Question: The following code segment was provided in Chapter 1 of Java Coding Guidelines : void readData() throws IOException{ BufferedReader br = new BufferedReader(new InputStreamReader( new

The following code segment was provided in Chapter 1 of Java Coding Guidelines:

void readData() throws IOException{ BufferedReader br = new BufferedReader(new InputStreamReader( new FileInputStream("file"))); // Read from the file String data = br.readLine(); }

The code is presented as a noncompliant code example. A compliant solution is presented for this example. For this assignment, identify two additional compliant solutions that can be utilized to ensure protection of sensitive data. Provide a detailed explanation of factors that influence noncompliant code and specifically how your solutions are now compliant.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!