your team is developing an update to a piece of code that allows customers to update their billing and shipping addresses in the web application. the shipping address field used in the database was designed with a limit of 75 characters. your team's web programmer has brought you some algorithms that may help prevent an attacker from trying to conduct a buffer overflow attack by submitting invalid input to the shipping address field. which pseudo-code represents the best solution to prevent this issue