1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
valina [46]
3 years ago
8

After successful unit testing, the subsystems are combined to test the entire system as a complete entity using what form of tes

ting?
Computers and Technology
1 answer:
Maurinko [17]3 years ago
8 0

Answer:

integration testing

Explanation:

Integration testing -

It is one of the level of testing a software , in which the individual units are tested and combined as a group , is referred to as integration testing.

This method is employed in order to highlight any faults in between the integrated units .  

Hence , from the given information of the question,

The correct term is integration testing.

You might be interested in
PLEASE HELPPPPP ASAP, 50 POINT'S + BRAINLIEST
vagabundo [1.1K]

Answer:

1. Cybercrimes are online crimes that cause loss of money some examples are: Identity fraud, Cyber bribery, Debit/credit card fr/ud, and Email fr/ud.  

2. In medical offices devices linked to CT scans are able to be h/cked, there is r/nsomw/re that uses their devices. Since medic/l computers are always linked to the internet. it makes it easier for them to be h/cked. They make an employee click on an e-mail carrying m/lw/re, then the cybercrimin/ls encrypt p/tient data then dem/nd p/yment for its decryption.

3. This is a personal question but if you have ever been sc/mmed or witnessed someone being sc/mmed or almost got  sc/mmed it might apply to this question

6 0
3 years ago
"If a program attempts to modify (or, sometimes, even to read) the contents of memory locations that do not belong to it, the op
Monica [59]

The operating system's memory protection routine intervenes and (usually) terminates the program if a program attempts to modify (or, sometimes, even to read) the contents of memory locations that do not belong to it.

Further Explanation

The memory protection routine is most commonly used in multi-programmed systems to prevent one process from affecting the availability of another. When a user opens up multiple processes, by default, they usually reside at the same time in the main memory. Sometimes, a program may attempt to access, modify, or read memory locations allocated to other processes. When this happens, the memory protection program jumps in. Keep in mind that the memory manager somehow works hand in hand with the memory protection routine. It protects the OS from being accessed by other processes and these processes from accessing one another. In addition, it helps save memory by allocating the same amount of memory to all running processes. The memory protection program, on the other hand, should be able to allow controlled sharing of memory among different processes and will usually terminate a program that tries to modify content of memory locations of that does not belong to it.

Learn More about Memory management

brainly.com/question/14241634

#LearnWithBrainly

3 0
3 years ago
In Python, which comparison operator means "less than or equal to"?
Komok [63]

Answer:

<=

Explanation:

Pretty much the same as in maths

3 0
3 years ago
Read 2 more answers
Select the correct answer.
Softa [21]

Answer:

D. smart phone

explanation;

a. what the heck is a radio going to do?

b. an HD television? is his job watching movies?

d. he already has a form of communication he uses, he needs something that can to both things at the same time

c. a smart phone can do everything he needs to do, likely faster than a landline phone or laptop.

5 0
2 years ago
Using the flowchart diagram, identifythe decision point of this solution?
ELEN [110]

Answer:

Is there an early pay discount?  

Explanation:

This determines and instructs what path the code should take,

if there is no early pay discount, it has different instructions to follow.

3 0
3 years ago
Other questions:
  • A broadband router is used to do which of the following? run the programs on a computer locate lost files on a computer manage a
    6·1 answer
  • A simple operating system supports only a single directory but allows it to have arbitrarily many files with arbitrarily long fi
    13·1 answer
  • What sends massive amounts of email to a specific person or system that can cause that user's server to stop functioning? mail b
    6·1 answer
  • Que funcion tiene la sombrilla forrada de aluminio​
    6·1 answer
  • Dayla is concerned about managing her digital footprint. What does she mean by this? *
    7·1 answer
  • What is said to be the first mechanical calculator​
    7·2 answers
  • Which of the following does Secure Sockets Layer (SSL) use to authenticate a user or system before encrypting a session?
    14·1 answer
  • On a piano, a key has a frequency, say f0. Each higher key (black or white) has a frequency of f0 * rn, where n is the distance
    15·1 answer
  • Explain Http and Ftp​
    12·1 answer
  • Match the following pls help
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!