1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lukranit [14]
3 years ago
13

Which software development team member would make the most use of the tool, Load Runner?

Computers and Technology
1 answer:
sveta [45]3 years ago
4 0
Given that Loadrunner is a software testing tool, I'm assuming that the software development team member who would make the most use of that tool is A. a software engineer, because that is the person who creates software and then tests it. 
You might be interested in
A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed
Thepotemich [5.8K]

Answer:

Option (A) is the right answer.

Explanation:

The following terms can be described as :

Phishing: Phishing can be described as the concept of stealing personal data i.e. credit card, bank account information, etc. of customers by sending fraud emails or by making fraud webpages on the name of a reputed company.

Tailgating: tailgating can be defined as the concept of getting entry with the authorized person in a restricted zone.

Baiting: baiting can be described as the term of stealing personal data by giving greed to customers by telling them fraud offers.

Quid pro quo: quid pro quo can be defined as the concept where the attacker takes the access of the system.  

According to the scenario, the most appropriate answer is option (A) because the company sends a wrong web address which is used by hackers to collect user's personal data which comes under phishing.

3 0
3 years ago
What is the name of the relationship between two ospf devices that are connected together and exchange link-state information?
Rudik [331]

Answer:

FULL neighbor state.

(FULL/DR or FULL/BDR)

Explanation:

The fact that the routers are neighbors is not enough to guarantee an exchange of link status updates; they must form adjacencies to exchange link status updates. Adjacency is the next step after the process of establishing neighbors. Adjacent routers are routers that go beyond a simple Greeting exchange and act in the database exchange process. To reduce the amount of information exchange in a given segment, OSPF selects a router as a designated router (DR) and a router as a designated backup router (BDR) in each multiple access segment. The BDR is chosen as the backup mechanism in case the DR fails. The idea behind this is that routers have a central point of contact for the exchange of information. In order to verify if two routers have established an adjacency, you can use the command: show ip ospf neighbor.

Here is an example:

R1#show ip ospf neighbor

 

Neighbor ID   Pri         State               Dead Time     Address      Interface

 

203.250.12.1    1     2WAY/DROTHER  0:00:37   203.250.14.3  Ethernet0

203.250.15.1    1     FULL/DR                0:00:36   203.250.14.2  Ethernet0

203.250.13.41  1     FULL/BDR              0:00:34   203.250.14.1  Ethernet0

5 0
3 years ago
Critical thinking questions Giving 30 points if you answer correctly!!!!
krek1111 [17]

Answer:

1. The reason hunting seasons are displayed all over the world in cave paintings is because of the necessity to hunt. Ancient people everywhere were nomads that relied on wild animals for the majority of their calories. The paintings likely served as an expression of the importance of hunting to their culture. It could have also been used as educational material for very young children to learn about hunting as well as its importance to their community.

Explanation:

I can't do 2nd because the image was cut off, sorry.

8 0
3 years ago
Write a program that teaches arithmetic to a young child. The program tests addition and subtraction. In level 1, it tests only
Elenna [48]

Answer:

Explanation:

The following program is written in Java and creates three levels with the different set of randomly generated arithmetic problems. As the player goes getting more points they advance every 5 points to the next level.

import java.util.Random;

import java.util.Scanner;

class Main {

   private static Random random = new Random();

   private static Scanner in = new Scanner(System.in);

   static int points = 0;

   public static void main(String[] args) {

       while (true) {

           System.out.println(points);

           if (points < 5) {

               System.out.println("Starting Level 1");

               levelOne();

           } else if (points < 10) {

               System.out.println("Starting Level 2");

               levelTwo();

           } else if (points < 15) {

               System.out.println("Starting Level 3");

               levelThree();

           }

       }

   }

   public static boolean levelOne() {

       int numberOne = random.nextInt(10);

       int numberTwo = random.nextInt((10 - numberOne));

       int answer = numberOne + numberTwo;

       int count = 0;

       while (points < 5 && count < 2) {

           System.out.println("What is " + numberOne + " + " + numberTwo + "?: ");

           int userChoice = in.nextInt();

           if (userChoice == answer) {

               points += 1;

               levelOne();

           } else {

               count += 1;

           }

       }

       return false;

   }

   public static boolean levelTwo() {

       int numberOne = random.nextInt(10);

       int numberTwo = random.nextInt(10);

       int answer = numberOne + numberTwo;

       int count = 0;

       while (points < 10 && count < 2) {

           System.out.println("What is " + numberOne + " + " + numberTwo + "?: ");

           int userChoice = in.nextInt();

           if (userChoice == answer) {

               points += 1;

               levelTwo();

           } else {

               count += 1;

           }

       }

       return false;

   }

   public static boolean levelThree() {

       int numberOne = random.nextInt(10);

       int numberTwo = random.nextInt(10);

       int answer = numberOne - numberTwo;

       int count = 0;

       if (answer <= 0) {

           levelThree();

       }

       while (points < 15 && count < 2) {

           System.out.println("What is " + numberOne + " - " + numberTwo + "?: ");

           int userChoice = in.nextInt();

           if (userChoice == answer) {

               points += 1;

               levelThree();

           } else {

               count += 1;

           }

       }

       return false;

   }

}

3 0
3 years ago
Which of the following is NOT considered a digital assets
sweet [91]

Answer:

D. An image you do not have the right to use

Explanation:

Since you don't have the rights to use the image it isn't considered a digital asset.

3 0
3 years ago
Other questions:
  • The RAM is a type of ____ a.Main Memory b.Secondary Memory c.Human Memory d.EPROM e.EEPROM
    13·2 answers
  • Which computer device is used to capture or copy a photograph to place in a report?
    14·1 answer
  • Which of these statements most accurately describes cookies?They have the capability to execute malicious software.Each cookie f
    12·1 answer
  • Intellectual property piracy has gotten a small boost from the increasing availability of counterfeit goods through Internet cha
    14·1 answer
  • A cracked tone ring will often cause what type of problem?
    14·1 answer
  • To print the number of elements in the array named ar, you can write :
    10·1 answer
  • Suppose we want to adjust the page numbering for our Works Cited section so that it starts over at page 1. Is this possible to d
    12·2 answers
  • Do not use the scanner class or any other user input request. You application should be self-contained and run without user inpu
    5·1 answer
  • If non-series-rated overcurrent devices (standard molded-case circuit breakers) are to be installed in the main switchboard, bre
    6·1 answer
  • According to the selection, speech-software developers are still striving to develop speech-recognition technology that —
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!