The purpose of __________________ is to isolate the behavior of a given component of software. It is an excellent tool for software validation testing.a. white box testingb. special box testingc. class box testingd. black-box testing
Answer:
d.) black-box testing
Explanation:
Software testing can be regarded as procedures/process engage in the verification of a system, it helps in detection of failure in the software, then after knowing the defect , then it can be corrected. Black Box Testing can be regarded as a type of software testing method whereby internal structure as well as design of the item under test is not known by one testing it. In this testing internal structure of code/ program is unknown when testing the software, it is very useful in checking functionality of a particular application. Some of the black box testing techniques commonly used are; Equivalence Partitioning, Cause effect graphing as well as Boundary value analysis. It should be noted that the purpose of black-box testing is to isolate the behavior of a given component of software.
Use the drop-down tool to select the phrase that completes each sentence,
In Windows, deleted files go to the
If you want to see the most information about a file, you can view them in
A file manager can help you
DONE
I
Answer:
1. recycle bin
2. details view
3. move a file
Explanation:
i did the assignment on edge. and got it right
Answer:
In Windows, deleted files go to the
✔ Recycle Bin
If you want to see the most information about a file, you can view them in
✔ details view
A file manager can help you
✔ move a file
Explanation: Hope it helps ^w^
If a computer reboots itself on its own, the computer might have a(n) access problem. hardware problem. Internet problem. software problem.
Answer:
D) Software problem
Explanation:
plz give me brainliest
D
edge2021 YWWWWWWWWWWWWWWWWWWWWW
Is it important to use varied methods when creating digital media presentations? Why or why not?
Yes, because no one method is capable of adequately delivering the information.
No, because using more than one method is confusing to the audience.
No, because the different methods are incompatible with each other.
Yes, because it makes the presentation more interesting for the audience.
having a bad day? enjoy this front view of phinias (can't spell his name)
Answer:
ouch what happened to him
congrats you ruined my childhood
(thanks for the free points!!)
What input is needed for the defined output?
Answer:
The data that are needed to be included in the output is called as
Inputs are the signals or data received by the system and outputs are the signals or data sent from it. The term can also be used as part of an action; to "perform I/O" is to perform an input or output operation
What is the purpose of a Hyperlink
Can you answer both
Answer:
Number 16 is A Or B And Number 17 is B I think
Explanation:
Designing the right elements for the tasks that the user is attempting to perform is called ________.
Answer:
Interface design
Explanation:
INTERFACE DESIGN are design that are carried out on either a computer or a mobile phone or other devices that will suit the users by designing the style of the devices and how the device will look like which will inturn enable the user to easily carried out or performed any tasks they are want to perform with easy and without any lapses which is why it is important for INTERFACE DESIGN to be design with the right tools that the user can easily understand in order to access and perform their tasks effectively.
Even with a quality burglary-resistant chest on the premises, special function locks may be appropriate because:________.
a. A dishonest worker might open the safe at night .b. A burglar may force a worker to open the safe during working hours.c. Without special locking devices, workers may be tempted to leave the safe unlocked for easy access during the day.d. All of the above
Answer:
d ) all of the above
Explanation:
is the correct answer
Suppose that a t-shirt comes in five sizes: S, M, L, XL, XXL. Each size comes in four colors. How many possible t-shirts are there?
Answer:
120
Explanation:
This question is basically asking how many ways can we arrange 5 sizes of shirts if they come in 4 colors.
5 permutation of 4
To find permutation, we use the formula
P(n, r) = n! / (n - r)!
Where
n is the size of the shirts available, 5
r is the color of each shirt available, 4
P(5, 4) = 5! / (5 - 4)!
P(5, 4) = (5 * 4 * 3 * 2 * 1) / 1!
P(5, 4) = 120 / 1
P(5, 4) = 120
Therefore, the total number of shirts available is 120
Which important aspect of the Roman Empire did the barbarians destroy?
