1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yuri [45]
3 years ago
11

Multiple Choice: We have been assigned the task of developing a software testing tool (tester) that can assess reachability of s

tatements in a program. Namely, given a program and a statement x in the program (line in the code), the tester should produce a sequence of inputs that demonstrates that the program can reach statement x, or declare that statement x is not reachable under any input sequence. What should we respond to the manager who assigned this task
Computers and Technology
1 answer:
egoroff_w [7]3 years ago
6 0

Answer:

A. There is no algorithm to decide whether this can be done or not.

Explanation:

We should respond to the manager who assigned this task that there is no algorithm to decide whether this can be done or not. This is because there are many unknowns with the program that is provided. There are various programming languages and each one has its own structure and requirements in order to test them. Also, each function is created differently with different inputs that are necessary and different algorithms used. It is impossible to design a single algorithm that works to test every single provided program. That is why testers have to create custom test cases for each function.

You might be interested in
Jax needs to write a block of code that will organize a list of items alphabetically. Which function should he use?
Zielflug [23.3K]
I would say sort since he’s sorting them into alphabetical order. I’m not 100% sure tho
4 0
3 years ago
Read 2 more answers
Which of the following is an example of a real-world logic problem for which computers may be used?
8_murik_8 [283]

Answer:

I'd say it's most likely (A) Banking transactions performed at ATMs.

Explanation:

The other three are things that you would need a human for.

4 0
3 years ago
What is meant by instruction pipelining in RISC processor? Whatare
Evgesh-ka [11]

Answer:

Explanation:

The instruction pipelining refers to various stages the instruction has to go through for the full execution of the instruction. Each instruction undergoes various stages in the execution, they are Instruction Fetch, Instruction Decode, Address Generator, Data Fetch, Execution and Write Back. Not every instruction may go through all the stages stated above. Pipelining exploits the parallelism in the execution of instructions (executing multiple instructions simultaneously ). Each instruction might be at different stage in the execution of program. It can be a 3-stage pipelining or 5 stage pipelining.

The implementation of Pipelining is a complex procedure.

In branch instructions, the complexity increases with the number of stages of pipeline.

7 0
3 years ago
Categorize the e-publications as a means of networking or as a storehouse of resources
stealth61 [152]

Answer:

 The answer is "E-book, E-portfolio, and website ".

Explanation:

e-publications define as a method of connectivity are sites online besides the un-mail community newsgroup blog. It defines as a category of means, which storehouse with resource base are E-book, E-portfolio, and website.

  • On the website, it can be classified as both connectivity and storage facility of information.  
  • On the website when network security like yahoo website only as a storage area of resource development website to access or download PDF files.
8 0
4 years ago
A security operations team was alerted to abnormal DNS activity coming from a user's machine. The team performed a forensic inve
Damm [24]

Answer:

D. Data exfiltration

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, sniffing, data exfiltration, etc.

The type of attack in this scenario is best described as data exfiltration.

Data exfiltration can be defined as a form of data security breach that typically involves an unauthorized transfer of data from a host computer by using a malware and a malicious code.

Hence, data exfiltration occurs when a malicious code uses a domain name server (DNS) as a tunnel to extract data from an end user's computer (client machine) and transferring it to an unsecure public Internet site.

5 0
3 years ago
Other questions:
  • 2-3 Calculating the Body Mass Index (BMI). (Programming Exercise 2.14) Body Mass Index is a measure of health based on your weig
    13·1 answer
  • Yesterday you installed a new game on your computer. When you ran the computer, you noticed that the application was running ver
    8·1 answer
  • Write a program that asks the user for the name of a text file. the program should display the last 10 lines of the file on the
    13·1 answer
  • You coded the following class: public class N extends String, Integer { }When you compile, you get the following message:N.java:
    9·1 answer
  • The _____ row is typically the first row in a table.<br><br> banded<br> total<br> header<br> odd
    14·2 answers
  • What is an online recommendation engine?
    12·1 answer
  • The goals of _____ are to determine the work load at which systems performance begins to degrade and to identify and eliminate a
    11·1 answer
  • What keyboard functions lets you delete words
    9·2 answers
  • Which career qualification is unique to the Energy Transmission career pathway and not to the Energy Distribution pathway? color
    10·2 answers
  • 안녕 또 나야 난 너에게 미래의 메시지를 전하러 왔어 01100011 01101111 01101101 01101111 00100000 01111001 00100000 01101100 01101111 00100000 01101101
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!