources, such as web applications

, before using that data?
Computers and Technology
1 answer:
Aleks04 [339]3 years ago
6 0
The already-long problem on hacking and other security-related cases necessitates for the application builders to check the data received from unknown sources. To further strengthen the security, even data received from known sources also need to be check as these may also contain harmful viruses creating critical problem to the application. 
You might be interested in
The memory process of retaining information received is called __________.
Phantasy [73]

The answer is C. Storing

4 0
4 years ago
Read 2 more answers
What allows windows to quickly be resized by clicking the title bar of the window and dragging it to the top, sides, or middle o
ozzi

Answer: Snap

Explanation:Snapping is the technique in the computer field that helps in the positioning of the object or other component by the dragging motion. It works conveniently and the movement of dragging makes it easy.

The snapping works by the dragging the desktop, window or other component in sideways,top,vertically,middle, horizontally ,adjusting to the edges of desktop screen etc.

6 0
3 years ago
I Promise Brainliest !!!!! Describe how the aperture size relates to the size of the lens opening.
sergey [27]

Answer:

As aperture increases in f-stop values, the lens closes. On the other hand, when aperture decreases in f-stop values, the lens opens.

Explanation:<u><em>plz give brainlist</em></u>

8 0
3 years ago
Read 2 more answers
If u had a virus and u didn’t know how must damage will there be and how long will it take for you to notice?
Dimas [21]

<u>The Virus:</u>

A virus can be defined as a malicious program, that breaks into the computer without the consent of the user and sometimes even without the knowledge of the user. Viruses are also of different types and categories.

There are certain kinds of malware and spyware that enter a computer and start encrypting the user's data. Generally, a user gets to know about the existence of a virus when the computer programs begin to misbehave. Some files get corrupted and the user can't access them anymore.

Some files and programs may also get deleted as if they weren't even present on the system. But in case someone has installed good anti-virus software, they will get a notification as soon as some file containing some kind of virus enters the computer.

7 0
3 years ago
Next, determine if the given number is a prime number. A prime number is a number that has no positive divisors other than 1 and
Darya [45]

Answer:

Explanation:

whats the number?

6 0
3 years ago
Other questions:
  • _____ is published by the U.S. Bureau of Labor Statistics. It provides up-to-date career outlook information. It is no longer av
    15·2 answers
  • How to write a program that prompts the user to input two POSITIVE numbers — a dividend (numerator) and a divisor (denominator).
    13·1 answer
  • Which form of Internet access currently uses a technology called 4G?
    15·2 answers
  • What is the keyboard shortcut to display the merge to printer dialog box?
    5·1 answer
  • 50 pts. please help ! Explain briefly the role, responsibilities, and required background of the production designer of a film.
    12·1 answer
  • Critics of media consumption
    10·2 answers
  • Jerry is having trouble finding the information that he needs from his search results. Which technique would you suggest he use
    14·2 answers
  • Hey how are yall today?
    12·2 answers
  • Using examples, evaluate the open source model of software development. In your discussion highlight some of its advantages and
    12·1 answer
  • Which computer application is an example of a DBMS?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!