A. Limit the visibility of information in a program
B. Check array bounds
C. Check all inputs for validity
D. None of the mentioned

Explanation: All the options are good practices to achieve Dependability Engineering.

Leave a Reply

Your email address will not be published. Required fields are marked *