1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zarrin [17]
3 years ago
13

You are part of a testing team at a software business. Your job is to see how many concurrent users the system can host and how

many database transactions the system can handle without a noticeable drop in performance. You are doing _____ testing. a. acceptance testing b. volume testing c. system testing d. integration testing
Computers and Technology
1 answer:
damaskus [11]3 years ago
5 0

Answer:

The right approach is Option b (volume testing).

Explanation:

  • A non-functional trial that has been conducted throughout a results evaluation where even a large amount of information becomes accessible to something like the program, would be determined as Volume testing.
  • The application functionality has been analyzed by determining the maximum volume throughout the database.

Other options are not related to the given query. So the above is the right response.

You might be interested in
Your company has merged with another company that also uses Windows Server 2016 and Active Directory. You want to give the other
LiRa [457]

Answer:Creation of two-way forest trust

Explanation: In active directory, Two way forest trusty is the two way trusting condition where one forest trust the other forest and it works same for both forest.The forest domain of one forest is reliable and have trusty relationship with the other forest and vice-versa.

This function of the forest helps all the users to reliably access all the components of both the domains.Thus two-way forest trust should be created between the two organization mentioned in the question.

5 0
3 years ago
Which term is used to describe a network security device or host software that filters communications, usually network traffic,
morpeh [17]

Answer:

The correct answer is option (D).

Explanation:

According to the scenario, the most appropriate answer is option (D) because the firewall can be defined as the software program which checks through the network for incoming and outgoing communication on predefined rules.

while the other options are wrong because of the following reasons :

  • A sniffer can be defined as the program which is used to check the network traffic but it didn't work on predefined rules.
  • An auditor can be defined as a program that is used to analyze the network.
  • The hacker can be a person who hacks the system to gain access or gather information.
4 0
4 years ago
Implement switch/case or if/else ladder for menu control. Update the currency conversion program. If the user enters an invalid
Sindrei [870]

Answer:

I need some time i answering your question please follow me and thanks

6 0
2 years ago
What kind of network connection do you think is used to connect most wireless video game controllers to consoles, and why would
Ostrovityanka [42]

Answer:

I would say Lan

Explanation:

5 0
3 years ago
A service provider recently upgraded one of the storage clusters that houses non-confidential data for clients. The storage prov
VARVARA [1.3K]

Answer:

<em>C. Purging</em>

<em></em>

Explanation:

<em>Data Purging in computer storage is a process that permanently erases and remove data from a storage space</em>.  Data deleting only removes the shortcut to the data but does not remove the data permanently, and can be easily recovered by an expert. <em>Data purging removes data permanently and also frees up the storage or memory space for other uses.</em> Data purging is relatively inexpensive and can be achieved with some special software tool.

Since the storage provider wants the hard drive back in working condition, data purging is the best option.

3 0
3 years ago
Other questions:
  • Name the component used in first generation of computer​
    10·1 answer
  • A network administrator has been tasked with configuring access to the Internet for about 50 computers. The administrator has be
    6·1 answer
  • Select the correct answer. Steve wants to change shooting and exposure settings while on his photo shoot. Which camera part will
    7·2 answers
  • An IT technician has manually configured an IP address on a laptop for a new employee. Each time the employee tries to connect t
    10·1 answer
  • write a program that reads in the length and the width of a rectangular yard . your program should compute the time required ( i
    5·1 answer
  • In your own words, describe how a network administrator can use the OSI model to isolate a network problem.
    13·1 answer
  • 3. In a 32-bit CPU, the largest integer that we can store is 2147483647. Verify this with a
    12·1 answer
  • What is the worst case time complexity of insertion sort where position of the data to be inserted is calculated using binary se
    13·1 answer
  • What should you do first when designing a program?
    5·2 answers
  • Features of Python are *
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!