1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kupik [55]
3 years ago
11

What is an efficient way to ensure that the code is working as per the acceptance criteria/business requirements? (1 correct ans

wer)
1. Through automated functional tests.



2. Through automated regression tests.



3. Through automated unit tests.



4. Through automated smoke tests.
Computers and Technology
2 answers:
seraphim [82]3 years ago
5 0

Answer:

1. through automated functional tests

Explanation:

iren [92.7K]3 years ago
4 0

The answer is quite simple that when you write a code you should check it before give this program to your clients, the best way is to make some functional tests. Option A.

Further Explanation:

When We Write Code:

When someone wrote a code of some lines or some thousand line there should some mistakes remaining but human is a human. Mistake ar made by humans so when we write the code of a program there should be a chance of pressing other keys on keboard or sometimes missing the pressing of some keys.

By mistakenly:

When we write the code the semicolon is left unwritten which is a very important for the language of the programs. When we compile the code compiler also check that the syntax of code should be correct.

By running the code:

After the compilation one programmer should run the program by itself so that he can see that all the functions of program is running correctly and fulfills the needs of the clients. This is a very good habit that programmer runs his programs before giving the program to its client

Answer Details:

Subject: Computer and Technology.

Level: High School

Key Words:

When We Write Code:

By mistakes:

By running the code:

For further Evaluation:

brainly.com/question/5144573

brainly.com/question/112785

You might be interested in
15 points: Which type of system is used to capture and leverage the decision-making abilities of human experts?
salantis [7]

Answer:

A

Explanation:

4 0
2 years ago
Examine about the Internal & External Fragmentation methods give an example for each. essay​
Tju [1.3M]

Internal Fragmentation occurs when a process needs more space than the size of allotted memory block or use less space. External Fragmentation occurs when a process is removed from the main memory. Internal Fragmentation occurs when Paging is employed. External Fragmentation occurs when Segmentation is employed.

3 0
2 years ago
Which computer can perform the single dedicated task? a. Which commuter can perform the function of both analog and digital devi
vredina [299]
<h3>a= hybrid computer can perform the function of both analog and digital computer</h3>
8 0
2 years ago
Enables you to temporarily hide all the open windows except the one you are viewing.
solniwko [45]
Minimizing the other windows or full screen the one your looking at with F11 button
7 0
3 years ago
Which of the following is not a valid technique to create a function stub?
In-s [12.5K]

An option which isn't a valid technique to create a function stub is to: D. leave the function body empty.

<h3>What is a function stub?</h3>

A function stub can be defined as a type of function that can be called safely without an error. However, a function stub has no definition because it doesn't actually perform any action when called.

In this context, leaving the function body empty is an option which isn't a valid technique to create a function stub.

Read more on function stub here: brainly.com/question/17214711

#SPJ1

6 0
2 years ago
Other questions:
  • What is a bug?
    11·2 answers
  • Which audio editing effect uses the option ""Get Profile"" to execute its function?
    6·1 answer
  • All of the following are challenges presented by changing technology as it relates to the special events field EXCEPT: A. the ab
    13·1 answer
  • The piece of hardware that contains the circuitry that processes the information coming in to the computer and tells the other h
    8·1 answer
  • Which term is used to identify the connection of computers that are physically close to one another?
    8·2 answers
  • Write a paragraph explaining why you think its important to use ethics in computers
    9·1 answer
  • a certain kind of fish in the ocean eats only algae. a seal eats this fish a bear eats the seal .when the bear dies,it’s recycle
    6·1 answer
  • You already know how to use lists. What is the index of 5 in the following list?
    9·1 answer
  • 9.
    8·1 answer
  • 19. List three things you can do to protect your online reputation:
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!