The question has the multiple choices below
A) Input validation
B) output correction
C) compiler criticism
D) output validation
The answer is (A) Input validation
Also known as data validation, it is the correct and proper
testing of any input supplied by an application or a user. It prevents wrongly
formed data from entering the system. Applications should be able to check and
validate every input entered into the system since it is hard to detect a
malicious user trying to gain entry into software.
thx for z free points.....
Answer:
the command still has to be carried out.
Answer: Peer-to-Peer architecture.
A Peer-to-Peer network would be sufficient enough to support all three of them. If Edward would set up a client/server network, then it will cost more and may become a problem if the main server will have a malfunction.
One of the good things about having a Peer-to-Peer network for a new company would mainly be the ability of each computer to have the same amount of access to the server files and all. Even if a single computer will have a problem, the other computers will still be able to access the network.