1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mart [117]
3 years ago
5

Which function calls would provide the most helpful test of this function? Remember: With tests, you are attempting to figure ou

t all the possible ways the function could be broken.
function findMin(num1, num2){
if(num1 < num2){
return num1;
} else {
return num2;
}
}
A. findMin(-1, 0)
findMin(2,4)
findMin(5,10)
B. findMin(5,3)
findMin(7,2)
findMin(5,1)
C. findMin(1,1)
findMin(-2,2)
findMin(0,3)
D. findMin(-1,1)
findMin(1,-1)
findMin(1,1)
Computers and Technology
1 answer:
statuscvo [17]3 years ago
5 0

Answer:

D

Explanation:

You might be interested in
A form of encryption that uses only one key to encrypt and decrypt a file. This is a less
pychu [463]

Answer:

symmetric encryption

Explanation:

Asymmetric encryption uses 2 keys.

6 0
3 years ago
Explain how a third party cookie can track your web browsing across multiple web domains.
Vlada [557]
A third party cookie can stay in your hard drive or browsing files, and record all the action

Hope this helps.
3 0
3 years ago
True and false 1. Trace topology is also referred to as tree bus topology. ​
algol13

Answer:

Trace topology is also referred to as tree bus topology.

Explanation:

6 0
2 years ago
By developing a(n) .....,a business owner can launch program in a web brower.
WITCHER [35]
Yes they can , it can grow out their business a lot , promotion work great for a business
8 0
4 years ago
What statement best describes Konrad zuse? <br><br> Helpppp!!
Maksim231197 [3]
U didn’t put the choices, but zuse is a German civil engineer computer scientist. His greatest achievement was the worlds first programmable computer.
6 0
3 years ago
Other questions:
  • You want high availability for DHCP services, a primary server to handle most DHCP requests, and a secondary server to respond t
    11·1 answer
  • Users of an access point share the transmission capacity of the access point. The throughput a user gets is called the ________.
    11·1 answer
  • Jamie has to enter the names, grades, and scores of a group of students into a worksheet. Which option will Jamie use to describ
    15·1 answer
  • Give one example of where augmented reality is used​
    11·2 answers
  • PLEASE HELP!! WILL MARK BRAINLIEST!!
    15·1 answer
  • Which term describes unjust behavior due to a person’s gender or race
    14·1 answer
  • Which of the following does Secure Sockets Layer (SSL) use to authenticate a user or system before encrypting a session?
    14·1 answer
  • Write your question here (Keep it clear and simple to get the best answer)
    13·2 answers
  • Why is it important to isolate evidence-containing devices from the internet?
    11·1 answer
  • After a group sets a project schedule, members should be prepared to
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!