__________ programming is a form of design intended to ensure the continuing function of a piece of software in spite of unforeseeable usage of the software.

Answers

Answer 1
Answer: Defensive programming
Answer 2
Answer:

Final answer:

Resilient Software Design is the technique of designing software to maintain function despite unanticipated usage situations or errors. It includes mechanisms for recognizing, isolating, and addressing failures.

Explanation:

The type of programming referred to in the question is Resilient Software Design. This design methodology focuses on developing software that can maintain its function even when unforeseen circumstances or exceptional conditions occur during its usage. Resilient software is programmed to adapt, recover and continue functioning despite any anomalies or errors, thus ensuring stable and continuous operation. For instance, if certain parts of the system fail, the software should be able to identify the issue, isolate the faulty components, and reconfigure itself to continue operating with minimal disruption.

Learn more about Resilient Software Design here:

brainly.com/question/32592557

#SPJ11


Related Questions

Which of the following is NOT one of the MOST common uses of Twitter? Posting the idea of the moment, Making 4 contacts, Sharing web links, Or Organizing a political gathering?
What do you do when you have computer problems? Check all that apply. PLEASE HELP
If an Administrator performs a clean install of Windows Server 2012 R2 on a new server, and then moves critical domain services over from an older server, what type of upgrade is being performed?
The Top status bar command is used to display the highest value in the selected range in the AutoCalculate area. (True/False)
The basic premise of ___________is that objects can be tagged, tracked, and monitored through a local network, or across the Internet.

You can use a what to test tread wear on your tires

Answers

To test the tread wear on tires you can use a Penny or a Quarter! :)

An malicious attempt to acquire sensitive data like usernames, passwords, and credit card information using email is called?a. Trojan
b. Virus
c. Phishing
d. Hopscotch

Answers

When someone wants to steal personal information like usernames, passwords, or even credit card information, that is called Phishing.

Computer trespass can be harmless.
a. True
b. False

Answers

I think The answer is true
They can be harmless sometimes

Each time the ENTER key is pressed, Word creates a new paragraph. T/F

Answers

when you hit enter key you will create new paragraph so answer is true

Where do endnotes appear in a document? at the bottom of the page at the top of the page at the end of the document at the end of a section in a document

Answers

it appears at the end the paper.

MacBook Pro (2019) at 93% max capacity battery rating after 100 charge cycles. Is this normal? Used coconut battery to check this.

Answers

Answer:

This is not a normal situation. Go to Apple Support!!!

1,000 battery cycles

Most current Macs (MacBooks, MacBook Airs, and MacBook Pros) use batteries assessed as having 1,000 battery cycles. That's pretty much good enough for at least three years of regular use.

Your battery might drain fast when you're working on your Mac because, for one reason or another, you're running one-too-many apps at the same time. ... To do this, simply click on the battery icon on the top right corner of your screen, or run the activity monitor app.

Use this website for more ways to fix your computer:

https://pdf.wondershare.com/macos-10-14/fix-battery-issue-on-macos-10-14.html

I say it depends if you got the computer at the beginning of the year. If you got it later in 2019, go to the apple store and ask.