1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Genrish500 [490]
2 years ago
15

What are some limitations when it comes to testing and ensuring program quality? List at

Computers and Technology
1 answer:
DedPeter [7]2 years ago
4 0

Answer:

the two limitation i can think about is the efficiency like if there are bugs or glitches or if it can get broken into and the second one is if it is running the correct program or not a lot of people deal with this problem.

Explanation: personally these are the two i can come up with at the moment

You might be interested in
HP laptop computers are produced on a line, with multiple workers completing one or two specific tasks to assemble the laptop. T
EastWind [94]

Answer:

HP laptop computers are produced on a line, with multiple workers completing one or two specific tasks to assemble the laptop. This is an example of <u>job Specialization Negatives </u>which can leave to boredom and dissatisfaction. A solution may be to introduce <u>job rotation  </u>where employees shift from one job to another.

Explanation:

One of the major disadvantages of specialization in a job is the repetitive routine which leads to boredom. As the brain does not get actively involved in the same boring routines, so there is more number of chances of mistakes to be made. The employees may also feel not connected to the procedures as they work in just one area.

To avoid these circumstances, the managers of a company should initiate the idea of job rotations. Job rotation simply means shifting the job of an employee for a few days so that he/she can get a better understanding of the job and company.

5 0
3 years ago
In a word-processing program, what are the easily accessible icons that allow you to print, save and change fonts with a click o
Elan Coil [88]

The answer is A. tool bar

7 0
3 years ago
Physical Geography of the Middle East
vagabundo [1.1K]

Answer:

Explanation:

He’s wright SS7G5 The student will locate selected features in

Southwestern Asia (Middle East).

a. Locate on a world and regional political-physical map:

Euphrates River, Jordan River, Tigris River, Suez Canal,

Persian Gulf, Strait of Hormuz, Arabian Sea, Red Sea, and

Gaza Strip.

b. Locate on a world and regional political-physical map the

nations of Afghanistan, Iran, Iraq, Israel, Saudi Arabia, and

Turkey

3 0
3 years ago
Design the logic for a program that allows a user to enter 20 numbers, then displays each number and its difference from the num
Svetach [21]

Answer:

Logic for a program

Explanation:

//Here ind = index

//declare the number

number ind

number sum

number avg

number SIZE = 20

number num[SIZE] = {0,0,0,0,0,0,0,0,0,0 ,0,0,0,0,0,0,0,0,0,0}

getReady()

while ind < SIZE

getNumbers()

stop

getReady()

ind = 0

sum = 0

return

getNumbers()

cout<< “Enter a number for position ”, ind

input numbers[ind]

sum = sum + numbers[ind]

ind = ind + 1

return ;

finishUp()

avg = sum/SIZE

ind = 0

while ind < SIZE

output numbers[ind], avg – numbers[index]

ind = ind + 1

return

Modify the program in 2a

number index

number sum

number avg

number actualSize

number SIZE = 10

number number[SIZE] = 0

7 0
3 years ago
Nicotine us a dangerous chemical found in Cigarettes; it is accompanied by two other very harmful chemicals. These are
NNADVOKAT [17]

Answer: Carbon Monoxide and Tar.

4 0
3 years ago
Other questions:
  • Each computer or device on a network is called a(n) ______.
    7·1 answer
  • You '' friend or ''like'' a page o your favorite social media page that advertises a
    10·1 answer
  • During the forensic phase of a security investigation, it was discovered that an attacker was able to find private keys on a poo
    9·1 answer
  • Which of the following access control techniques allows the user to feel empowered and able to change security attributes?
    5·1 answer
  • Which of the following technologies is an example of social media
    12·1 answer
  • Give me 4 examples of things to consider as a sound designer?<br> HURYYYYY IM TIMED
    11·1 answer
  • Widow in respect to word processing ​
    15·1 answer
  • Copying materials from a source text without using is<br> considered plagiarism<br> ?
    5·1 answer
  • Write a method named addCommas that accepts a string representing a number and returns a new string with a comma at every third
    10·1 answer
  • Each of the flowchart segments in Figure 3-24 is unstructured. Redraw each segment so that it does the same processes under the
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!