1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Karolina [17]
3 years ago
13

If anything is changed on an already-tested module, regression testing is done to be sure that this change hasn’t introduced a n

ew error into code that was previously correct.
True / False.
Computers and Technology
1 answer:
Elan Coil [88]3 years ago
5 0

Answer:

True

Explanation:

Regression Testing is useful when we made new changes to an existing application. It ensure our new changes not breaking anything of the existing system.so it is useful to re test the existing functionality.

The Answer is True

You might be interested in
Chang is a network engineer. He is revising the company's firewall implementation procedure. As part of this work, he is reviewi
erastovalidia [21]

Answer:

d

Explanation:

3 0
3 years ago
PLS HELP ASAP ILL GIVE BRAINLKEST PLS THANKS 20 POINTS
OLga [1]

Answer:

#1?

Explanation:

Might be wrong..

5 0
2 years ago
Read 2 more answers
A security risk to email is​ __________, which are fraudulent messages that prompt unwary users to reveal sensitive information
d1i1m1o1n [39]

Answer:

Option C is the correct answer for the above question.

Explanation:

Pishing is a type of attack which is used by the attacker to access the secured information from the system. It is used by the third person assuming for the system that he is the right use of the system and can access the information of the system.

The above question asked about the attack which can access the information to assume that he is the right user and give accessed to the network to been hacked. So the answer is phishing which is described above. Hence option C is the correct while the other is not because:-

  • Option A states about direct mail which is not a type of attack.
  • Option B states about instant messaging which is also not a type of attack.
  • Option D states about spam which is used to send the spam messages.
  • Option 'E' states about the mass mail which is used to send the lots of spam mail.
5 0
3 years ago
Free wifi is typically offered on _ network
Marina CMI [18]

Free Wi-Fi is typically offered on public network

8 0
3 years ago
Read 2 more answers
ནས་ད་ དང ་ ་ ་ ་ ་ Az - . Al & Co (NO) - Cat Al (NO) 0 --- - 2N: H2 +0 h20​
Tamiku [17]

Can you be more clear???

7 0
3 years ago
Other questions:
  • Write a loop to print 10 to 90 inclusive (this means it should include both the 10 and 90), 10 per line.​
    6·1 answer
  • TLO 06 Active Directory Domain and Trusts tool is used to move servers between site in an AD Infrastructure.a. Trueb. False
    14·1 answer
  • You install a teanviewer on your work station at home so that you can access it when on the road. How can you be assured that un
    12·1 answer
  • Compare GBN, SR, and TCP (no delayed ACK). Assume that the timeout values for all three protocols are sufficiently long such tha
    11·1 answer
  • why is there a need of properly interpreting teacher's/manufacturer's specifications before operating any food processing equipm
    9·1 answer
  • Write an assembly program that will prompt the user for 3 inputs (let’s abstractly call them a, b, and c) without a leading stri
    13·1 answer
  • ______involves encoding information using fewer bits than the original representation Group of answer choices
    6·1 answer
  • To enter new code that performs as intended in the place of the old code that produces an error is the goal of
    9·1 answer
  • Processor is used to process the data.<br>A)true <br>B)False​
    13·1 answer
  • Kris is the project manager for a large software company. Which part of project management describes the overall project in deta
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!