1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lapo4ka [179]
3 years ago
13

Testing a function or program using test values that are at or near the values that change the outcome of the program is known a

s using:
a. parameters.
b. a black-box.
c. boundary values.
d. functional decomposition.
Computers and Technology
1 answer:
lana [24]3 years ago
8 0

Answer:

c. boundary values.

Explanation:

boundary values are used when checking a range of values, after selecting the set of data that lie in the valid partitions, next is to check how the program behaves at the boundary values of the valid partitions.

e.g. if I have an input field that accepts values from 10 to 100 then 10 would be the minimum, 100 would be the maximum.

You might be interested in
In Python, which comparison operator means "less than or equal to"?
Komok [63]

Answer:

<=

Explanation:

Pretty much the same as in maths

3 0
3 years ago
Read 2 more answers
Show the ERD with relational notation with crowfoot. Drexel University Financial Office has made contracts with several local ba
andreyandreev [35.5K]

Answer:

Detailed ERD Diagram is given in the attachment

3 0
3 years ago
JAVA Code:
Burka [1]
Dear ,you should ask it on stackoverflow and geekforgeelks , not here
6 0
4 years ago
Which of the following is a benefit of a digital network?
k0ka [10]

Answer:

Multiple devices can be connected

8 0
3 years ago
Six security issues and six descriptions are shown below.
Trava [24]

Answer:

The answer to this question is given below in the explanation section

Explanation:

This question contains six securities terms and definitions.

The goal of this question is to properly map the term to its correct description/definition.

You can find the complete mapping in the attached image.

7 0
3 years ago
Other questions:
  • What does DKIM stand for?
    9·2 answers
  • Instructions:Drag the tiles to the boxes to form correct pairs.
    11·2 answers
  • What is the single most important component of a computer? Central Processing Unit DIP Motherboard Chipset
    8·1 answer
  • Biography of bill gates
    8·2 answers
  • A two-dimensional array of characters can contain Group of answer choices
    11·1 answer
  • 7.
    15·1 answer
  • 7. Which cipher is based on the clues of the physical factors, rather than the hardware or a software cryptosystem
    8·1 answer
  • Ill give alot of points if you answer: How do I get a 100 dollar ps4
    5·2 answers
  • Identify two real-world examples of problems whose solutions do scale well
    13·1 answer
  • What is the school wifi password trying to do my class work in school on different devices.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!