brief about the methodologies to evaluate weightage of test cases and what are the basic parameters to be considered
2105what is regression testing, how effectively the QA lead / manager can implement this for product qualification
1734what are the differences between product branch qualification as well as product qualification !!! if a product branch supports more than a product then what is the QA strategy towards the same
1568how to calculate defect density rate and what are the retrospective mesures you have experienced / taken to reduce the same
1 8317
what are the major differences in requirement when compared among SW project requirement and Product requirement
what are the artifacts maintained for resource planing and management
compare/different Waterfall and Rapid Application Development(RAD)
Hi Friends... I faced an question in Tcs.But i unable to answer. find the question below.. A root filesytem"c0t0d0s0" caries 100 gb data. in this filesystem. i am having 3 files named a,b,c it caries 20 gb data each. I need to take backup only 3 files a,b,c. How i can take. Note you need to take only 3 files to an single tape having capacity 80 gb. Whats the commad used?
what is the purpose of s.w.Integration in software project
Hi I want to test regarding cookies.. Session should be good for 4 hours and once expired user is returned to login page.. How can i test the session is good for 4 hrs?? Whether i need wait for 4 hours?
How to get the MVFs in workflow
is QA expects any level of interaction from development engineer !!!
As soon as you get a build ,what would you ask your testing team to do?
Why you do not refund the customer his money for the extension? It was agreed, that you pay it back!
what are the parameters to be considered for evaluating Risk analysis
Can we use OPNQRYF command without using OVRDBF command ?
what are the disadvantages of selenium IDE..?
who are the stake holders in accepting the requirement for that project
Highlight four principal dangers that are deemed to be security threats to information systems.answers should include a detailed explanation as to how the threat is a danger to the security of an IS. b. identify 6 software control that can be implemented so as to safeguard information system to ensure that dey perform according to management standards. c. For each software control describe how it safeguard and information system.