1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
butalik [34]
3 years ago
11

Bob is developing a software application and has a field where users may enter a date. He wants to ensure that the values provid

ed by the users are accurate dates to prevent security issues. What technique should Bob use?
Social Studies
2 answers:
dezoksy [38]3 years ago
7 0

Answer:

<em>Input validation </em>

Explanation:

Input validation, also recognized as data validation, is the correct checking of any user or device supplied data.

Input validation prohibits information from reaching an information system incorrectly created. Since it is hard to detect an unauthorized user attempting to attack apps, all data entered into a system should be reviewed and validated by applications.

eduard3 years ago
6 0

Answer:

Input Validation.

Explanation:

Also known as Data validation, this technique checks all data that users or third parties submit to the system and prevents the entrance of badly formatted data. A data dictionary can be used to validate all incoming data or application programs specifically designed for that role.

If information is not properly validated, it can become a security breach, that can lead to injection attacks and compromised systems.

You might be interested in
PLEASE HELP FAST WILL GIVE BRAINLIEST!!!!!!!!
dangina [55]
A bill<span> needs 68 votes to </span>pass<span> the House and 34 votes to </span>pass<span> the Senate. If the House and Senate each </span>pass<span> the same version of the </span>bill<span>, it goes to the governor for a signature.
</span>
7 0
3 years ago
Read 2 more answers
Who is responsible for ensuring that individual and organizational information systems are reliable, secure, efficient, and supp
FinnZ [79.3K]

Answer:

Chief information officer

Explanation:

The Chief Information Officer is responsible for ensuring that individual and organizational information systems are reliable, secure, efficient, and supportable. The duties of the CIO also includes;

1. developing and maintaining information security policies, procedures, and control techniques to address all applicable requirements,

2. overseeing personnel with significant responsibilities for information security and ensuring that the personnel are adequately trained

3. Ensuring that the organization-wide information security program is effectively implemented.

3 0
3 years ago
ACTIVITY 2
labwork [276]

Answer:

Social media can affect many people life's in positive ways. it gives us a way to talk to friends and family and ways to meet new people. u can be yourself and other people can agree with u.

There are many people that might like the same interests as u. u can become friends with them. u can also gain advice with problems.

Social media can also affect people in a negative way because people are too focused on other people opinions and people try too become someone else. people can post innapropaite content which can lead to people watching. drama can happen and it can ruin a persons life.

Explanation:

6 0
3 years ago
Professor Mary tests children's reasoning abilities. She changes the shape of a mound of clay in front of a child and asks if th
Semmy [17]

Answer:Conservation tasks

Explanation:Conservation tasks are task which are meant to establish if the child understands that some items features will remain the same even if it is changed in some way such as when you change the shape , length or alter it in any other ways for example the quantity of mud won't change just because you have shaped it differently,at some age children don't understand this term

5 0
3 years ago
Geography is a very important part of History
Yakvenalex [24]

Answer:

1. true 2. true 3. false 4. middle east 5. false

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • How has casy's experience in prison enabled him to realize the necessity to build a socialist society?
    5·1 answer
  • Why did continental European
    12·1 answer
  • Where is most of the mass of the solar system
    11·2 answers
  • What was the purpose of Washington's neutrality proclamation?
    8·1 answer
  • Who benefits the most from​ America's most expensive entitlement​ programs? A. the poor B. the elderly C. employees D. parents w
    15·1 answer
  • In the context of the four types of leader behavior in the path-goal theory, which leadership behavior is most likely characteri
    14·1 answer
  • Define the term computer laboratory<br>​
    6·1 answer
  • How did art and architecture flourish in Nepal?Explain​
    11·2 answers
  • How have diamonds contributed<br> to civil wars and unrest?
    10·1 answer
  • Enuresis may be caused by: Select one: a. hyperactivity of the prefrontal cortex. b. an immature motor cortex. c. lack of specif
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!