1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alik [6]
3 years ago
13

Which formal security-related process should take place at the beginning of the code creation project? Group of answer choices R

isk assessment Input validation Output validation SQL injection validation
Computers and Technology
1 answer:
Igoryamba3 years ago
3 0

Answer:

Risk assessment, Input validation and Output validation.

Explanation:

Software development life cycle, SDLC, is a systematic process a software being created must pass through or follow, from the stage of conception to death of the application.

There are various processes that occurs at the beginning of SDLC, a few of the activities are risk management, input and output validation.

Risk management is used to determine the feasibility, usefulness and profitability to cost of the software before development. The input and output validation is for security control access to the data of the software.

You might be interested in
Drag each statement to the correct location.
VMariaS [17]

Answer:

(a)\ 222_{10} = DE_{16} --- True

(b)\ D7_{16} = 11010011_2 --- False

(c)\ 13_{16} = 19_{10} --- True

Explanation:

Required

Determine if the statements are true or not.

(a)\ 222_{10} = DE_{16}

To do this, we convert DE from base 16 to base 10 using product rule.

So, we have:

DE_{16} = D * 16^1 + E * 16^0

In hexadecimal.

D =13 \\E = 14

So, we have:

DE_{16} = 13 * 16^1 + 14 * 16^0

DE_{16} = 222_{10}

Hence:

(a) is true

(b)\ D7_{16} = 11010011_2

First, convert D7 to base 10 using product rule

D7_{16} = D * 16^1 + 7 * 16^0

D = 13

So, we have:

D7_{16} = 13 * 16^1 + 7 * 16^0

D7_{16} = 215_{10}

Next convert 215 to base 2, using division rule

215 / 2 = 107 R 1

107/2 =53 R 1

53/2 =26 R1

26/2 = 13 R 0

13/2 = 6 R 1

6/2 = 3 R 0

3/2 = 1 R 1

1/2 = 0 R1

Write the remainders from bottom to top.

D7_{16} = 11010111_2

<em>Hence (b) is false</em>

(c)\ 13_{16} = 19_{10}

Convert 13 to base 10 using product rule

13_{16} = 1 * 16^1 + 3 * 16^0

13_{16} = 19

Hence; (c) is true

7 0
2 years ago
On the seventh day of the iteration, the team realizes that they will not complete 5 of the 13 stories. the product owner says s
nika2105 [10]

Answer:

First of all the team should excuse to the product owner for not being responsible and committed to the deadline.

Secondly, as they have completed the 8 stories, so they should revise and check the flaws in those stories and send to her.

Because when the product owner will check and happy with them, she will surely discuss the remaining stories with the team.

6 0
3 years ago
Which of the following statements are true?
grin007 [14]

Answer:

I think the answer are two which are B and C

7 0
4 years ago
In what ways can information be slanted in a news report?
ratelena [41]

Answer:It all depends on who the reader is likely to be and the information they’ll want.

Explanation:

Newspaper 1: Company wins contract

Newspaper 2: Previous company loses contract (equally true)

Newspaper 3, say a student paper in the local town: Prospects for new jobs open up as company wins contract.

8 0
2 years ago
The collection of computer instructions and other files that constitute a piece of software is
lutik1710 [3]
The answer would be
A. Codebase

8 0
3 years ago
Read 2 more answers
Other questions:
  • Whichof the following is not a standard method called as part of the JSPlife cycle?jspInit()jspService()_jspService()jspDestroy(
    12·1 answer
  • Sarah is entering weekly sales data for week 37 of the current year; however, when she moves down to thecells where she needs to
    8·2 answers
  • What is a way to Procter your social security number and other sensitive information from identity theft
    9·1 answer
  • Kai is a software engineer who started his own IT consulting firm. His friend, Catalina, is the owner of a store that sells offi
    13·2 answers
  • Students who respond promptly to e-mails are following which netiquette rule?
    13·2 answers
  • A(n) __ is a list of main points and sub-points of a topic to include in a presentation
    14·2 answers
  • Write a program that asks the user to enter two integer numbers X and Y. The program halves each number between X and Y then pri
    15·1 answer
  • Apart from the OOPs concepts learned in this lesson, identify additional concepts and write an essay on their functions. Explain
    9·1 answer
  • You can use this keyboard shortcut to toggle the visibility of the command line. If for some reason your command line is hidden
    7·1 answer
  • An international fast-food chain is looking for opportunities to leverage the Cloud to gain insights into customer data, includi
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!