1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lapo4ka [179]
3 years ago
13

Testing a function or program using test values that are at or near the values that change the outcome of the program is known a

s using:
a. parameters.
b. a black-box.
c. boundary values.
d. functional decomposition.
Computers and Technology
1 answer:
lana [24]3 years ago
8 0

Answer:

c. boundary values.

Explanation:

boundary values are used when checking a range of values, after selecting the set of data that lie in the valid partitions, next is to check how the program behaves at the boundary values of the valid partitions.

e.g. if I have an input field that accepts values from 10 to 100 then 10 would be the minimum, 100 would be the maximum.

You might be interested in
A network is a group of two or more computers that are connected to share resources and information. T or f
Ulleksa [173]

Answer:

true

Explanation:

5 0
3 years ago
Read 2 more answers
Sally thought of adding a new paragraph after the
hram777 [196]

Answer:

1) press the enter key

2) start typing the new paragraph

Explanation:

did it on edg

7 0
4 years ago
You are called to assist in troubleshooting a network problem that has occurred soon after a significant IPv6 implementation. So
HACTEHA [7]

Answer:i dont kowe

Explanation:

5 0
3 years ago
You can view the existing Access Control Lists for a set of folders on a Windows system by right-clicking the folder you want to
NikAS [45]

Answer:

And clicking the security tab option.

Explanation:

Lets explain what an object's ACL is. I will use an example to best explain this. Let's suppose that user Bob would want to access a folder in a Windows environment. What supposedly will happen is that Windows will need to determine whether Bob has rights to access the folder or not. In order to do this, an ACE with the security identity of John will be created. These ACEs are the ones that grant John access to the folder and the ACLs of this particular folder that John is trying to access is a list of permissions of everyone who is allowed to access this folder. What this folder will do is the to compare the security identity of John with the folders ACL and determine whether John has Full control of the folder or not.

By right clicking the folder and selecting the security tab, John will be in a position to see a list of the permissions (ACLs) granted to him by the folder.

3 0
3 years ago
Give two reasons why mobile internet may not be available everywhere. ​
andreev551 [17]

Answer:

Mobile Internet is dependant on cellular signal. Many countries, e.g. in Africa, don't have any coverage at all. Furthermore, mobile data might also not be available in the mountains as there are no cell towers and the rough terrain usually either blocks the signal entirely or weakens it significantly.

4 0
3 years ago
Other questions:
  • What's the best option if you can't show your PowerPoint presentation at all?
    9·2 answers
  • Create an application that writes a series of random numbers to a file. Each random number should be in the range of 1 through 1
    9·1 answer
  • User-system interaction is?
    11·1 answer
  • Obtaining the data of a video file from a flash drive is an example of a(n) _________ operation.
    6·1 answer
  • What does the program print out as a result of the given snippet of code?
    9·2 answers
  • The process of recording and reporting the financial data for a business is known as:
    6·2 answers
  • Explain about third generation of computer​
    5·1 answer
  • What computing paradigm can solve a problem by describing the requirements, without writing code in a step-wise fashion to solve
    8·1 answer
  • One of the most notable impacts of IT on business is improved
    11·1 answer
  • A(n) _____ is the software that enables the os to control a device.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!