1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ladessa [460]
4 years ago
7

What is the name given to the software testing technique, which basically consists of finding implementation bugs using malforme

d/semi-malformed data injection in an automated fashion?
Computers and Technology
2 answers:
yuradex [85]4 years ago
7 0

Answer:

Fuzz testing is the answer.

Explanation:

Fuzz testing is a testing technique that is implemented to identify security vulnerabilities or coding errors in networks, Operating systems (OS) or software.

It involves providing random, unexpected or invalid data to identify bugs at the implementation stage and to discover how the software developed or network responds to such situations (that is, if there is a recovery mechanism in place).

cupoosta [38]4 years ago
6 0

Answer:

Fuzz testing

Explanation:

Fuzz testing technique was developed by Professor Barton Miller and his students in the year 1989 at the University of Wisconsin Madison. This Fuzz testing technique is used in finding implementation bugs using malformed/semi-malformed data injection in an automated fashion.

You might be interested in
An IP packet to be transmitted by Ethernet is 60 bytes long, including all its headers. If LLC is not in use, is padding needed
salantis [7]

Answer:

No padding

Explanation:

64 bytes is taken as the minimum Ethernet frame, this encompass checksum as well as addresses in the Ethernet frame header and length field. while the maximum Ethernet frame is 1518 bytes, any minimumEthernet frame that is short compare to that will need receiving stations to interpret it as a collision. The question specified that the IP packet to be transmitted by Ethernet as 60 bytes long. The header fields here can occupy 18 bytes, Then total frame size becomes 78 bytes. With the total frame size of 78 bytes(60 bytes+ 18 bytes) we can see it has exceeded the 64-byte minimum. Hence there is no padding used.

6 0
3 years ago
Game design colleges anyone know the requirements??
tester [92]
Basic understanding of code language such as Java, C++, Swift (iOS) etc. without knowledge of these, you’ll be lost trust me. Study up on these in your spare time. They do teach this stuff in college, but being ahead of the game is always good. No pun intended kek ;D
8 0
3 years ago
bookmark question for later what database did zach choose? microsoft excel microsoft access db2 oracle
Veronika [31]

Zach chooses the databases is Oracle

<h3>Explain about the databases?</h3>

Information that is organized into a database is made available for quick administration, updating, and access. Network databases, object-oriented databases, and hierarchical databases are all types of databases.

According to the TOPDB Top Database index, Oracle is the most widely used database with 32.09% of the market share. Computer databases often hold collections of data records or files containing information, such as sales transactions, customer data, financials, and product information My SQL, with a score of 16.64, is in second place, while SQL Server, with a score of 13.72 percent, is third. Since at least 2006, Oracle has dominated global database searches, making it the most used database not just in 2022.

To learn more about databases refer to:

brainly.com/question/28255661

#SPJ4

5 0
1 year ago
How many integer types are there in python​
Setler79 [48]
In python you can have several types of numbers such as plain integers, long integers, floating-point numbers and complex numbers.
5 0
3 years ago
Need this!!
Galina-37 [17]

Answer

Peer-to-peer network

Explanation

Social media video sharing networks a platform which is an entertainment based where members can share videos in a site. it allows easy integration with other social networking platforms to share and watch videos. To start  a social media video sharing network, Rebecca  is required to set up a Peer-Peer Network.

Peer-Peer network is created when two or more computers are connected and they are sharing resources without going through separate servers. That is a couple of computers are  connected via a Universal Serial Bus to transfer files.


3 0
4 years ago
Read 2 more answers
Other questions:
  • Exercise 3: Function Write a function named word_count that accepts a string as its parameter and returns the number of words in
    10·1 answer
  • Tool such as microsoft’s ____ are helping to bridge different platforms and programming languages.
    6·1 answer
  • A(n) ______ notification is a message that initiates from the sending location without a request from the receiver. With a(n) __
    5·2 answers
  • A ________ is a set of rules that governs data communication.
    14·1 answer
  • 20. A computer freezes at odd times. At first, you suspected the power supply or overheating, but you have eliminated overheatin
    6·1 answer
  • I want to discard my old computer and want to securely erase the data from my hard drive what is the process called.
    14·2 answers
  • A potentiometer a three wire variable resistor is used in which type of sensor ?
    13·1 answer
  • Who would win in a fight iron man or bat man​
    5·2 answers
  • Is this very epik or not?
    9·2 answers
  • With which type of satellite is there a propagation delay?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!