Answer:
centers of learning
Explanation:
Under the leadership of Emperor Valens, Rome was already having financial hardships. This meant that it didn't have enough money left to repair its empire nor to strengthen it against invaders. Soon, the barbarians such as the Franks, Huns, Saxons, etc. started attacking Rome. They spent a lot of time destroying the outer regions of the empire because they were also at war with each other. They penetrated Rome and it soon fell. The barbarians didn't only destroy the cities but they also destroyed the "centers of learning." Roman people were known to value education. With the fall of the Roman Empire, so did education and sophisticated architectures follow.
Answer:
i dont know but them barbs are crazy can't believe they were a thing back then
Explanation:
lol
What is Microsoft PowerPoint?
Oa presentation program included with Microsoft Office
oa project management program available only in certain versions of Microsoft Office
Oa desktop publishing program included with Microsoft Office
oa collaboration program available only in certain versions of Microsoft Office
Answer:
ITS THE FIRST ONE :)
Explanation:
ALSO IF ITS NOT THE FIRST ONE GO ON YT!
g A CPU is equipped with a cache; Accessing a word takes 20 clock cycles if the data is not in the cache and 5 clock cycles if the data is in the cache. What is the effective memory access time in clock cycles if the hit ratio is 90%
Answer:
6.5
Explanation:
The formula to calculate the efficiency is;
= (cache-click-cycle x hit ratio) + ( memory-clock-cycle x 1 - hit ratio)
= (5 x 0.9) + ( 20 x 0.1)
= 4.5 + 2
= 6.5
In this exercise we have to use the knowledge of efficiency, in this way, using the data already informed, we can say that the result of this is:
6.5 effective memory
In this exercise, it was informed that some conditions must be established, that is:
Hit radio: 90%Memory: 20Cache: 5
The formula to calculate the efficiency is;
[tex]efficiency= ((cache-click-cycle)(hit \ ratio)) + ( (memory-clock-cycle)(1 - hit \ ratio))[/tex]
Substituting the known values in the formula above, we find that:
[tex]= (5)(0.9) + ( 20)(0.1)\\= 4.5 + 2\\= 6.5[/tex]
See more about efficiency at brainly.com/question/6672666
Question # 6
Dropdown
Choose the correct ending to the sentence below.
The function localtime() _____________________
Answer:
returns a different value every time you use it
Explanation: :)
what types of problems if no antivirus is not installed
If you meant what would happen if you don't install an antivirus software, trust me, you don't want to know. I'd definitely recommend either Webroot (I believe that's how it's spelled) or Mcafee.
Should video gaming be considered a school sport?
Answer:
I believe it should be in higher grades such as high school or college so people don't abuse it like little kids might.
Answer:
No because the defininition of sports is an activity involving physical exertion and Video games don't involve physical extertion.
Guys, please help me asap (Photo Attached) !!!!!!! HELP 25pts!!!!
Answer:
20%
Convert fraction (ratio) 30 / 150 Answer: 20%
The first one.
Please I need one more braniest for 'expert' may I get it?
Explanation:
2. The Warren Commission investigated the assassination of President _______________________ in 1964.
Answer:
President Kennedy
Explanation:
John F. Kennedy was the 35th President of US. He was assassinated in 1963 in Dallas
You are part of a sales group that has been asked to give a presentation.
Before you begin, what should you and your group do?
O A. Figure out who is the best public speaker.
O B. Look into file-sharing options so that everyone can work on the
same file at the same time.
OC. Buy the best software on the market.
O D. Ask if you have to give a slide presentation.
Which Cisco IOS command will permit the engineer to modify the current configuration of the switch while it is powered on?
what is spread sheet software?
Answer:
The answer to this question is given in the explanation section.
Explanation:
This is a type of software which show us data in tabular form. These software can easily store, analyze and organize data.
They are divided in rows and columns. They are mainly used for accounting and book keeping.
The commonly used spread sheet software in the market are MS Excel by Microsoft, Calc by libre office.
Is anyone else having an issue with brainly mobile, where they don't let you watch ads? If so, what do you do to fix it?
