Compliant/Noncompliant Solutions

The following code segment was provided in Chapter 1 of Java Coding Guidelines:

The code is presented as a noncompliant code example.

A compliant solution is presented for this example.

For this paper, identify two additional compliant solutions that can be utilized to ensure the protection of sensitive data (I have provided three compliant solutions. You could pick two of them or create/modify a compliant solution). Provide a detailed explanation of factors that influence non-compliant code and specifically how your solutions are now compliant. Your explanation should be 2 pages in length. You should include at least one source from professional or academic literature such as articles from peer-reviewed journals and relevant textbooks. The use of Wikipedia is not considered an academic or professional reference. You should also ensure to proofread and spell-check your responses. All sources should be formatted using APA guidelines.
Attached are my lecture notes, my three compliant solutions (You could use another solution if you would like), an example essay, Chapter 1 of Java Coding Guideline, and the APA template. Message me if you have any questions regarding the instruction.

Sample Solution

ACED ESSAYS