1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stiks02 [169]
3 years ago
11

Brian is testing a banking application. He enters an input and expects a certain output. What is the actual output of the applic

ation?
A.) output expected by developers
B.) output expected by users
C.) output from executing the software
D.) output expected by testers
Computers and Technology
1 answer:
Stella [2.4K]3 years ago
3 0
The answer is A hope it helps
You might be interested in
What is the largest software application on a computer?
RSB [31]

Answer:

Mac OS X I believe

7 0
3 years ago
Read 2 more answers
Briefly describe the interface between the memory and the processing unit. That is, describe the method by which the memory and
xxMikexx [17]

Answer:

The memory and the processing unit communicate through the Memory Address Register (MAR) and the Memory Data Register (MDR).

Explanation:

7 0
4 years ago
What should I put on a college application?⊕
gizmo_the_mogwai [7]

Answer:

Student Government. ...

Academic Teams and Clubs. ...

The Debate Team. ...

The Arts. ...

Internships. ...

Culture Clubs. ...

Volunteer Work and Community Service. ...

The Student Newspaper.

Explanation:

8 0
4 years ago
Additional rows and columns are inserted into a table using the
Paladinen [302]
The Option D , Table Tools Insert
6 0
3 years ago
चार फरक छुट्याउनुहोस् ।) 3. Write down any four provisions of cyber ethic साइबर नैतिकताका कुनै चार प्रावधानहरु लेख्नुहोस् ।​
Kruka [31]

Answer:

Five provisions of cyber ethics are:

Your computer or system should not be used to harm others. Your cyber knowledge should not be used to steal other people's resources. One should not use or copy softwares for which you have not paid. ... Never use other people's resources without their consent.

7 0
3 years ago
Other questions:
  • Is brainly down? Cant search anything
    8·1 answer
  • What is the best overall approach to education and career development for IT professionals?
    14·1 answer
  • Can using interior light help improve a drivers visibility at night
    9·1 answer
  • Which component of the Hyper-V architecture controls all communication with the physical hardware on the computer?
    8·1 answer
  • 2. What's the keyboard command that will allow you to "copy" text?
    8·2 answers
  • Which of the following illustrates an example of a Boolean data type?
    9·1 answer
  • Answer these two if u can❤️
    5·2 answers
  • How to do this question , please answer quickly , I’ll give branliest
    14·1 answer
  • Write a function called changeCharacter that takes three parameters – a character array, its size, and the replacement character
    15·1 answer
  • How does a file reader know where one line starts and another ends?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!