how we conduct security testing in realtime,for every project we conduct security testig or not
1 6929How would you do the ollowing Security Testing for web application? 1) Authentication. 2) Authorization. 3) cookies. 4) penetration testing. 5) session testing. 6) encryption and decryption testing
1 4845How to write test case for view the table(i.e it is already stored in database and see the content in the table)
2511If PRS is given to you on say XYZ functionality then which different types of testing you will perform . Please arrange these types in sequential manner in which you will perform?
1 5895Post New TCS Manual Testing Interview Questions
For the following COBOL code, draw the Binary tree? 01 STUDENT_REC. 02 NAME. 03 FIRST_NAME PIC X(10). 03 LAST_NAME PIC X(10). 02 YEAR_OF_STUDY. 03 FIRST_SEM PIC XX. 03 SECOND_SEM PIC XX.
What is remote data?
Which tag specifies a key pair generator field in a form?
What is the shortcut to copy format in excel?
How do I start wls and configure jms?
how does high earth to neutral voltage affect electronic equipment?
How do you convert a docx file to jpeg?
Explain About Iunknown interface Queue
how you can move Magento to another Directory?
What is selection in an algorithm?
Is there any performance difference between if exists (select null from table) and if exists (select 1 from table)?
What are the types of collision resolution strategies in open addressing?
What are the object and class classes used for?
How to configure the backup for azure vms and on-prem vms?
What is ngrx?