Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
__________ attempts to quantify the size of the code.
Home
Secure Code Review
__________ attempts to quantify the size of the code.
0
votes
asked
Apr 3, 2020
in
Secure Code Review
by
rajeshsharma
recategorized
Mar 16, 2021
by
rajeshsharma
__________ attempts to quantify the size of the code.
i) Lines of Code
ii) Cyclomatic complexity
iii) Path complexity
#code-size
secure-code-review
code-review
size-code
Please
log in
or
register
to answer this question.
1
Answer
0
votes
answered
Mar 16, 2021
by
rajeshsharma
Correct Answer is i) Lines of Code
Related questions
0
votes
Q: Which of the following is more resistant to SQL injection attacks?
asked
Apr 3, 2020
in
Secure Code Review
by
rajeshsharma
#sql-injection-attack
secure-code-review
code-review
0
votes
Q: A representation of an attribute that cannot be measured directly, and are subjective and dependent on the context of where the metric was derived.
asked
Mar 16, 2021
in
Secure Programming Practices
by
rajeshsharma
secure-code-review
code-review
0
votes
Q: The average occurrance of programming faults per Lines of Code (LOC) is known as _______.
asked
Apr 3, 2020
in
Secure Code Review
by
rajeshsharma
#defect-density
code-review
secue-code-review
0
votes
Q: ________ can be used to establish risk and stability estimations on an item of code, such as a class or method or even a complete system.
asked
Mar 16, 2021
in
Secure Code Review
by
rajeshsharma
secure-code-review
cyclometric-complexity
0
votes
Q: The account used to make the database connection must have ______ privilege.
asked
Mar 16, 2021
in
Secure Code Review
by
rajeshsharma
secure-code-review
database-connection
database-privilege
0
votes
Q: Which of the following is an efficient way to securely store passwords?
asked
Apr 3, 2020
in
Secure Code Review
by
rajeshsharma
#password-security
secure-code-review
0
votes
Q: A solution to enhance security of passwords stored as hashes.
asked
Apr 3, 2020
in
Secure Code Review
by
rajeshsharma
#code-security
secure-code-review
0
votes
Q: The process that gives a person permission to perform a functionality is known as -----------
asked
Apr 3, 2020
in
Secure Code Review
by
rajeshsharma
#code-permission
secure-code-review
0
votes
Q: Which of the following type of metrics do not involve subjective context but are material facts?
asked
Mar 16, 2021
in
Secure Code Review
by
rajeshsharma
secure-code-review
absolute-metrics
0
votes
Q: Parameterized stored procedures are compiled after the user input is added.
asked
Apr 3, 2020
in
Secure Code Review
by
rajeshsharma
#parameterized-store
secure-code-review
...