Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
A representation of an attribute that cannot be measured directly, and are subjective and dependent on the context of where the metric was derived.
Home
Secure Programming Practices
A representation of an attribute that cannot be measured directly, and are subjective and dependent...
0
votes
asked
Mar 16, 2021
in
Secure Programming Practices
by
rajeshsharma
A representation of an attribute that cannot be measured directly, and are subjective and dependent on the context of where the metric was derived.
i) Relative Metrics
ii) Absolute Metrics
secure-code-review
code-review
Please
log in
or
register
to answer this question.
1
Answer
0
votes
answered
Mar 16, 2021
by
rajeshsharma
Correct Answer is i) Relative Metrics
Related questions
0
votes
Q: __________ attempts to quantify the size of the code.
asked
Apr 3, 2020
in
Secure Code Review
by
rajeshsharma
#code-size
secure-code-review
code-review
size-code
0
votes
Q: Which of the following is more resistant to SQL injection attacks?
asked
Apr 3, 2020
in
Secure Code Review
by
rajeshsharma
#sql-injection-attack
secure-code-review
code-review
0
votes
Q: Which of the following type of metrics do not involve subjective context but are material facts?
asked
Mar 16, 2021
in
Secure Code Review
by
rajeshsharma
secure-code-review
absolute-metrics
0
votes
Q: ________ can be used to establish risk and stability estimations on an item of code, such as a class or method or even a complete system.
asked
Mar 16, 2021
in
Secure Code Review
by
rajeshsharma
secure-code-review
cyclometric-complexity
0
votes
Q: Attacks that occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user.
asked
Apr 3, 2020
in
Data Handling
by
rajeshsharma
#xss-attacks
secure-code-review
DataHandling-questions-answers
0
votes
Q: The average occurrance of programming faults per Lines of Code (LOC) is known as _______.
asked
Apr 3, 2020
in
Secure Code Review
by
rajeshsharma
#defect-density
code-review
secue-code-review
0
votes
Q: The approach to input validation that simply encodes characters considered "bad" to a format which should not affect the functionality of the application and hence is very weak
asked
Apr 3, 2020
in
Data Handling
by
rajeshsharma
#encoding
secure-code-review
DataHandling-questions-answers
0
votes
Q: Representation of numbers, as physically measured on the surface of the graph itself, should be ______________ proportional to the numerical quantities represented.
asked
May 2, 2020
by
James
+1
vote
Q: Representation of numbers, as physically measured on the surface of the graph itself, should be ______________ proportional to the numerical quantities represented.
asked
Jan 21, 2020
in
Data Science
by
sharadyadav1986
#graphical-representation
0
votes
Q: The process that gives a person permission to perform a functionality is known as -----------
asked
Apr 3, 2020
in
Secure Code Review
by
rajeshsharma
#code-permission
secure-code-review
...