is an evaluation method that uses a program that tests another program.
O A customer satisfaction survey
O A test case
O Automated testing
O Print debugging

Answers

Answer 1
automated testing !!!!$
Answer 2

Answer:

automated testing

Explanation:

got it right on edge


Related Questions

Write a while loop that produces the following output:
1
2
4
8


please i need help

Answers

Answer:

Explanation is being shown in the file to the link

Who was responsible for the development of the rocket motor?
-Technical Societies
-Robert H. Goddard
-Germans
-Wernher von Braun
I WILL MARK YOU BRAINLIEST ‼️‼️

Answers

Answer: Robert H. Goddard

Explanation: he developed and flew the first liquid-propellant rocket

Answer:

-Technical Societies

Explanation:

Rocket enthusiasts and rocket clubs were active in Germany, the US, Russia, and other countries. Experimental rockets were designed, tested, and sometimes flown. Some of the experiments used liquid fuel, though solid-fuel rockets were also developed. In 1932, the rocket motor was developed as a reusable method for the flight of a rocket.

The ________________________ option allows one to start a numbered list on any number desired. [Set Starting Number Values]
Question 7 options:

Number Formats

Change List Level

Define New Number Format

Set Numbering Value

Answers

Answer:

Set Numbering Value.

Explanation:

Microsoft Word refers to a word processing software application or program developed by Microsoft Inc. to enable its users to type, format and save text-based documents.

In Microsoft Word 2019, the users are availed with the ability to edit the word document in the following view type;

I. View Mode.

II. Print Mode.

III. Drift Layout.

A numbered list can be defined as a list of items that are ordered numerically or sorted sequentially.

Basically, it is best suited for steps or procedures that are to be done sequentially or in order i.e in an ascending order. Thus, a numbered list is an ordered list that starts from 1.

The Set Numbering Value option allows one to start a numbered list on any number desired. To automatically create a numbered list in Microsoft Word, you should press 1 followed by a period, leave a space, type a text and then press the enter button.

write Python statement to do the following tasks (a) create a list that contain the name of 5 student of your class (b) add one more name to the list of 5 students (c)
delete the first name from the list of student​

Answers

Answer:

classroster = ["Bill", "Tyler", "Jake", "Sam", "Joe"]

print("Original Roster: " + str(classroster))

classroster.append("June")

print("Added student: " + str(classroster))

classroster.pop(0)

print("Removed the first student" + str(classroster))

Explanation:

We create a variable named classroster and assign it a list value by using []

We print text with the value of the variable classroster, but we used the str tag to make it a string value

We used classroster.append to add "June" to the end of the list.

We then print the classroster again

We use classroster.pop(0) to remove "Bill" on the list. If we wanted to remove "Tyler" from the list, we would use classroster.pop(1).

If we wanted to remove "Jake" we would use classroster.pop(2)

and so on. goodluck!

who plays oblox .............................

Answers

Answer:

Me

Explanation:

MEEEE!!! i love scary games

Why did the editors choose to rearrange the intercutting between Luke’s story and the Imperials? What effect did this have on the final film?

Answers

Answer:

Though it has its merit, know that the rule is not mandatory. ... A jump cut is a cut in film editing in which two sequential shots of the ... An intercut is a type of edit where two or more actions in distinct ...

Where do you enter characters for a simple search?
Choose the answer.
Navigation Pane
Replace dialog box
Clipboard
Find Pane

Answers

Answer:



Navigation Pane

1 2

3 4

Question #4

Multiple Choice

Which statement is true about the random and secrets modules?

O Only the secrets module can generate random numbers.

O Both modules can generate random numbers.

Neither module can generate random numbers.

O Only the random module can generate random numbers.

Answers

Answer:

Both modules can generate random numbers.

Explanation:

Both the random and secrete modules are builtin programming modules used for generating random number variables. The random module consists of a number of methods in its module for random. number generation such as seed() ; getstate() ; random() ; choice() ; randrange() ; randint() and so on. Random methids are best for generating random numbers which are to be adopted for simulation or modeling. The secrete modules does the same however, numbers generated are stronger and less predictable than the random number modules. Secrete modules are usually adopted in the generation of authentication token and security pins.

Answer:

Neither module can generate random numbers.

Explanation:

Because I took the quiz and that's the right answer.

7.6 lesson practice edhesive please help!!

Answers

Answer:

how can i help ?????????????????????????????????????

Explanation:

Choose the term that best fits each definition.
interpret(s) where a user wants to move the mouse through motions or eye movements.
allow(s) users to enter text and control the computer with their voice.
use(s) a synthesized voice to read text on the screen.
Text-to-speech
tracking devices
Speech input software

Answers

Answer: See explanation

Explanation:

The term that fits each definition include:

The mouse through motions or eye movements = tracking devices

Allow(s) users to enter text and control the computer with their voice = Speech input software

Use(s) a synthesized voice to read text on the screen = Text to speech

What is considered appropriate dress for men and women in the workplace? Select all that apply.

