Recovery testing is a system test that forces the software to fail in a variety of ways and verifies that software is able to continue execution without interruption.
A) TRUE
B) FALSE

Answers

Answer 1
true.
it tests for vitality of the system

Related Questions

A ______ is a data communication system spanning states, countries, or the whole world.
A) MAN
B) LAN
C) WAN
D) none of the above

Answers

C.) WAN (Wide Area Network)

A WAN is a data communication system spanning states, countries, or the whole world. Thus, option C is correct.

What is data communication?

Data communication is the process of sending messages or data through two devices across a wireless medium, as it is in computer systems. A combination of hardware and connectivity is used in this procedure.

A communications system known as a large area network covers a huge geographic region. Leased telecommunications lines are frequently used to construct large-area networks.

Since this includes numerous stations dispersed across a particular bregion, or perhaps the entire world, it is known as a wide-area network. This was to ensure that the data can be reached, by multiple users.

Therefore, option C is the correct option.

Learn more about data communication, here:

https://brainly.com/question/28588084

#SPJ2



XML Schemas consist of:
A.
properties and methods.
B.
elements and attributes.
C.
structure and data.
D.
tables and relationships.
View Answer Workspace Report Discuss in Forum
9.
The expression FOR XML RAW tells SQL Server to:
9.
A.
place the values of the columns as attributes in the resulting XML document.
B.
place the values of the columns into elements rather than attributes.
C.
place some columns into elements and others into attributes.
D.
None of the above is correct.

Answers

none of the above is correct

The method needed to arrange for an object to be notified when a window's close-window button has been clicked is

Answers

The correct answer that would best complete the given statement above would be the term addWindowListener. The method needed to arrange for an object to be notified when a window's close-window button has been clicked is addWindowListener. Hope this is the answer that you are looking for. 

________ is a collection of many separate networks.
A) A WAN
B) An internet
C) a LAN
D) None of the above

Answers

B.) An internet- a collection of networks

The _____ address range is reserved for a computer to communicate with itself and is called the loopback.

Answers

The answer is 127 I had that question before

Debugging is not testing, but always occurs as a consequence of testing.
A) TRUE
B) FALSE

Answers

A) True Hope that helps

It is true to say that Debugging is not testing but always occurs as a consequence of testing.

What is Debugging?

Debugging is the process of identifying and fixing defects in computer programs, software, or systems. It is a crucial step in computer programming and software development.

Debugging is used to identify and correct errors. The testing procedure just displays the consequences of the coding fault on the application; it does not assist the developer in identifying the mistake in the code.

Software developers and engineers use debugging to find and correct bugs in programs before making them available to the general public. It's an additional step to testing, which entails discovering how an issue impacts a program as a whole.

Debugging is the act of locating and fixing problems in software code that might lead to unexpected behavior or crashes. These mistakes are sometimes referred to as "bugs." Debugging is used to identify and fix faults or flaws in software or systems so that they don't operate incorrectly.

To read more about Debugging, refer to - https://brainly.com/question/13966274

#SPJ2

Assign True to the variable has_dups if the string s1 has any duplicate character (that is if any character appears more than once) and False otherwise.



Here is the answer I wrote:


i = []
for i in range(len([s1])):
if s1.count(s1[i]) > 1:
has_dups = True
elif s1.count(s1[i]) = 1:
has_dups = False


Here is the message I got from the system:

Solutions with your approach don't usually use: elif



Please Help me to correct it.

Answers

i dont know the language of the code
probably you have sintacs mistakes in it

has_dups = false
for i in range(len([s1])):
has_dups = has_dups || s1.count(s1[i]) > 1

keeping in mind the role in order of precedence plays in equations, what would excel display as the result of the following equation? (24+75)/(6*3)

Answers

5.5
it is not equation

What object type would you use to identify the address of the neighbouring gateway from your local gateway?

Answers

You would use a gps or a map
You would use a route map

Smoke testing might best be described as
A) bulletproofing shrink-wrapped software
B) rolling integration testing
C) testing that hides implementation errors
D) unit testing for small programs

Answers

B) rolling integrated testing

Rolling integration testing is perhaps the best way to define smoke testing. The correct option is B.

