Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
________ can be used to establish risk and stability estimations on an item of code, such as a class or method or even a complete system.
Home
Secure Code Review
________ can be used to establish risk and stability estimations on an item of code, such as a...
0
votes
asked
Mar 16, 2021
in
Secure Code Review
by
rajeshsharma
________ can be used to establish risk and stability estimations on an item of code, such as a class or method or even a complete system.
i) Cyclomatic complextiy
ii) Risk density
iii) Defect density
iv) Lines of code
secure-code-review
cyclometric-complexity
Please
log in
or
register
to answer this question.
1
Answer
0
votes
answered
Mar 16, 2021
by
rajeshsharma
Correct Answer is i) Cyclomatic complextiy
Related questions
0
votes
Q: __________ attempts to quantify the size of the code.
asked
Apr 3, 2020
in
Secure Code Review
by
rajeshsharma
#code-size
secure-code-review
code-review
size-code
0
votes
Q: A solution to enhance security of passwords stored as hashes.
asked
Apr 3, 2020
in
Secure Code Review
by
rajeshsharma
#code-security
secure-code-review
0
votes
Q: The process that gives a person permission to perform a functionality is known as -----------
asked
Apr 3, 2020
in
Secure Code Review
by
rajeshsharma
#code-permission
secure-code-review
0
votes
Q: The account used to make the database connection must have ______ privilege.
asked
Mar 16, 2021
in
Secure Code Review
by
rajeshsharma
secure-code-review
database-connection
database-privilege
0
votes
Q: Which of the following is an efficient way to securely store passwords?
asked
Apr 3, 2020
in
Secure Code Review
by
rajeshsharma
#password-security
secure-code-review
0
votes
Q: Defect density alone can be used to judge the security of code accurately.
asked
Apr 3, 2020
in
Data Handling
by
rajeshsharma
#defect-density
secure-code-review
DataHandling-questions-answers
0
votes
Q: Which of the following is more resistant to SQL injection attacks?
asked
Apr 3, 2020
in
Secure Code Review
by
rajeshsharma
#sql-injection-attack
secure-code-review
code-review
0
votes
Q: Which of the following type of metrics do not involve subjective context but are material facts?
asked
Mar 16, 2021
in
Secure Code Review
by
rajeshsharma
secure-code-review
absolute-metrics
0
votes
Q: Parameterized stored procedures are compiled after the user input is added.
asked
Apr 3, 2020
in
Secure Code Review
by
rajeshsharma
#parameterized-store
secure-code-review
0
votes
Q: A representation of an attribute that cannot be measured directly, and are subjective and dependent on the context of where the metric was derived.
asked
Mar 16, 2021
in
Secure Programming Practices
by
rajeshsharma
secure-code-review
code-review
...