1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alik [6]
3 years ago
13

Which formal security-related process should take place at the beginning of the code creation project? Group of answer choices R

isk assessment Input validation Output validation SQL injection validation
Computers and Technology
1 answer:
Igoryamba3 years ago
3 0

Answer:

Risk assessment, Input validation and Output validation.

Explanation:

Software development life cycle, SDLC, is a systematic process a software being created must pass through or follow, from the stage of conception to death of the application.

There are various processes that occurs at the beginning of SDLC, a few of the activities are risk management, input and output validation.

Risk management is used to determine the feasibility, usefulness and profitability to cost of the software before development. The input and output validation is for security control access to the data of the software.

You might be interested in
I am a receptionist for a large corporation
Musya8 [376]
Therefore the answer is within yourself
5 0
4 years ago
type the correct answer in the box. Spell all words correctly. Which element of the presentation software can you use to add cal
Anuta_ua [19.1K]

Answer:

The element of the presentation software that can be used to add callous and banners is SHAPES

Using the INSERT TAB, you can add callouts and banners to a slide.

Explanation:

If you want to add callouts and banners to a slide, the presentation software that can be used is PowerPoint.

The element that is used to add it is called shapes and can be found in the Insert Tab.

6 0
3 years ago
Artists who draw images on a computer often use a stylus in conjunction with special _________ tablets, which offer extra-sensit
hodyreva [135]

Answer:

Graphics is the correct answer to the following question.

Explanation:

The following answer is true because Graphic tablet is the device in which a person can draw graphics, images or they can also draw by their hands with use of digital pen which is use for drawing as they draw images on the paper. we can also say the graphic tablet is used for the digital art.

So, That's why the following answer is correct.

6 0
3 years ago
4.2 code need help plz someone 15 points if u help
Korolek [52]

def func():  

 total = 0

 while True:

   pet = input("What pet do you have? ")

   if pet == "rock":

     return

   total += 1

   print("You have a {} with a total of {} pet(s)".format(pet, total))

func()

We wrapped our code in a function so that whenever the user enters rock, we can simply return and exit the function. If you have any other questions, I'll do my best to answer them.

8 0
3 years ago
Although you can use a dialog box to indent paragraphs, word provides a quicker way through the ____.
pishuonlain [190]
B. Quick access toolbar

3 0
3 years ago
Other questions:
  • What is <html>
    9·2 answers
  • 40 POINTS PLZ HELP NEED ASAP!!!
    5·1 answer
  • __________ describes a module for which the software developer does not care how the processing is performed, but instead, knows
    7·1 answer
  • ____________________ parameters are useful in three situations: • When the value of the actual parameter needs to be changed • W
    5·1 answer
  • Keely has an automation tool in place that runs a number of different processes for her and has for the last two years. All of a
    8·1 answer
  • Give one advantage of saving file in the same folder<br>​
    13·2 answers
  • Drow flowchart that finds a<br> series between 10, 100<br> fibonanchi
    6·1 answer
  • An example of a host-based intrusion detection tool is the tripwire program. This is a file integrity checking tool that scans f
    8·1 answer
  • What practice makes it virtually impossible to figure out the geographic location of a company?
    7·1 answer
  • Please write an Introduction on intrusion detection system and prevention system<br> PLEASE
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!