Software testing known as "smoke testing" tries to confirm that the most important features of an application or system are functioning properly following a fresh build or deployment.

It is frequently done early on in the testing process to find serious problems or test-stoppers that might hinder further testing.

Smoke testing most closely resembles the idea of rolling integration testing in the context of the alternatives provided.

The technique of continuously integrating and testing modules or components as they are introduced to the software or system being built is known as rolling integration testing.

It makes that there are no significant flaws introduced and that the new features seamlessly connect with the existing parts.

Thus, the correct option is B.

For more details regarding smoke testing, visit:

https://brainly.com/question/32136027

#SPJ2

Acceptance tests are normally conducted by the
A) developer
B) end users
C) test team
D) systems engineers

Answers

The answer is D. System engineers

B: End Users

That is the correct answer

Which of the following is an approach to debugging?
A) backtracking
B) brute force
C) cause elimination
D) code restructuring
E) a, b, and c


Answers

C) cause elimination

The following is an approach to debugging:

A) backtracking

B) brute force

C) cause elimination

There are different approaches to debugging a Software Applications, these are:

Brute Force Method: This method commonly used but it has the least efficiency for isolating the cause of a software error.Back Tracking Method: This method is commonly used for small applications.Cause Elimination: The approach involves induction or deduction.

Find out more at: https://brainly.com/question/23959780

A(n) ____ is a front-end processor that multiplexes the traffic from hundreds of remote terminals into one port on a large computer.

Answers

I think it'd be terminal concentrator.  A(n) terminal concentrator is a front - end processor that multiplexes the traffic from hundreds of remote terminals into one port on a large computer. 

In the original ARPANET, _______ were directly connected together.
A) IMPs
B) host computers
C) networks
D) routers

Answers

Instant Payment Services IMPS is a cell phone international fund transfer service. It is being expanded via other channels such as ATMs and Internet banking.

This one is a strong service that lets funds be transferred instantaneously between banks in India, which is not only safe but also cost-effective.Throughout banking hours, fund transfers are made using NEFT and RTGS. It differs from NEFT and RTGS in that it is accessible 24 hours a day, 365 days a year, including bank holidays.

Therefore, the final answer is "Option A".

Learn more:

brainly.com/question/24554364

i have a couple of questions on java for my homework

21229

Assume the availability of a method named makeLine that can be passed a non-negative integer n and a character c and return a String consisting of n identical characters that are all equal to c. Write a method named printTriangle that receives two integer parameters n andk. If n is negative the method does nothing. If n happens to be an even number, its value is raised to the next odd number (e.g. 4-->5). Then, when k has the value zero, the method prints a SYMMETRIC triangle of O's (the capital letter O) as follows: first a line of n O, followed by a line of n-2 O's (indented by one space), and then a line of n-4 O's (indented by two spaces), and so on. For example, if the method received 5,0 (or 4,0) it would print:
OOOOO
OOO
O
Note: in the above output , the first line contains 0 spaces before the first O, the next line 1 space, and so on.
Note: These instructions state what the method does when k is zero, but it is up to you, the programmer, to determine what it does when k is not zero and use it for your advantage.
The method must not use a loop of any kind (for, while, do-while) to accomplish its job. The method should invoke makeLine to accomplish the task of creating Strings of varying lengths.

20861

A palindrome is a string that reads the same forwards or backwards; for example dad, mom, deed (i.e., reversing a palindrome produces the same string ). Write a recursive, boolean -valued method , isPalindrome that accepts a string and returns whether the string is a palindrome.
A string , s, is a palindrome if:

s is the empty string or s consists of a single letter (which reads the same back or forward), or
the first and last characters of s are the same, and the rest of the string (i.e., the second through next-to-last characters ) form a palindrome.

