1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vaselesa [24]
3 years ago
7

The development team recently moved a new application into production for the accounting department. After this occurred, the Ch

ief Information Officer (CIO) was contacted by the head of accounting because the application is missing a key piece of functionality that is needed to complete the corporation's quarterly tax returns.
Which of the following types of testing would help prevent this from reoccurring?

(choose one and why)

A. Security regression testing
B. User acceptance testing
C. Input validation testing
D. Static code testing
Computers and Technology
1 answer:
Gnesinka [82]3 years ago
5 0

Answer:

B

Explanation:

User Acceptance Testing (UAT) is the testing done by end users who is going to use that application. In these testing they will test  whether the application meets all the functional requirements of the end user. If it passed then only the application will move to the production. This will ensure that the application meets the user requirements before it put into the usage.

The Answer is B

You might be interested in
In the year, , the American Department of Defense put a military research network, called ARPANET online.
mario62 [17]

Answer:

November 21st of 1969.

Explanation:

In the year, 1969, the American Department of Defense put a military research network, called ARPANET online.

3 0
2 years ago
______ is a disadvantage of EDI.
Artist 52 [7]

Answer:The number of standards

Explanation:Electronic data interchange (EDI)  is the mechanism through which data is interchanged in the system electronically.It is mostly found in the business field for exchanging of data.

As EDI helps in making message accurate by decreasing the length and also has beneficial features of maintaining the security and increasing productivity ,hence these factor are not considered as the disadvantage .

Too many standard present in the EDI make the working complex by limiting the processing in the small business as compared with large organization.

 

6 0
3 years ago
What is Patch tool ???<br><br>​
AfilCa [17]

Answer:

<u><em>DEAR HERE IS YOUR ANSWER:</em></u>

<u><em>T</em></u>he Patch Tool is part of the healing brush set of tools. These are the go-to tools for retouching and repairing your images. The Patch Tool is primarily used to repair larger areas of an image, or get rid of any distractions or blemishes.

  • The patch tool was introduced into Photoshop at the same time as the Healing Brush
  • You don’t have to use the Patch tool to define a selection. You can use any selection tool and then select the Patch tool.  <em><u> </u></em>

<em><u>HOW TO USE PATCH TOOL IN PHOTOSHOP:</u></em>

  1. Click and hold the Healing Brush tool to select the Patch tool; on the Options bar, select the Destination radio button
  2. With the Patch tool still selected, drag to create a marquee around the source you want to use as the patch
  3. After you create the marquee, drag the selected source area to the destination to be repaired.

<em><u>I HOPE IT WILL WORK DEAR THANKS FOR ASKING  QUESTION</u></em>

Explanation:

4 0
2 years ago
Read 2 more answers
Which soft skills would these mobile app developers need to use in the situations described?
Ber [7]

Answer:

1: work ethic/presentation.

2: communication.

3: adaptability.

4: creativity.

(these are all guesses so i'm not 100% sure)

Explanation:

6 0
3 years ago
Read 2 more answers
What is one benefit of using electronic sticky notes ?
balu736 [363]
They can be used to just copy/paste e-mailed information without writing down on a paper and losing valuable time. This is one example.
4 0
3 years ago
Read 2 more answers
Other questions:
  • A(n) _______ allows an attacker to use a network structure to send large volumes of packets to a victim.
    5·1 answer
  • In addition to talking to other doctors remotely, telegraphy technology?
    5·1 answer
  • Name two materials that we can burn in order to get energy from biomass
    9·1 answer
  • 5.7 AP-Style MC Practice edhessive
    14·1 answer
  • Select the correct answer.
    8·1 answer
  • You can use tables for layout work. However, in XHTML, each form control should have its own ______ element
    12·1 answer
  • Write a for loop that uses the loop control variable to take on the values 0 through 10.
    10·1 answer
  • Part of the operating system core is responsible for controlling security, managing the file system, and providing a platform fo
    6·1 answer
  • Internal exception java.net.socketexception connection reset 1.18
    8·2 answers
  • Classes that depend on field names from parent classes are said to be ____ because they are prone to errors.Group of answer choi
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!