1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anit [1.1K]
3 years ago
15

In black-box testing, the tester should already know something about how the program is implemented so that he/she can more care

fully identify what portion(s) of the software are leading to errors. Group of answer choices True False
Computers and Technology
1 answer:
mihalych1998 [28]3 years ago
6 0

Answer:

False.

Explanation:

Black Box Testing is indeed a software testing process where the tester is not aware of both the inner system / layout / execution of the element being evaluated. This testing approach can be extended to any type of software testing such as module testing, deployment, device testing, and vulnerability testing.

So, the following scenario is false about the black-box testing.

You might be interested in
Answer the following questions based on your readings from Module 1. Describe a time when you or someone you observed showed a p
Mila [183]

Answer:

An example  of poor work ethic which I encountered recently was the observation of poor hygiene by an employee of a fast-food outlet of a renowned company.

Explanation:

Some patties suddenly slipped out of his hands and fell on the ground. He did not discard them and simply put them into burg adversely. ers. The fall must have soiled and contaminated them, which would affect the health of consumers. Such incidents can be avoided by the company by training the staff in such possibilities and suggesting corrective actions. Monitoring and taking action against offenders will also help. IT professionals should have good analytical and interpersonal skills besides cross-cultural sensitivity to do good in their roles.

You should apologize for his mistake for reaching the wrong place. The message should be through an electronic message ( sms ) or another instant messaging service, followed by a telephone call. The content of the message should comprise of an apology for not being able to reach in time, the reason for the misunderstanding, your current location and the approximate time it will take to reach the venue. It will be better if you share your location with the client through a GPS enabled application, so that it will be convenient to coordinate.

The tow more skills that are good for IT professionals the the skill off After sale services, and to establish a good relationship with clients.

4 0
3 years ago
____________ is a widely accepted international best practices framework for implementing information systems security.
balandron [24]

Answer:

Control Objectives for Information and related Technology (COBIT)

Explanation:

COBIT is a framework developed by the ISACA for managing and supervising Information Technology processes. Such kinds of frameworks allow companies to position themselves with the expectations that they and their clients expect. COBIT's aim is to provide management and business process owners with an IT control and governance model that helps deliver value from IT and identify and handle the IT-related risks. It helps bridge the gap between business needs, control requirements and technical issues. It is a paradigm of control for addressing the IT governance requirements and maintaining the security of knowledge and information systems. COBIT emphasizes on what allows processes to work well.

8 0
3 years ago
LAB: Convert to binary - methods
Georgia [21]

Answer:

import java.util.Scanner;

public class Lab{

  public static String integerToReverseBinary(int number)

  {

      String binary = "";

      if(number == 0){

          return "0";

      }

      while(number > 0)

      {

          int remainder = number % 2;

          number = number / 2;

          binary += Integer.toString(remainder);

      }

      return binary;

  }

 

  public static String reverseString(String wordString)

  {

      String binaryString = "";

      int length = wordString.length();

      for(int i = length -1 ; i >= 0 ; i--)

      {

          binaryString += wordString.charAt(i);

      }

      return binaryString;

  }

 

Explanation:

In the java source code, the Lab class is defined which has two methods, 'reverseString' and 'integerToReverseBinary'. The latter gets the argument from the former and reverses the content of its string value, then returns the new string value. The former gets the integer value and converts it to its binary equivalence for which are converted to strings and returned.

8 0
3 years ago
I need ur oppinion about this paragraph.
choli [55]

I think that this answer is amazing and nothing really needs to be added. Well Done!

5 0
3 years ago
Read 2 more answers
Before using your Twitter account to market your personal brand, you should evaluate Your profile picture Your bio Your tweets A
AnnZ [28]
D. All of the Above.

If you are using a Twitter account for marketing your personal brand, you certainly should evaluate your entire profile, which includes your pictures, bio and tweets.  
5 0
3 years ago
Other questions:
  • Import java.util.scanner; public class sumofmax { public double findmax(double num1, double num2) { double maxval; // note: if-e
    10·1 answer
  • The figure below shows a black and white image with a resolution of 720×504. Identify how much memory (in bits) will be occupied
    15·1 answer
  • para que sirve los siguientes sistemas operativos : a. Windows 10 b. Apple yosemite c. linux Ubuntu d. Android marshmallow e. IO
    9·1 answer
  • Based upon the contents of the BOOKS table, which line of the following SQL statement contains an error?
    13·1 answer
  • Question 19 :Rachel, a database administrator, has created a database for her website. It contains pictures of vacations that pe
    13·1 answer
  • Hello im looking for someone to answer my question. Its about a coding project called "Quiz Master". Im having trouble with the
    7·1 answer
  • Analyze the code and identity the value of variable a,b and c after the code execution. int a=40, b=50, c=60; if(! (a>=40)) b
    15·1 answer
  • Which is an example of an operating system? (5 points)
    5·1 answer
  • Give the names of two different places you might find a number represented in hexadecimal
    6·1 answer
  • Describe two steps to find if photos can be legally used
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!