20864

A 'array palindrome' is an array which, when its elements are reversed, remains the same (i.e., the elements of the array are same when scanned forward or backward) Write a recursive, boolean -valued method , isPalindrome, that accepts an integer -valued array , and a pair ofintegers representing the starting and ending indexes of the portion of the array to be tested for being a palindrome. The function returnswhether that portion of the array is a palindrome.
An array is a palindrome if:

the array is empty (0 elements ) or contains only one element (which therefore is the same when reversed), or
the first and last elements of the array are the same, and the rest of the array (i.e., the second through next-to-last elements ) form a palindrome.

Answers

In C, strings aren't a data type. Strings are handled as an array of char (acters). Therefore, your two palindrome assignments are basically the same.

Recursion is something that is probably the most mind warping thing to learn in programming, but it is VERY well worth it. There's a number of problems that are recursive in nature. One that you're familiar with is doing addition with pencil and paper.  Think about it: you align the numbers in columns as you're "going in", when you run out of numbers, the base case, you start adding the column of numbers and the carry and write out the least significant digit of the total and returning the most significant digit[s] up the "unwind".

How many passwords can be created in the form [a - z][a - z]9[0, 1]6? that is, a capital letter followed by 9 lowercase letters followed by 6 bits.?

Answers

no capital letters expected
26 * 26^9*2^6 = 9034694121816064

How should traffic flow be captured in order to best understand traffic patterns in a network?

Answers

an areal view of the city (captured by drone or helicopter) or by a 3-D map.

Below is a list of 32-bit memory address references, given as word addresses.
3, 180, 43, 2, 191, 88, 190, 14, 181, 44, 186, 253 5.2.1

a) For each of these references, identify the binary address, the tag, and the index given a direct-mapped cache with 16 one-word blocks. Also list if each reference is a hit or a miss, assuming the cache is initially empty.

b) For each of these references, identify the binary address, the tag, and the index given a direct-mapped cache with two-word blocks and a total size of 8 blocks. Also list if each reference is a hit or a miss, assuming the cache is initially empty.

Answers

Final answer:

This problem requires converting decimal memory addresses to binary, identifying the tag and index for a direct-mapped cache, and determining hits and misses for each reference.

Explanation:

Cache memory operations and management are central to the performance of computer architecture. This problem involves understanding how the direct-mapped cache works, converting decimal addresses into binary, and determining cache hits and misses.

Part a)

In a direct-mapped cache with 16 one-word blocks, the memory address is split into tag and index. The index needs 4 bits (since there are 16 blocks, and 2^4 = 16) and the remaining higher order bits are the tag. A cache hit occurs if the current address's tag matches an address's tag already stored in the cache with the same index. Initially, the cache is empty, so the first reference will always be a miss.

For example, the word address 3 in binary is 00000000000000000000000000000011. With the least significant 4 bits as the index (0011), the tag would be the remaining bits (all zeros here). As the cache starts empty, this would be a miss. As references are processed, some will be hits if their tags and indices match any previously stored addresses.

Part b)

For a direct-mapped cache with two-word blocks and a total of 8 blocks, we have to take into consideration that each block now stores two words. The index field will now have 3 bits (since 2^3 = 8). Since the block size is two words, the lowest order bit of the address is used to determine the word within a block, and this bit is not part of the index.

As a result, the memory addresses will have their last bit ignored for the index and tag calculation (e.g., word address 3 becomes binary 11, and after dropping the least significant bit for the block offset, we are left with an index of 1 (binary 01) and the rest as the tag). Starting with an empty cache, each address will result in a miss initially and then we'll determine hits or misses based on whether the cache already has the block with the same tag and index.

Antel and imd both produce similar computer chips and the two companies dominante this

Answers

Answer:

Because it will restrict the supply of computer chips

Explanation:

Antel and imd both produce similar computer chips and the two companies dominante this

Because they can both charge more for the product at the given level of production

Because it will restrict the supply of computer chips

Because overall demand for computer chips will increase

Because the firms' marginal costs increase as output increases

As both companies have the total supply of the product in the market they can dominate everything that they are providing because of this, they cab restrict the supply of the computer chips, if they cooperate and work together they can set a minimum price and a ceiling price, they can dictate how the market flows, because of that, the price of the computer chips will depend solely on them.