Answers

Answer:

I guess clean, pressured pants or skirt

and

dress shirts and ties

Answer:

the first and last

Explanation:

because you don't want to reveal any things that are inappropriate but you still want to be comfortarible.

Describe white blood cells you see at 10X?

Answers

Answer:

White blood cells are part of the body's immune system. They help the body fight infection and other diseases. Types of white blood cells are granulocytes (neutrophils, eosinophils, and basophils), monocytes, and lymphocytes (T cells and B cells). ... Also called leukocyte and WBC.

Explanation:

I'm in need of an answer im not just wasting points for your benefit anymore..

Chris has handed over the screenplay to the sound designer to design the sounds in the movie. He told the sound designer that he has deany Indicated each sound in every scene. How do you think Chris indicated the sound effects in the screenplay?
OA by making the word indicating sound boldface
OB by capitalizing the word indicating sound
OC. by highlighting the word indicating sound
OD. by underlining the word indicating sound​

Answers

Answer:

i would say A, to me it just makes sense

Explanation:

Answer:

B) by capitalizing the word indicating sound

Explanation:

In most scripts for screenplays, words indicating a certain sound for a scene is usually in uppercase letters.

- 2022 Edmentum

You've just deployed a new Cisco router that connects several network segments in your organization. The router is physically located in a server room that requires an ID for access. You've backed up the router configuration to a remote location in an encrypted file. You access the router configuration interface from your notebook computer using a Telnet client with a user name of admin and a password of admin. You have used the MD5 hashing algorithm to protect the password. What should you do to increase the security of this device

Answers

Answer:

The answer is "Use SCP to back up the router configuration to a remote location".

Explanation:

In the SPC, it is the Secure Copy Protocol that allows information to be stored and securely transmitted. Its SCP doesn't encrypt its digital information by itself; it corresponds to both the Security module which provides authentication or security. It allows the safe transfer of personal documents from either a host machine to a remote server. Its transference protocol "FTP" is quite close, but it adds security and authentication.

What is the solution to the equation ?

Answers

There’s no solution to the equation
The correct answer is option D. No solution

Question # 1
Dropdown
Choose the word that matches each definition.
[ ] is the study of designing and building computers and computer-based systems.

Answers

Answer:

Computer engineering

Explanation:

Computer engineering is the answer

Which of the following algorithmic efficiencies would be considered LEAST efficient?

A. Linear
B. Constant
C. Polynomial
D. Exponential

Answers

Answer:exponential

Explanation: I believe

A citation and its ____________________ can be entered at the same time. [Insert Citations]
Question 4 options:

name

date

source

table of contents

Answers

Answer: source

Explanation:

A citation and its source can be entered at the same time. Hence option c is correct.

What is citation?

Citation is defined as how you disclose to your readers that a particular passage in your work was taken from another source. Identifying the sources you used to obtain your knowledge can demonstrate to the reader that you did thorough investigation. to recognize and respect other scholars' work by giving them due credit.

Select the phrase or sentence you wish to cite by clicking at the end of it, and then select Insert Citations from the Citations & Bibliography group on the References tab. Choose the citation you want to use from the list provided under "Insert Citation."

Thus, a citation and its source can be entered at the same time. Hence option c is correct.

To learn more about citation, refer to the link below:

https://brainly.com/question/1272936

#SPJ2

why auto-updates can reduce the risk of a cyberattack?

Answers

Answer:

They help keep your software up to date.

Explanation:

Using Windows for example: With automatic updates, you don't have to search for updates online or worry about missing critical fixes or device drivers for your PC.

You can read more about it here: https://support.microsoft.com/en-us/windows/windows-update-faq-8a903416-6f45-0718-f5c7-375e92dddeb2

I hope this helps you!

Display the IP address of the default gateway of this device.

Answers

Answer:

ipconfig

Explanation:

Type ipconfig and look for a Default Gateway entry that is not blank.

what is two features of the minicomputer?​

Answers

Answer:

It is smaller in size than a mainframe computer. It is less expensive than a super and mainframe computer. It is not much more powerful than the mainframe and supercomputer, but powerful than microcomputers. It supports multiprocessing and multi-tasking.

Explanation:

two ways in which some culter views that exist may affect a relationship negatively​

Answers

Answer:

some people say different culture less they get along

Explanation: or more

how and why Steve Jobs left Apple Computer.

Answers

Answer:

Jobs was forced out of Apple in 1985 after a long power struggle with the company's board and its then-CEO John Sculley. ... He was largely responsible for helping revive Apple, which had been on the verge of bankruptcy.

