1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yuri [45]
3 years ago
11

Multiple Choice: We have been assigned the task of developing a software testing tool (tester) that can assess reachability of s

tatements in a program. Namely, given a program and a statement x in the program (line in the code), the tester should produce a sequence of inputs that demonstrates that the program can reach statement x, or declare that statement x is not reachable under any input sequence. What should we respond to the manager who assigned this task
Computers and Technology
1 answer:
egoroff_w [7]3 years ago
6 0

Answer:

A. There is no algorithm to decide whether this can be done or not.

Explanation:

We should respond to the manager who assigned this task that there is no algorithm to decide whether this can be done or not. This is because there are many unknowns with the program that is provided. There are various programming languages and each one has its own structure and requirements in order to test them. Also, each function is created differently with different inputs that are necessary and different algorithms used. It is impossible to design a single algorithm that works to test every single provided program. That is why testers have to create custom test cases for each function.

You might be interested in
What does a sharp sign indicate when used in representing a pitch?
ziro4ka [17]
A sharp sign <span>(#) </span><span>indicates that a note is one half-tone or semitone step higher compared to a note without a </span>sharp<span>. </span>
5 0
3 years ago
Are self driving cars essential for the future of transportation
azamat
Yes, I think so at least because what about those who can't physically drive? They would want the experience of being in the driver's seat.
6 0
3 years ago
An early attempt to force users to use less predictable passwords involved computer-supplied passwords. The passwords were eight
Sedaia [141]

Answer:

Recently, with the new and advanced hacking algorithms and affordable high-performance computers available to adversaries, the 36 character computer suggested passwords can easily be insecure.

Explanation:

The 8 length passwords generated pseudo-randomly by computers are not secure as there are new algorithms like the brute force algorithm that can dynamically obtain the passwords by looping through the password length and comparing all 36 characters to get the right one.

And also, the use of high-performance computers makes these algorithms effective

7 0
3 years ago
A computer _________________ is a text file that a computer can understand
Gekata [30.6K]

Answer:

A computer ___Task__ is a text file that a computer can understand

6 0
2 years ago
Which blog had legal content and is written mostly by lawyers
Svetradugi [14.3K]
Is it asking for a web site like .edu? or something like that?
6 0
3 years ago
Read 2 more answers
Other questions:
  • Using the flowchart below, what value when entered for Y will generate a mathematical error and prevent our flowchart from being
    14·1 answer
  • You are a disgruntled employee with a master’s degree in computer sciences who was recently laid off from a major technology com
    11·1 answer
  • What is the fastest way to locate a record for updating?
    6·1 answer
  • The area of a square is stored in a double variable named area. write an expression whose value is length of the diagonal of the
    8·1 answer
  • What is the best data structure to solve the following problem? a) A list needs to be built dynamically. b) Data must be easy to
    11·1 answer
  • If we ignore the audio data in a video file, a video file is just a collection of many individual frames (i.e., images). What is
    6·1 answer
  • An end-user license agreement protects _____.
    7·1 answer
  • The find_item functions uses binary search to recursively locate an item is the list, returning true if found, false otherwise.
    13·1 answer
  • If the starting address location changes, in which of the following cases, the program has to be recompiled? Select one: a. Both
    12·1 answer
  • You have an audio that contains one pause for 0.2 seconds and another one for 0.6 seconds. When do you need to create a new segm
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!