A circuit has a voltage of 24 V and a current of 40 mA. What is the power of the circuit?

A. 6 W
B. 9.6 W
C. 6.24 W
D. 0.96 W

Answers

Hi! There is a relation between voltage, current, and power. It's very simple, too! It's voltage multiplied times current.
[tex]P=IV[/tex]
or [tex]VI=P[/tex] might be easy to remember because V.I.P. (like V.I.P. stadium seating)

Then you just have to work with units to get watts. Watts is volt-amps.

You can convert at any point to get watts as the unit. I'll turn the current to amps first.
[tex]40\text {mA}\cdot\frac{1\text A}{1000\text{mA}}=0.040\text A[/tex]
Then, multiply [tex]VI=P[/tex]
[tex]24\text V\cdot0.040\text A=0.96\text V\cdot\text A = 0.96\text W[/tex]

When mapping a drive, you can type in the path to the shared folder on the host computer. what is the syntax for the path?

Answers

For SMB:  \\server\path\to\share
For CIFS: //server/path/to/share

Which of the following strategic issues needs to be addressed in a successful software testing process?
A) conduct formal technical reviews prior to testing
B) specify requirements in a quantifiable manner
C) use independent test teams
D) wait till code is written prior to writing the test plan
E) both a and b

Answers

The strategic issues that should be addressed for a successful software testing process include the conducting of a formal technical reviews prior to testing and specifying the requirements in a quantifiable manner.

The test strategy has to do with the testing approach of the development cycle of the software and its aim is to ensure that the objectives of the software are met.

It should be noted that using independent test teams and waiting till the code is written prior to writing the test plan doesn't need to be addressed in a successful software testing process.

Therefore, the correct option is E since both option and B are correct.

Read related link on:

https://brainly.com/question/13262403

Why are words like monkey, smile, and freedom not good to use as passwords??

Answers

Because those type of words are very simple to figure out so what you need is a more complex password like with number and symbols

By collecting software metrics and making use of existing software reliability models it is possible to develop meaningful guidelines for determining when software testing is finished.
A) TRUE
B) FALSE

Answers

B) False, bug testing and updates are always needed.

Devices may be arranged in a _____ topology.
A) mesh
B) ring
C) bus
D) all of the above

Answers

Answer:

ring

Explanation:

Devices can be arranged in different network topologies such as mesh, ring, and bus. The correct answer is D) all of the above.

Devices may be arranged in various network topologies such as mesh, ring, and bus. Each of these topologies has its unique structure:

Mesh topology: In this setup, each node is connected to every other node, providing a high level of redundancy and reliability.Ring topology: Each node is connected to two other nodes, forming a closed loop which allows data to travel in one direction or both directions efficiently.Bus topology: All devices are connected to a single central cable, known as the bus, making this a straightforward and cost-effective setup.All of the above: This means that devices can indeed be arranged in any of these topologies.

The correct answer is D) all of the above, as devices can be arranged in any of these network topologies.

Which topology requires a central controller or hub?
A) Mesh
B) Star
C) Bus
D) Ring

Answers

I Think it is Topology of star but I am not sure.

Each component of a network is connected to a central node, frequently referred to as a hub or switch, in a star architecture. Thus, option B is correct.

What topology requires a central controller or hub?

A benefit of star topologies is that just the central site needs to be modified, making it simple to add new sites. The centre site is crucial in a star topology; if it fails, all connections would be lost. The connection's performance is determined by how well the central hub functions.

A star network is a local area network (LAN) topology in which all nodes, such as personal computers (PCs), workstations, or other devices, are directly connected to a single common hub, which is frequently referred to as a central computer. As a result, a hub-and-spoke network structure is another name for a star network.

Therefore, Star topology requires a central controller or hub.

Learn more about topology here:

https://brainly.com/question/10536701

#SPJ2

well maintained websites may have an unmaintaned page that has not been updated

Answers

Yes, and no, some sites do have these, but ones that are developed by many teams of people and are updated constantly, do not have unmaintained and incomplete pages. 