Answer:
no im not
Explanation:
but i sorry that you are
help please with the question in the photo
Answer:
A
Explanation:
A because, why would someone want to listen to your own interests?
Generally speaking, digital marketing targets any digital device and uses it to advertise and sell a(n) _____.
religion
product or service
governmental policy
idea
Answer:
product or service
Explanation:
Digital marketing is a type of marketing that uses the internet and digital media for the promotional purposes. It is a new form of marketing where the products are not physically present. The products and services are digitally advertised and are used for the popularity and promotion. Internet and digital space are involved in the promotion. Social media, mobile applications and websites are used for the purpose.
Answer:
A.) Product or service
Explanation:
Digital marketing is the practice of promoting products or services through digital channels, such as websites, search engines, social media, email, and mobile apps. The goal of digital marketing is to reach and engage with potential customers and ultimately to drive sales of a product or service. It can target any digital device that can access the internet, and it can use a variety of techniques such as search engine optimization, pay-per-click advertising, social media marketing, content marketing, and email marketing to achieve its objectives.
what is the operating system on an IBM computer?
Answer:
OS/VS2 and MVS
Explanation:
The question is in the photo
Answer:
a
the most suitable answer
Why are people's visions of utopias and dystopias subjective?
A. Because the vision one person has of paradise will likely match
the vision most people have of a utopia
B. Because only certain technologies make things better and
different ones make things worse in a dystopia
C. Because all technology is dangerous and can lead to the downfall
of all societies, resulting in dystopia
D. Because the technology needed for one person's utopia may be
what creates disaster for another person's dystopia
Answer:
D. Because the technology needed for one person's utopia may be what creates disaster for another person's dystopia.
Explanation:
Because the technology needed for one person's utopia may be what creates disaster for another person's dystopia are people's visions of utopias and dystopias subjective. Thus option D is correct.
What are utopias and dystopias?Speculative fiction categories that study social as well as political structures include utopian and dystopian literature. In order to pique readers' interest, utopian fiction often depicts a world that adheres to the author's ethics and has many elements of a different reality.
Ultimately, it all varies depending on who you ask. A person's dystopia may be another person's utopia. We don't all have the same notions regarding what a utopia would look like, which is, in my opinion, one of the grounds why people don't live in one. Therefore, option D is the correct option.
Learn more about utopias and dystopias, Here:
https://brainly.com/question/905235
#SPJ2
If an object someThing has a method someMethod( ), then you can call the method using the statement ____________ .
a. someMethod(someThing);
b. someThing.someMethod( );
c. someMethod.someThing() ;
d. someThing = someMethod( );
Answer:
C) someThing.someMethod( )
Explanation:
The methods in a class can be accessed outside the class (assuming they are public methods and not private to the class) by using the dot(.) symbol and calling the method on the instance or object of the class.
In this case, the object of the class someThing, calls the method, someMethod( ) by using a dot and the name of the method with a parentheses at the end. This enables the code in the method act on the class instance or object.
If you are a mathematics student and want to study the secret of writing cryptographic codes, algorithms, encryption and decryption techniques, then you are learning about cryptography.
If you are a cryptography student and want to write a PHD style paper on cryptography and cryptanalysis, then you are learning about cryptology.
If you work at the code breaking division at the National Security Agency (NSA), then you are part of which team?
A. Cryptosystems Team
B. Cryptanalysis Team
C. Cryptologist Team
D. Cracker Team
Answer:
d
Explanation:
hi
The National Vulnerability Database (NVD) is responsible for actively performing vulnerability testing for every company's software and hardware infrastructure. Is this statement true or false?A. TrueB. False
Answer:
False
Explanation:
The answer to this question is false. This is because the NVD doesn't perform such tests on their own. Instead they they rely on third-party vendors, software researchers, etc to get such reports and do the assignment of CVSS scores for softwares
The National Vulnerability Database (NVD) is the United State governments leading resource for software vulnerability