An application receives a valid JSON Web Token (JWT) after a…

An application receives a valid JSON Web Token (JWT) after a successful login. The development team must decide how to store this token on the client side to protect it from malicious third-party JavaScript executing XSS attacks. Which storage intervention is required to neutralize this specific threat?

A software designer is tasked with improving an app for user…

A software designer is tasked with improving an app for users with arthritis. In their design proposal, they write: “The user’s physical deficit restricts their ability to tap small buttons, so we must build a specialized voice-control add-on to compensate for their lack of ability.” Based on the lecture, which concept does this specific reasoning best reflect?