Explanation:

QUESTION 4 of 10: What term refers to the basic characteristics of a population segment, such as gender, age, and income?

Answers

272727727272727226282829292
Does it offer multiple choices?

Need answer quick plz.

Fill in the blank with the correct response.

A colleague excitedly tells you she has created a interface component for SPSS, a statistics software program. She

has created a

Answers

Answer:

SPSS

IS THE ANSWER

IHOPEIT WILL HELP YOU

Answer:

wassup with it bro i don't even know the answer and i just want the points

Explanation:

Which comparison operator means ‘is not equal to’?



!=


==


=#


%

Answers

Answer:

A. !=

Explanation:

== Means equal, != is like a block of that, meaning NOT EQUAL

As per the operators, the comparison operator that means 'is not equal to' is !=.

The comparison operator!= is used to detect whether two values are not equal. It is often used to assess conditions in programming languages and logical expressions.

When used, the operator determines if the values on each side of it are not equal. The expression evaluates to true if they are not equal.

This operator is useful for comparing data and executing various code blocks based on their inequality.

Thus, programmers may use the!= operator to generate branching logic and make decisions depending on the equality or inequality of values, increasing the flexibility and control of their program.

For more details regarding operators, visit:

https://brainly.com/question/29949119

#SPJ6

How do you open an application on the macOS?

Answers

Click the Launchpad icon in the Dock, or pinch closed with your thumb and three fingers on your trackpad. Then click an app to open it. You can also type an app's name to find the app in Launchpad, then press the Return key to open it.

Answer:

you can simply click on 'application' in the sidebar to open your default application folder, which contain for each app on your system.you can double click any of the icons in here to open them or take you to do it if currently open.

Predict the future that social media will have on society or the environment.

Answers

Answer:

Social networks are becoming more and more popular. More than 80% of the 4.66 billion people on the planet with access to the internet are social network users… and this share is expected to grow!

Society will drift to technology and rely on it more.

Environment wouldn't be taken cared of, and may be damaged.

Explanation:

Answer:

The Influence of Social media is being used in ways that shape politics, business, world culture, education, careers, innovation, and more.

Explanation:

The Influence of Social media is being used in ways that shape politics, business, world culture, education, careers, innovation, and more.

a conditional statement begins with the word 'when" true or false

Answers

Answer:

False

Explanation:

Conditional statements always begin with 'if'.

How do computers process data?

Answers

Data processing, Manipulation of data by a computer. It includes the conversion of raw data to machine-readable form, flow of data through the CPU and memory to output devices, and formatting or transformation of output. Any use of computers to perform defined operations on data can be included under data processing.

Hope this helps!
Other Questions
What was the Shang dynasty ruler called?O A) Prince of PeaceB) Son of HeavenOC) Star of the EastD) Lion of Judah The linear function below represents the total cost in dollars, y, to camp at state Park for x nights. What is most likely represented by the y intercept of the function y=14x +22 a-The number of nights spent camping B-The cost per night to camp at the park C-The number of people camping d- The cost of a one time fee for a camping pernit please help thank you please help 3 time askingggg help meeee 3.1 Mention two social factors that can influence the way wethat understand different gender roles Why did mining attract people to various parts of the Midwest and the West? A. People wanted to start a new life. B. People wanted to make a lot of money. C. People wanted to explore new territories. D. People wanted to own lots of land. HELP PLS!!!!!!! 20 POINTS It is only necessary to underline vocabulary words identified in a test question. Please select the best answer from the choices provided T F? What is the answer to this please???? You are studying the bacteria in the water of a nearby pond. From a 100 mL sample, you use a 0.5 mL subsample to inoculate a plastic dish filled with a semi solid nutrient medium that fosters growth of coliform bacteria. After an appropriate incubation period, you count 100 bacterial colonies growing on the surface of the medium. What conclusion can you make about the coliform bacteria in the pond water First to answer gets brainliest and has to be correct Each Mayan city was called a:providencecity-statemetropolistownpls be fast doing a test What is the constant factor in the geometric pattern below?4, 2, 1, 0.5, 0.25 . . . A. Each term is multiplied by 0.5 B. Each term is multiplied by 1.5. C. Each term is multiplied by 1.75. D. Each term is multiplied by 2. Where does Dobson unit used in ????? Help fast pleaseeeee Which properties describe the elements in group 18? Consider a memory-management system based on paging. The total size of the physical memory is 2 GB, laid out over pages of size 8 KB. The logical address space of each process has been limited to 256 MB. a. Determine the total number of bits in the physical address. b. Determine the number of bits specifying page replacement and the number of bits for page frame number. c. Determine the number of page frames. d. Determine the logical address layout. take 15 Points please Help HURRY!!!! write an equation of the line that is parallel to points (-3,3),(0,1) and passes through the point (0,9)?? help lol what do people use in.stagram more than other apps