1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
castortr0y [4]
3 years ago
15

. In testing, what is the role of an oracle?

Computers and Technology
1 answer:
ikadub [295]3 years ago
5 0

Answer:

The role of test oracle is to determine if a test has passed or failed. Oracle compares the outputs of the system under a  test, for a given test-case input, and the output(s) that should have. A test oracle works on specifying constraints on the output(s) for a set of inputs. An oracle could be:

  • a program which tells if the output is correct.
  • documentation that specifies the correct output for inputs.
  • a human that can tell whether it is correct an output.

You might be interested in
write query for all products reutrn product name with its amounts due, paid, canceled, and refunded, order the result by product
spayn [35]

Answer:

SELECT product_name, amount_due, amount_paid,

              cancelled, amount_refunded

   FROM products

ORDER BY product_name ASC;

Explanation:

SQL (Structured Query Language ) was used above.

The SELECT command is used to list all the variables we want in our output.

The FROM command signifies the location.

ORDER BY command ensures that your result is ordered

ASC means Ascending Order.

; signifies the end of the query.

NOTE: Underscores were used because variables cannot be written with spaces between them

8 0
2 years ago
As the security administrator for your organization, you must be aware of all types of attacks that can occur and plan for them.
Aliun [14]

Answer:

The answer is "DDoS "

Explanation:

The distributed denial of service attack (DDoS) occurs whenever a directed program's wireless data or assets, generally one or even more application servers, were also swamped by various machines. This attack is always the consequence of many affected systems, that fill up the target network with traffic.

  • This attack is aimed to avoid legal customers of one's website from accessing it.  
  • In being effective in a DDoS attack, further demands need to be sent to the hacker than even the victim's server could deal with.  
  • One other way to successfully attack is to send fake requests from the attacker.
5 0
2 years ago
Please help This is a homework in ICT class
Pavlova-9 [17]

Answer:

ejwksjnsskawii28393939393030jedjdjjccjncncnccnnccn

Explanation:

jsskaaaahujpjbhdueiwiwopwpwpwwieuehbfcnnccjxkxooss8ahwhwwnekdodod8djhdmslwoaishwhwkqoq18829293i4644673819191jednsmzljesksowlwlwpwpwnwkpwwwww waaaaayushsjsnmssoss ss sosijw

8 0
2 years ago
. Mercury, Venus, Earth, and Mars are the closest planets to the Sun
DIA [1.3K]

Answer:

<h3>True</h3><h2>Mercury  is the nearest</h2>

Explanation:

I hope this helps

4 0
3 years ago
The library Wi-Fi kiosk requires a symmetric connection to the Internet. Which WAN technology would probably be the least expens
kenny6666 [7]

Answer:

The answer is IP-sec.

Explanation:

0.75 miles of range is a low distance for a WAN (Wide Area Network) so a point-to-point WAN tehcnology such as IP-sec or SD-WAN can be preferred. But the least expensive option would be choosing IP-sec as specified in the question.

I hope this answer helps.

6 0
3 years ago
Other questions:
  • Once the technology for the collection of solar power is in place what will be two benefits of its use
    9·1 answer
  • What is a flash player?
    9·2 answers
  • Um can anyone who is really into science and physics answer this question
    7·1 answer
  • A _____ is the useful part of a transmission through a network.
    15·1 answer
  • Which button will allow you to insert quotes and notes into text into a document​
    12·1 answer
  • In chapter 3, we discussed syntax and semantics, in general there are two types of grammars for programming languages, regular a
    14·1 answer
  • What is the IEEE 802 standards name for a wireless network that is limited to one person's workspace?
    14·1 answer
  • Katy and her associates are approached by an aged tai chi expert to create a website for him. From her participation in an onlin
    9·1 answer
  • a blank search examines the first item to see if it is a match, then the second, and so on. answers: linear, binary, and orderly
    7·2 answers
  • Mainframe computers are multi-programming, high-performance computers, and multi-user, which means it can handle the workload of
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!