1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DIA [1.3K]
3 years ago
8

Assume that we have seeded a program with 5 defects before testing. After the test, 20 defects were detected, of which, 2 are fr

om the seeded defects and 18 are real, non-seeded defects. We know there are 3 more seeded defects remaining in the software. Assuming a linear relationship, what is the estimated real, non-seeded defects that may still be remaining in the program
Computers and Technology
1 answer:
melamori03 [73]3 years ago
5 0

Answer:

see explaination

Explanation:

Given that we have;

Defects before testing = Defects planted = 5

Defects after testing = 20

Seeded defects found = 2

Real, non seeded defects = 18

Hence, Total number of defects = (defects planted / seeded defects found) * real, non seeded defects = (5/2)*18 = 45

Therefore, Estimated number of real defects still present = estimated total number of defects - number of real, non seeded defects found = 45-18 = 27

You might be interested in
Yesterday you installed a new game on your computer. When you ran the computer, you noticed that the application was running ver
7nadin3 [17]

Answer

The program is either unable to compute the call to check your disk space or:

You have multiple disk drives and specified a drive that is different than the one you are seeing with 250 GB.

It could also be that your RAM is insufficient for running this game.

Most likely it is your RAM specifications because of the game running slow.

The game updated its debug logs or error lists and pulled from that list when it was opened and displayed that error message.

Explanation:

4 0
3 years ago
What might the purpose be for a sata-style power connector on a motherboard?
kozerog [31]
To power a storage device (HDD, SSD)
4 0
3 years ago
Write a Unix (Linux) find-like command (myFind) in Python3 where the function will return the full paths of all the files contai
Leno4ka [110]

Answer:

import os, sys, stat

from stat import *

command = 'find ' + sys.argv[1] + ' -name *' + sys.argv[2] + '*'

print(command)

totalFiles = os.popen(command).read()

totalFiles = totalFiles.split()

totalSize = 0

for line in totalFiles:

  statinfo = os.stat(line)

 

  if stat.S_ISREG(statinfo.st_mode):

      print(line, statinfo.st_size, 'bytes')

      totalSize += statinfo.st_size

  else:

      print(line, '...')

print('Total file size:', totalSize, 'bytes')

Explanation:

  • According to command line arguments, build the find command.
  • Store the product by executing the command.
  • Loop through all files in the output list using the for loop.
  • Display the file name and size, If the file is regular otherwise just display the file name.
5 0
3 years ago
The key invention that enabled computers to go into every home and office is
Scrat [10]
<span><span />The Microprocessor is the key invention that enabled computers to go into every home and office. Microprocessor is a computer processor that enables the computer to run. It is also called as central processing unit. It is also a multipurpose and programmable device that accepts inputted data and process the data to provide an output. Microprocessor started from 8-bit design to 16bit, 32 bit, 64 bit and now it is produce a multi core design in the market. Faster and stronger design that can run heavier applications.</span>



8 0
3 years ago
You are connected to a server on the Internet and you click a link on the server and receive a time-out message. What layer coul
Grace [21]

Answer: Application layer

Explanation: Application layer is the level in the OSI model which carries out the function of the abstraction in the network.The abstraction works by maintaining the interface between application and network.

It helps in the transferring of the information and data as well using the protocols. So,if any time out message alert is received  by clicking on the link then the server condition is usually busy and thus cannot respond. In this case application layer is responsible for the problem.

7 0
3 years ago
Other questions:
  • Where does microsoft word put elements such as text, logos, or graphics saved for later use in a document?
    15·1 answer
  • FREE POINTS JUST ANSWER MY LATEST TWO QUESTIONS PLEASE
    10·2 answers
  • To what type of user does he most likely have access? Jae is using a computer at the public library to do research she's able to
    9·1 answer
  • Write a for loop to print all NUM_VALS elements of vector courseGrades, following each element with a space (including the last)
    11·1 answer
  • In which of the following careers are you most likely to do an apprenticeship?
    14·2 answers
  • What types of projects require collaboration? en360
    15·1 answer
  • In information security, a specification of a model to be followed during the design, selection, and initial and ongoing impleme
    5·1 answer
  • Mary wants to design an algorithm that will calculate the average for three (3) numbers. Please select the most appropriate data
    5·1 answer
  • Free coins who is octane and dont say u dont know because i will do the same to u
    13·2 answers
  • Modern Computers compared to earlier computers are
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!