1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
butalik [34]
3 years ago
11

Bob is developing a software application and has a field where users may enter a date. He wants to ensure that the values provid

ed by the users are accurate dates to prevent security issues. What technique should Bob use?
Social Studies
2 answers:
dezoksy [38]3 years ago
7 0

Answer:

<em>Input validation </em>

Explanation:

Input validation, also recognized as data validation, is the correct checking of any user or device supplied data.

Input validation prohibits information from reaching an information system incorrectly created. Since it is hard to detect an unauthorized user attempting to attack apps, all data entered into a system should be reviewed and validated by applications.

eduard3 years ago
6 0

Answer:

Input Validation.

Explanation:

Also known as Data validation, this technique checks all data that users or third parties submit to the system and prevents the entrance of badly formatted data. A data dictionary can be used to validate all incoming data or application programs specifically designed for that role.

If information is not properly validated, it can become a security breach, that can lead to injection attacks and compromised systems.

You might be interested in
Programs such as neighborhood watch, operation id, and crime stoppers are all a form of which strategy?
joja [24]
Community mobilization.
5 0
3 years ago
When an organization discovers problematic content on one of its social media​ sites, there are three possible responses. those
NISA [10]
The three possible responses are: <span>leave it, respond to it, delete it

All the decisions would be based on term of services that the organization give for the users.
If the 'problematic' content is still within the scope of the term of services, they would most likely leave it, if it need some adjustments, they would respond it, but if it clearly violate the terms, they technically have the right to delete it.</span>
8 0
3 years ago
What is one of the biggest challenges facing groups and organizations that try to prevent intimate partner violence (IPV)?
madam [21]

Answer:

The correct answer is: "a. The victims of IPV do not report the abuse".

Explanation:

Intimate Partner Violence (IPV) is also known as domestic violence and has to do with any kind of violence concerning intimate relationships, whether it is physical, sexual, psychological, economic, or verbal abuse violence and harm. In terms of the groups and organizations which want to help people who suffer IPV, there are a lot of factors that contribute to not solve the problem, such as economic background, schooling, people not concerned or conscious about this kind of violence, among others. Therefore, letter "a" is the best answer because it has been a fact that most people do not report abuse for they fear subsequent violence and more abuse, although to report the abuse is the best action to take. All the other options are lacking in some way because they are not completly true.

(ps: mark as brainliest, please?!)

6 0
3 years ago
The main factor contributing to the establishment of modern Israel was that the Jewish people had
Rufina [12.5K]
You have to be more specific on what you need. Israel was made as compensation for the death of 6 million white Jews. They also longed for a country due to constant oppression in history as well. If this isn't want you're looking for comment back with more details.
5 0
3 years ago
What kind of volcanic activity might you expect to observe at or near a dormant volcano?
Alisiya [41]

Answer:

May not erupt for thousands of years, may create hot spots or geysers.

Explanation:

4 0
2 years ago
Read 2 more answers
Other questions:
  • What does the us constitution give the president the exclusive power to do
    8·2 answers
  • Thomas proposed that what two personality dimensions can represent the levels of concern underlying the five conflict management
    10·1 answer
  • What is one advantage of using naturalistic observation over the case study method?
    9·2 answers
  • What is the purpose of this kind of map?
    7·2 answers
  • Bobby stole money from the local grocery store on the corner to buy beer. He later assaulted a 72-year-old woman and stole her p
    15·1 answer
  • Ravi works in customer service for a company that has a high volume of dissatisfied customers who often express their anger in h
    15·1 answer
  • What is the literal and contextualist meaning and moral of the story about the lost sheep?
    7·1 answer
  • ⚠️⚠️⚠️TRUE OR FALSE!!! WITH EXPLANATION ⚠️⚠️
    15·2 answers
  • What is jewish mysticism, please explain for me!!
    10·1 answer
  • History of Ancient China<br> 1. Why didn't Emperor Qin like scholars and their books
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!