1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olchik [2.2K]
3 years ago
13

Which of these are reasons to test code? Check all of the boxes that apply. Most code contains some errors. Beta users expect er

ror-free programs. Users expect software programs to function properly. Software developers expect to have error-free programs after one test.
Computers and Technology
2 answers:
Lady_Fox [76]3 years ago
6 0

Answer:

Most code contains some errors and Users expect software programs to function properly

Explanation:

Beta users will be the ones to find errors before the project is completed, they do not expect it to be perfect, and software developers will not expect a perfect first test.

Serjik [45]3 years ago
6 0
Most beta users expect errors i here that there goin to fix it as soon as possible so no worries
You might be interested in
What is Server Message Block (SMB) used for in Windows and can a hacker still damage a network using SMB?
Aleksandr [31]

Answer:

The absolute most decimating ransomware and Trojan malware variations rely upon vulnerabilities in the Windows Server Message Block (SMB) to proliferate through an association's system. Windows SMB is a convention utilized by PCs for record and printer sharing, just as for access to remote administrations.  

A fix was discharged by Microsoft for SMB vulnerabilities in March 2017, yet numerous associations and home clients have still not applied it. So now, the unpatched frameworks permit dangers that exploit these vulnerabilities inside, helping dynamic malware crusades spread like Californian rapidly spreading fire.  

SMB vulnerabilities have been so effective for danger entertainers that they've been utilized in the absolute most unmistakable ransomware episodes and refined Trojan assaults of the most recent two years. Truth be told, our item telemetry has recorded 5,315 discoveries of Emotet and 6,222 of TrickBot in business systems—two Trojan variations that are utilizing the SMB vulnerabilities—over the most recent 30 days alone.

7 0
3 years ago
Read 2 more answers
Write the code to produce a for loop that counts down from 20 to 0 by 2’s and prints the number each time it goes through the lo
yulyashka [42]

Explanation:

Count-controlled for loop (Three-expression for loop)

This is by far the most common type. This statement is the one used by C. The header of this kind of for loop consists of a three-parameter loop control expression. Generally it has the form:

for (A; Z; I)

A is the initialisation part, Z determines a termination expression and I is the counting expression, where the loop variable is incremented or dcremented. An example of this kind of loop is the for-loop of the programming language C:

for (i=0; i <= n; i++)

This kind of for loop is not implemented in Python!

Numeric Ranges

This kind of for loop is a simplification of the previous kind. It's a counting or enumerating loop. Starting with a start value and counting up to an end value, like for i = 1 to 100

Python doesn't use this either.

Vectorized for loops

They behave as if all iterations are executed in parallel. This means, for example, that all expressions on the right side of assignment statements get evaluated before the assignments.

Iterator-based for loop

Finally, we come to the one used by Python. This kind of a for loop iterates over an enumeration of a set of items. It is usually characterized by the use of an implicit or explicit iterator. In each iteration step a loop variable is set to a value in a sequence or other data collection. This kind of for loop is known in most Unix and Linux shells and it is the one which is implemented in Python.

Example of a simple for loop in Python:

>>> languages = ["C", "C++", "Perl", "Python"]  

>>> for x in languages:

...     print(x)

...  

C

C++

Perl

Python

>>>

3 0
3 years ago
Which term describes a secure, individual, private cloud-computing model hosted within a public cloud?
grin007 [14]

The term that describes a secure, individual, private cloud-computing model hosted within a public cloud is A hybrid cloud.

<h3>What is this cloud about?</h3>

A hybrid cloud is known to be a system or a model which is said to be a form of a private cloud that is linked with public cloud infrastructure, and it is one that tends to give room for an organization to act workloads in two environments.

Note that In this model, the public cloud is known to be one that is seen and it is one that becomes an extension of the private cloud to make a single, uniform cloud.

Hence, The term that describes a secure, individual, private cloud-computing model hosted within a public cloud is A hybrid cloud.

Learn more about hybrid cloud from

brainly.com/question/27838623

#SPJ1

7 0
1 year ago
In general, a unit test may need drivers and stubs, but not both.<br><br> TRUE OR FALSE
Ymorist [56]

Answer:

True

Explanation:

If a module or code is not ready then the unit test can use the Stubs to simulate a called upon function to test the process. On the other hand if the main unit is not ready the test can use Drivers to simulate the calling of said function to test the rest of the modules.

Therefore, a unit test will use either Drivers or Stubs at a given moment for testing but not both simultaneously.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

5 0
3 years ago
How old am i <br> (Will give brainliest)
diamong [38]
You’re probably thirteen
4 0
2 years ago
Other questions:
  • What is another name for “low-angle lighting”? Side lighting Top lighting Under-lighting Three-point lighting
    15·2 answers
  • What is 1/10 of 2.0 in decimal form​
    10·1 answer
  • Assume that a large number of consecutive IP addresses are available starting at 198.16.0.0 and suppose that two organizations,
    13·1 answer
  • Modern ssds use a technique called "____" to spread write operations around the storage medium, thus evening out the impact of d
    13·1 answer
  • In which of the following situations will a macro make your work more efficient?
    9·1 answer
  • Amy just added a 462 meter run of fiber optic cable to the network what should she do next?
    10·1 answer
  • Windows stores information from the Credential Manager application in secure folders called
    5·1 answer
  • What does aperture control? A)amount of light the image sensor captures when taking a photo. B)how sensitive the camera is to in
    10·2 answers
  • How are the number of rows calculated.​
    14·1 answer
  • Im timed!!!!!!!!!!!!!!!!!!<br><br> I NEED HELP ASAP<br> THANK YOU SO MUCH
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!