1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Blizzard [7]
2 years ago
12

Sharon is responsible for the security on web applications. She’s looking to see if all applications have input validation. What

is the best way to implement validation?
Computers and Technology
1 answer:
LiRa [457]2 years ago
4 0

Answer:

Options Include:

<em>A) Server-side validation </em>

<em>B) Client-side validation </em>

<em>C) Validate in trust </em>

D) Client-side and server-side validation

<em>Client-side and server-side validation is Correct</em>

Explanation:

The best option is to validate the client side with the server side. Using these together would provide the best testing option for Sharon.

<em>This keeps user feedback instantly without wasting postbacks while also protecting against JavaScript disabled users. That's how the validation controls for ASP.NET operate. </em>

This is definitely not over-engineering as there are risks of using one without the other.

Individual validation on the server side and individual validation on the client side are both incorrect. Trust validation is not a form of validation.

You might be interested in
_______ is identical to the conventional typewriter keyboard
NeX [460]

Answer:

A

Explanation:

:)

4 0
2 years ago
Read 2 more answers
A _____ is a computer virus that replicates and spreads itself, not only from file to file, but from computer to computer via e-
SOVA2 [1]
Trojan horse
....................
6 0
3 years ago
Suppose cell C5 contains the formula =B$6+C1. Match each formula with its respective cell if you copied it.
zheka24 [161]

Answer:

The options are not being given. However, we can place the $ sign in front of letter or number we make it constant across the rows or across the columns. By $B we mean, the column will remain same as B as we move across the rows down or up, and by $6 we mean the row will remain fixed to 6 as you move right or left of the cell where you place $6.

Thus, B$6 + C1,will change to below as you move down:

B$6 + C2

B$6 + C3

B$6 + C5

...... and so on.

and if we move left, it will become:

C$6 +D6

D$6 +E6

E$6 +F6

.........and so on.

Please keep an eye on the letter and number, the way they change in each condition, like if its B the next is C irrespective of columns where the next column starts.

Explanation:

The answer is self explanatory.

8 0
3 years ago
What are the means of hardware security?​
sdas [7]

Answer:

Hardware security is vulnerability protection that comes in the form of a physical device rather than software that is installed on the hardware of a computer system. ... Common examples include hardware firewalls and proxy servers.

Explanation:

Thank you

5 0
2 years ago
Read 2 more answers
Create a 100-word internet company​
vodomira [7]

Answer:

The World Wide Web.

Explanation:

The World Wide Web was created at CERN in Switzerland in 1990. Today, people can pay money to access the Internet from internet service providers.

<em>Hope this helps!</em>

<em />

<em>xoxo,</em>

<em />

<em>cafeology</em>

4 0
3 years ago
Other questions:
  • Research the disadvantages of the computer and explain them.​
    15·1 answer
  • The rod and crankshaft convert the up-and-down motion of the piston into
    12·2 answers
  • the equation t= 0.25d^1/2 can be used to find the number of seconds, t, that it takes an object to fall a distance of d feet how
    8·1 answer
  • Which ipv6 prefix will the typical enterprise network receive from the service provider?
    12·1 answer
  • Direct Mapped Cache. Memory is byte addressable. Fill in the missing fields based upon the properties of a direct-mapped cache.
    6·1 answer
  • Samantha is in the beginning stages of OOP program development. What are the five steps she must follow for creating an OOP prog
    6·2 answers
  • I'm trying to network two laptops together using ethernet cable but it isn't working. Why isn't it working
    9·1 answer
  • Over the past year alone, more than _________ have been stolen from Target.
    10·2 answers
  • HELP !!! Prompt <br> What is formatting text?
    7·2 answers
  • JAVA- If you have an int as the actual parameters, will it change to fit the parameters if it requires a double, or will the cod
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!