1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kobusy [5.1K]
4 years ago
14

What is ‘Black-Box’ testing?

Computers and Technology
1 answer:
stellarik [79]4 years ago
3 0

Answer:

 Black-box testing is the technique which is basically use to reduce the number of the possible cases of the test and also maintain the test coverage. This type of testing is used in the functional and the non functional requirement of the system.

It is type of testing that majorly focus on the functional requirement. There are many types of black box testing that are:

  • BVA (Boundary value analysis)
  • Error guessing
  • Decision table testing

You might be interested in
Discuss the various types of keys available on a computer keyboard.<br>No spam answer needs!❌❌​
olga nikolaevna [1]

Answer:• Alphanumeric keys – all of the letters and numbers on the keyboard. A-Z and 0-9.

• Punctuation keys – All of the keys associated with punctuation such as the comma,

period, semicolon, brackets, parenthesis and so on. Also, all of the mathematical

operators such as the plus sign, minus sign, and equal sign.

• Special keys – All of the other keys on the computer keyboard such as the function

keys, control keys, arrow keys, caps lock key, delete key, etc.

Special keys on a PC Keyboard

• Alt key – Short for Alternate, this key is like a second control key.

• Arrow Keys – Most keyboards have four arrow keys that enable you to move the

cursor (or insertion point) up, down, right, or left. Used in conjunction with the Shift

or Alt keys, the arrow keys can move the cursor more than one position at a time, but

this depends on which program is running.

• Backspace key – Deletes the character just to the left of the cursor (or insertion

point) and moves the cursor to that position.

• Caps Lock Key – A toggle key that, when activated, causes all alphabetic characters

to be uppercase.

• Ctrl key – Short for Control, this key is used in conjunction with other keys to

produce control characters. The meaning of each control character depends on which

program is running.

• Delete Key – Sometimes labeled Del, deletes the character at the current cursor

position, or the selected object, but does not move the cursor. For graphics-based

applications, the Delete key deleted the character to the right of the insertion point.

• Enter Key – Used to enter commands or to move the cursor to the beginning of the

next line. Sometimes labeled Return instead of Enter.

• Esc Key – Short for Escape, this key is used to send special codes to devices and to

exit (or escape) from programs and tasks.

• Function Keys – Special keys labeled F1 to F12. These keys have different meaning

depending on which program is running.

Explanation: use quillbot or wordtune to change the words

3 0
2 years ago
Eu fui pegar meu ChormeBook(é tipo uma versão de notebook) e aí eu acenei forçando um pouco a tela com o polegar e deu nisso, eu
Aliun [14]

Answer:

It's not good in reality to touch the Chromebook's screen with your finger, a pencil, a pen or anything like your thumb. They might start looking blurred or if you touch them very hard then they might crack as well. If this happens, report to the authorized store immediately, and if warranty prevails you will get it repaired at no extra cost. However, take this as a warning, and keep in mind the precautions mentioned in the explanation.

Explanation:

Never put extra pressure on the Chromebook screen, and even when it is not open.

Always store it in a closed position.

Always keep the things that can put pressure away from your Chromebook.

Never poke your screen with something that put a mark or a kind of scratch on the surface of the screen.

Never ever, place something on the keyboard like pens, disks or pencils prior to shutting the lid.

5 0
4 years ago
What does this icon mean? <br> Plz hurry it’s for a school quiz you will get a brainly
Vera_Pavlovna [14]

Answer:

Filter data

Explanation:

If u dont believe me here is a pic

8 0
3 years ago
A web application with an SQL server database is found to be compromised by an attacker. On examination, the email IDs of the da
Thepotemich [5.8K]

Answer:

This is what we call SQL Injection.

• SQL Injection is when an attacker compromises your database only if it is vulnerable.

• Vulnerability includes leaving an empty ""(value) or forgetting to close anything that could be attacked.

• Ways to prevent injection is to not use string concatenation.

(<em>ex.</em> "hello" + "world")

*  Use parameterized queries.

*   Immediately get rid of any unused code.

5 0
2 years ago
What pressure will be shown on the high side peessure gauge (ac system on)
maria [59]
H tht would be the correct answer
8 0
4 years ago
Other questions:
  • Patrick Stafford's article argues that the growth of mobile phone usage "has given developers the ability to great robust and en
    7·1 answer
  • In 1928 what film was the first all talking feature
    12·1 answer
  • As long as users refer to files in the ____ directory, they can access the files without entering the absolute filename.
    10·1 answer
  • Assume there is a variable, h that has already been assigned a positive integer value. Write the code necessary to compute the s
    9·1 answer
  • Consider the following code: public static void mystery(int a) { System.out.println("A"); } public static void mystery(double a)
    6·1 answer
  • This statement lets the value of a variable or expression determine where the program will 1. switch 2. select 3. associative 4.
    11·1 answer
  • Expanding the virtual width of a game makes it possible to _______________. A. Expand the size of the player's game window B. Cr
    8·1 answer
  • write a java program to accept three item names and prices, and output them. Also output the average price if one of the items i
    14·1 answer
  • What is a quasi vpn?
    14·1 answer
  • The base 10 number 18 is equal to which base 16 number?<br><br> 10<br><br> 12<br><br> 14<br><br> 16
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!