1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kupik [55]
3 years ago
11

What is an efficient way to ensure that the code is working as per the acceptance criteria/business requirements? (1 correct ans

wer)
1. Through automated functional tests.



2. Through automated regression tests.



3. Through automated unit tests.



4. Through automated smoke tests.
Computers and Technology
2 answers:
seraphim [82]3 years ago
5 0

Answer:

1. through automated functional tests

Explanation:

iren [92.7K]3 years ago
4 0

The answer is quite simple that when you write a code you should check it before give this program to your clients, the best way is to make some functional tests. Option A.

Further Explanation:

When We Write Code:

When someone wrote a code of some lines or some thousand line there should some mistakes remaining but human is a human. Mistake ar made by humans so when we write the code of a program there should be a chance of pressing other keys on keboard or sometimes missing the pressing of some keys.

By mistakenly:

When we write the code the semicolon is left unwritten which is a very important for the language of the programs. When we compile the code compiler also check that the syntax of code should be correct.

By running the code:

After the compilation one programmer should run the program by itself so that he can see that all the functions of program is running correctly and fulfills the needs of the clients. This is a very good habit that programmer runs his programs before giving the program to its client

Answer Details:

Subject: Computer and Technology.

Level: High School

Key Words:

When We Write Code:

By mistakes:

By running the code:

For further Evaluation:

brainly.com/question/5144573

brainly.com/question/112785

You might be interested in
which of the following is the full path and filename of the file that contains information about which interrupt request (IRQ) c
Drupady [299]

Answer:

INCOMPLETE QUESTION.... Options not provided, However, the answer is

/proc/interrupts

Explanation:

This file records the number of interrupts per IRQ on the x86 architecture. The output of this file is tabular.. with the first column for the IRQ number, another column for each CPU in the system, a third column the reports the type of interrupt and finally the last column holds the name of the device located at that IRQ

7 0
4 years ago
Which act requires that financial institutions must provide a privacy notice to each consumer that explains what data about the
Tom [10]

Answer:

Gramm-Leach-Bliley Act

Explanation:

Under the Gramm-Leach-Bliley Act, financial institutions must provide a privacy notice to each consumer that explains what data about the consumer is gathered, with whom that data is shared, how the data is used and how the data is protected.

The law stipulates that for any consumer with a financial institution, the financial institution should make provision of a privacy notice. This privacy notice outlines in explicit details the following; what data about the consumer is gathered, with whom that data is shared, how the data is used and how the data is protected.

This was done in order to protect the consumer right and the right of the financial institution.

7 0
3 years ago
In what type of attack does the adversary leverage a position on a guest operating system to gain access to hardware resources a
il63 [147K]

Answer:

VM escape attack

Explanation:

<em>In a VM escape attack, the attacker exploits hypervisor vulnerabilities to gain control over resources reserved for other guest operating systems. Services operating on the guest may be exposed to the other attacks, but such attacks can only access data allotted to the same guest. In the event of a buffer overflow or directory traversal or the client in the case of cross-site scripting.</em>

6 0
2 years ago
Devin has noticed that his computer now takes much longer to start up than it used to and runs almost every program a bit slower
Goshia [24]
The answer is D) Too many programs running at start up

By default, a computer runs several apps as soon as it boots.However, running too many programs on startup can slow down your computer. These programs will continue running in the background of your computer and will result to the computer running slowly. 

You can use the task manager to stop currently running applications or completely disable programs which are automatically launched upon boot up.






7 0
4 years ago
Fwee Pwoints Fwor You! :3
Fittoniya [83]

Answer:

Hey thanks for them........

8 0
3 years ago
Read 2 more answers
Other questions:
  • Look at the code in the example below, and then answer the question. In the example code, what does the title attribute create?
    12·2 answers
  • Henry is troubleshooting a network connection and wants to see if he can connect to the server on his network. Which Microsoft c
    14·1 answer
  • This type of software works with end users, application software, and computer hardware to handle the majority of technical deta
    12·1 answer
  • Computers are used to store, retrieve, and _____ data. manipulate mechanize memorize operate
    12·1 answer
  • Create a program that will read in a Salesperson name, employment status (1=Full-time AND 2=Part-time) and the sales amount.
    5·1 answer
  • What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email f
    10·2 answers
  • . The electric company charges according to the following rate schedule: 9 cents per kilowatt-hour (kwh) for the first 300 kwh 8
    12·1 answer
  • What are your thoughts on copyright?<br><br> (Write 2 or more sentences)
    9·2 answers
  • I<br> What is a Watermark?
    9·2 answers
  • A switch to kernel mode, wherein the operating system performs some action before returning control to the originating process?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!