![Which two statements describe actions developers can take to make their application less vulnerable to security attacks? Which two statements describe actions developers can take to make their application less vulnerable to security attacks?](http://vceguide.com/wp-content/uploads/2018/10/ORACLE-1Z0-148-DATA-10012018_15_Image_0001.jpg)
Which two statements describe actions developers can take to make their application less vulnerable to security attacks?
![New PL/SQL pragma (12cR2) to deprecate program units - sign of a modern programming language - AMIS, Data Driven Blog - Oracle & Microsoft Azure New PL/SQL pragma (12cR2) to deprecate program units - sign of a modern programming language - AMIS, Data Driven Blog - Oracle & Microsoft Azure](https://technology.amis.nl/wp-content/uploads/2016/09/image-7.png)
New PL/SQL pragma (12cR2) to deprecate program units - sign of a modern programming language - AMIS, Data Driven Blog - Oracle & Microsoft Azure
![PL/SQL Cursor: Show the uses of SQL%FOUND to determine if a DELETE statement affected any rows - w3resource PL/SQL Cursor: Show the uses of SQL%FOUND to determine if a DELETE statement affected any rows - w3resource](https://www.w3resource.com/w3r_images/plsql-cursor-exercise-flowchart-5.png)