1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Licemer1 [7]
3 years ago
5

Defensive programming is sometimes referred to as _________.

Computers and Technology
1 answer:
Romashka [77]3 years ago
6 0
Anti-malware and Anti-Virus
You might be interested in
A DSLR camera is made up of two parts. They are
user100 [1]

Answer:

the lens and the camera

Explanation:

3 0
3 years ago
Read 2 more answers
The third wave of computing was characterized by the introduction of _____.
MrRissso [65]

Answer:

personal computers

Explanation:

The third wave of computing was characterized by the introduction of <u>personal computers </u>

4 0
3 years ago
Seeing an error message on the screen after you click on a link or icon may indicate that your PC doesn't have the correct _____
Bad White [126]
A accessory because it will not open if it wont be compatible
3 0
3 years ago
What is the keyboard shortcut to display the merge to printer dialog box?
sp2606 [1]
Alt + Shift + M are the keyboard shortcuts to display the merge to printer dialog box.
3 0
3 years ago
Which of the following statements is true?
Ainat [17]

Answer:

ii,iii,iv

Explanation:

####

4 0
3 years ago
Other questions:
  • Define the method object inc_num_kids() for personinfo. inc_num_kids increments the member data num_kids. sample output for the
    11·1 answer
  • Which three phrases describe a wireframe
    12·1 answer
  • âwhat two log files are used by older versions of unix and newer version of linux to store log information
    10·2 answers
  • Lydia used software and numerical data to create bar graphs. What software did she use?
    8·2 answers
  • . Once a vulnerability has been identified by Nessus, where would you check for more information regarding the identified vulner
    15·1 answer
  • Mr. Perry has bookmarked a large number of webpages in Chrome while researching class topics. Unfortunately, he's bookmarked so
    13·1 answer
  • What are the two ways that assets are
    5·1 answer
  • LAB: Convert to binary - methods
    11·1 answer
  • Please help with coding assignment.
    11·1 answer
  • How is data written to a blockchain?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!