1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bekas [8.4K]
3 years ago
6

Select the correct answer.

Computers and Technology
1 answer:
aliina [53]3 years ago
7 0

Answer:

B

Explanation:

engineers design and carry out test cases and evaluate exit criteria (by following the scope set in the planning phase). They create bug reports describing detected defects and report to the stakeholders on the test findings and the completion status. Testing may be repeated to check for errors.

You might be interested in
What happens when you create a variable in a video game program?​
gulaghasi [49]

Answer:

A lot can happen, depending on the use of the variable

Explanation:

Lets create a position variable, a common variable in games.

Vector3 position = new Vector3(0, 0, 0);

The above variable initialization creates a new Vector3 object. The Vector3 class contains 3 properties, X, Y, and Z. When you assign the variable 'position' the new Vector3 object, the variable 'position' contains an instance of Vector3 where

X = 0,

Y = 0,

and Z = 0.

The variable 'position' can be used to set the position of a player, or an object.

We can reuse this variable when you want the object or player to move.

position.X = 29

position.Y = -14

position.Z = 47

now the object/player's position is (29, -14, 47).

Variables can be used for basically everything you need in programming, from storing a position, to storing the result of a complex math equation.

7 0
3 years ago
Cisco has created a proprietary layer 2 protocol used to manage VLAN configuration between switches called:________a. VLAN Confi
Reil [10]

Answer:

The correct answer is letter "E": None of the above.

Explanation:

The VLAN Trunking Protocol (<em>VTP</em>) provides an easy way of keeping an accurate VLAN configuration through a commuted network. The VTP allows solutions of commuted network easily scalable to other dimensions, reducing the need of manually setting up the red. The VTP composed of a layer 2 protocol used to manage VLAN setups between switches.

7 0
3 years ago
Using a conversation voice is part of:
MaRussiya [10]
Need more information
4 0
3 years ago
7. Malware could A. cause a system to display annoying pop-up messages B. be utilized for identity theft by gathering personal i
beks73 [17]

Answer:

D

Explanation:

Malware can be used for many things, a click of a button can send complete access to the attacking system. Malware comes in all formes and powers.

4 0
3 years ago
Describe IT infrastructure. What is the role of business intelligence in determining the technology needs of a business?
mixas84 [53]

Explanation:

 The term IT infrastructure refer to an enterprise which is basically a collection of various hardware, software, network components, data network and data centers that are being used to do some development, testing related to IT related services. So the major components of IT infrastructure are:

1) Hardware solutions

2) Software Solutions

3) Various Network Component

4) Data Centers

Business Intelligence is basically a technology driven process that is being used analyze various data and the information in more effective and more informed way. The role of business Intelligence is given in following points:

1) Business Intelligence plays a vital role in identifying the technology required for our business.

2) As we knew that Business Intelligence is technology driven, so technology identification is major part that is being done my this process

3) With business Intelligence we chose the best technology required for our business, its help in increasing the profit of the business.

4) We can business Intelligence is the major process that deal with identifying all the technology needs of the business

8 0
3 years ago
Other questions:
  • What is client server relationship is the basic form of what
    6·1 answer
  • An intranet is a way for a company or organization to protect copyrighted and other important information?
    15·2 answers
  • What are two advantages of encrypting data stored in the computer system?
    5·1 answer
  • Consider relations A and B. Relation A represents the entity on the ""one side"" of a one-to-many relationship; Relation B repre
    11·1 answer
  • ____________ facilitates the processes that help an organization function by applying information and communication technologies
    5·1 answer
  • Online banking tools allow you to pay bills from your computer. <br> a. True<br> b. False
    5·2 answers
  • Introduction to computing systems: from bits and gates to c and beyond
    7·1 answer
  • the tool that is used on the form to display text that the user cannot change is a. textbox b. label c. button​
    9·1 answer
  • Question 1(Multiple Choice Worth 5 points)
    9·2 answers
  • Find 10 real world challenges and their corresponding solutions
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!