What two tasks need to be done after installing a secondary hard drive?

Answers

Make sure everything is connected, then turn it on and see if it works.

Regression testing should be a normal part of integration testing because as a new module is added to the system new
A) control logic is invoked
B) data flow paths are established
C) drivers require testing
D) all of the above
E) both a and b

Answers

Regression testing should be a normal part of integration testing because as a new module is added to the system new control logic is invoked and data flow paths are established.

What is regression testing?

Regression testing is a software testing practice which ensures that an application is still functioning as it need to or expected after making any code changes or improvements. Regression testing checks for the overall stability and functionality of the existing features of the software.

Now, the Regression testing is integrated with the software so that if any changes are made, new control logics are automatically invoked and data flow path is established.

Thus, the correct option is E. i.e. both A and B.

Learn more about regression testing.

https://brainly.com/question/13327687

#SPJ2

Word typically provides how many types of main documents.

Answers

it provides 5 documents
Other Questions
page 128 slopes and intercepts From what play is the speech "all the world's a stage"? all's well that ends well as you like it a midsummer night's dream romeo and juliet Which of the following statements is an example of sarcasm? A.Jon says his wife is the most beautiful woman in the world. B."You could've knocked me over with a feather," Ava exclaimed. C."That geometry final wasn't exactly a walk in the park," Zach said. D."Oh, goody," Tina said grumpily, "canned spinach again." i am the only number between 41 and 49 that has 5 as a factor. what number am i? . Planet A is an inner planet with no moon and hardly any atmosphere. Planet B is an inner planet with no moon but with a dense atmosphere. Which pair of planets is being described?A.mars and venusB.mercury and earthC.mercury and venusD.mars and earth Which of the following is not a valid postulate or theorem for proving triangles congruent? A. SSA B. ASA C. AAS D. SAS how can you make a solution saturated A model spaceship costs $15.99 before tax. The tax on the model spaceship is 8%. What is the total cost of the model spaceship? Round your answer to the nearest cent. Enter your answer in the box. Hi! Please help... a woman drops a front door key to her husband from their apartment window several stories above the ground. the function h=-16t^2 +64 gives the height h of the key in feet, t seconds after she releases it.A/ how long does it take the key to reach the ground?B/ what are the reasonable domain and range for the function h? ...? 30 of the earth is made up of what You missed breakfast and now it is lunch time and you aren the middle of an expieriment. What safety precautions should you employ to satisfy your hunger?A- Pause your experiment and wash your hands before eating a snackB- Handle your food with a chemical barrierC- Finish your experiment, wash your hands, and leave the labD- Use a fork or spoon to safely handle your food Which of the following accurately explains how Section 4 of the 25th Amendment could be applied to remove the president from office?A.Congress must draft a letter to the president explaining why he is being removed from office.B.Congress must draft a letter to the vice president explaining why the president is unfit for office.C.The vice president or members of the cabinet must submit a letter to Congress explaining why the president is unfit for office.D.The vice president must notify the presidents cabinet members and the Supreme Court that he will be assuming the office of the president. Name the property of 11xn=1 In ancient Sparta, to make the boys tough, their daily physical training includes having to go barefoot, and whatever the weather, they only have one piece of clothing to wear.True or false? The number of times that a wave vibrates in a unit of time is calledA. amplitudeB. frequencyC. wavelengthD. interference ...? The des moines register recently reported the ratings of high school sportsmanship as complied by the iowo high school athletic association. For each school, the participants and coaches were rated by referees, where 1= superior, and 5= unsatisfactory. A regression analysis of the averages scores given to football players and coaches is shown below.interpret the value of the correlation between the ratings of coaches and participants. what two objects have stored energy? A. ball rolling on the ground B. a small rock sitting on top of a big rock C. a stretched rubber band D. a stone lying on the ground The gap between ingenuity and morality grows wider because the pace of technology is increasing at such an incredible speed. Question 1 options: A) True B) False State 10 modern history events from 1350-1801 Which answer shows these decimals written in order from greatest to least? 46.95 48.1 46.581