1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lozanna [386]
2 years ago
15

The objective of ____ testing is to identify and eliminate execution errors that could cause a program to terminate abnormally,

and logic errors that could have been missed during desk checking.
a) unit
b) integration
c) user
d) system
Computers and Technology
1 answer:
Ann [662]2 years ago
3 0

Answer: I would say "user" is the correct answer

Explanation: This question is clearly talking about a computer program so the "user" is like a BETA tester. "Someone who tests games, websites, and apps before they are released.

You might be interested in
This graph shows a relationship between the height of a giraffe and its weight which term describe the dashed line through the g
Nadusha1986 [10]

Answer: The Answer is C

Explanation: This is because It is mainly controlled by genetics and we can not manipulate genetics.

4 0
3 years ago
Read 2 more answers
true or false: if a comment is posted anonymously, it cannot be considered hate speech or cyber bullying
pickupchik [31]

Answer:

false

Explanation:

Think about it

5 0
3 years ago
Read 2 more answers
Enables you to navigate through pieces of information by using links which connect them.
anyanavicka [17]
I believe your answer would be Hypertext. 

Hypertext is a t<span>ext that contains links to other text and 'enables you to navigate through pieces of info by using the links that connect them'; it is also used to navigate the World Wide by using hyperlinks.

Hope I helped :)</span>
3 0
3 years ago
Alice's public key, and sends back the number R encrypted with his private key. Alice decrypts the message and verifies that the
Agata [3.3K]

There are different kinds of keys. The identities of Alice and Bob are verified in this protocol.

<h3>What is public and private key in SSL?</h3>

These keys are known to be a kind of related pair of text files and they are often made together as a pair if one makes their Certificate Signing Request (CSR).

Note that the private key is different file that is often used in the encryption/decryption of data so as to sent a file between one's server and the connecting clients.

Learn more about  public/private key from

brainly.com/question/8782374

3 0
2 years ago
What language(s) must be used to display a bare-minimum web page?
Reil [10]

Answer: Hyper Text Markup Language (HTML)

Explanation:  

Computers use language to communicate, just like people do and the way that computers communicate with the internet is through a language that is called Hyper Text Markup Language/ HTML

Hyper Text is the process of linking objects to each other, so that when one object is clicked the linking object can be viewed. Hyper Text Markup Language was created by Tim burners in 1990


8 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following statements is true of a database? a. It is a collection of unstructured data. b. It is accessed primarily
    14·1 answer
  • When u look at a green object through red glass the object will appear
    11·2 answers
  • Which option of the AutoCorrect tool enables you to add and delete words that do not follow abbreviation rules?
    12·1 answer
  • Elizabeth works for a local restaurant at the end of her shift she read she’s required to write in the time that she arrived in
    9·1 answer
  • How many ways can you add an image into google slides?
    8·1 answer
  • How can i become an ailen?
    5·2 answers
  • Who are the four main antagonists in fnaf 1
    13·2 answers
  • Were can i watch unexpected free season 3
    9·1 answer
  • Aurelia is designing a user interface for a new game app. Which of the following should she taken into consideration for the use
    7·1 answer
  • Firewalls are available as a special hardware device or as software. A firewall will block packets of information that are from
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!