1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tia_tia [17]
3 years ago
14

Why stress testing is needed?​

Computers and Technology
2 answers:
Zarrin [17]3 years ago
7 0

Answer:

To be able to test a product if it can withstand what it is supposed to before being released to the public for saftey reasons.

Sveta_85 [38]3 years ago
4 0

Answer:

Stress testing involves testing beyond normal operational capacity, often to a breaking point, to observe the results. Reasons can include:

  • Helps to determine breaking points or safe usage limits
  • Helps to confirm mathematical model is accurate enough in predicting breaking points or safe usage limits
  • Helps to confirm intended specifications are being met
  • Helps to determine modes of failure (how exactly a system fails)
  • Helps to test stable operation of a part or system outside standard usage
  • Helps to determine the stability of the software.

Stress testing, in general, should put computer hardware under exaggerated levels of stress to ensure stability when used in a normal environment.

You might be interested in
Suponiendo que el centro de la gravedad de la barra se enchentra a 3 m del punto de apoyo,y su contrapeso, de 4800 N, se encuent
VikaD [51]

Answer:

C

Explanation:

because...

6 0
3 years ago
Who do you like more?<br><br>Lolbit<br><br>-or-<br><br>Mangle
PolarNik [594]

Answer: lolbit

Explanation: she is my glitchy idol along with the shadows and Mr. Afton's cult.

8 0
3 years ago
Read 2 more answers
(2) Design pseudocode for a program that accepts numbers from the user until the special number 555 is entered (you should use a
elena-s [515]

Answer:

Pseudocode is explained below

Explanation:

# Create a variable to count the numbers.

numberOfNumbers = 0

# Create a variable to store the sum of numbers.

sumOfNumbers = 0

# Create a constant to store the special numbers.

constant specialNumber = 222

# Start the loop.

while True:

{

   # Prompt the user to enter a number.

   num = input("Enter a number: ")

   # Break the loop if the number is

   # equal to the special number.

   if num == 222:

   {    

       break

   }

   

   # Otherwise, add the number in the current

   # sum and increment the number of values.

   else:

   {

       sumOfNumbers = sumOfNumbers + num

       numberOfNumbers = numberOfNumbers + 1

   }

}

# Display the values.

print("The number of numbers = ", numberOfNumbers)

print("The sum of numbers = ", sumOfNumbers)

7 0
3 years ago
Which of the following is a right of a user of information systems?
Eva8 [605]

Answer:

Option A is the correct option for the following question.

Explanation:

The following option is correct because this option is one of among four rights of the user of an information system which is collectively important for those users who working in any organization, company or firm. It always requires the new and the upcoming features or the function of the system.

Option B is wrong because it is not the right of the user and the right is don't disclose the secrets of your firm or company to any outsiders or any person who are not reliable.

Option C is wrong because it is not the right of the user.

Option D is wrong because it is not the right of the user and it is the responsibility of all computer users to keep their systems fit and fine.

4 0
4 years ago
How do you loop a makebeat in earsketch
Anettt [7]

Answer:

i dont know if this help but To do this, we will use a 'for loop'. The “for loop” allows the programmer to call a section of code repeatedly within a range of values. The range() function will return integer values depending on the arguments.

Explanation:

5 0
3 years ago
Other questions:
  • Suppose a subnet has a prefix 128.119.44.128/26. Give an example of an IP address from this subnet. If an ISP owns a block of ad
    14·2 answers
  • discuss in an essay format the steps one needs to take to develop a management information system(MIS)give examples to support y
    7·1 answer
  • Binary data is written in hexadecimal. For example, when creating a graphic for a website, colors are represented by six hexadec
    12·1 answer
  • What export format is a great option for students that want to put their video into an online portfolio?
    8·1 answer
  • Would a sim card(activated) be able to function on any phone regardless of the companies carrier?
    7·1 answer
  • The network team has well established procedures to follow for creating new rules on the firewall. This includes having approval
    15·1 answer
  • 4. Why does Hancock believe that our communication online is more honest than we might<br> expect?
    15·2 answers
  • Write a method __repr__(self) that returns a string representing an AIPlayer object. This method will override/replace the __rep
    13·1 answer
  • John buy cheap stolen rims for his new truck?
    11·1 answer
  • What is a security strategy comprised of products and services that offer remote support for mobile devices, such as smart phone
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!