Requirement Management (61)
Risk Analysis (22)
Estimation Analysis (14)
Planning & Integration (15) Why your company can not complete the project? On your website stand, that you are specialist for Typo3! Do you know sure the website http://experience-drcsystems.de.
1144Why you do not refund the customer his money for the extension? It was agreed, that you pay it back!
1183How to calculate decision table conditions and actions on the following questions. The following specification is given: A railway has four different kinds of accommodation with different ticket prices: Hard seat, soft seat, hard sleeper, and soft sleeper. For hard sleeper, there are different prices for lower, middle and upper berth. For soft sleeper, there is a different price for lower and upper berth. For sleeping accommodation, different prices apply for non-air-condition and aircondition. For soft sleeper, a higher price applies for compartments with own bathroom. High-speed trains exist, but have only hard and soft seat, and they have another price than “normal” trains. How many different valid combinations of inputs exist for computing the price? a) 12 b) 16 c) 18 d) 36
1912What are ‘throwaway’ prototypes and ‘evolutionary’ prototypes? How can production of a prototype be controlled and why is this important?
1099Give a suitable definition of software quality and briefly describe the rationale for your definition.
1016
what are the artifacts maintained for resource planing and management
in automatic payment program if we want to pay for 9 transactions out of 20 then what we have to do plz tell me
what are the disadvantages of selenium IDE..?
How would you finalize the number of resources/testers needed for the testing in the estimation ?
explain the model(s) of co-ordination you experienced for effective delivery of the product
what are the basic artifacts required for QA from development teams start qualification
Highlight four principal dangers that are deemed to be security threats to information systems.answers should include a detailed explanation as to how the threat is a danger to the security of an IS. b. identify 6 software control that can be implemented so as to safeguard information system to ensure that dey perform according to management standards. c. For each software control describe how it safeguard and information system.
explain the methodologies / ways to create the test cases for QA
in SW development who will be the owner of the perticular requirement and what is his responsibilities
HI Friends. this is balu. I am looking for testing job in chennai. If u know anything regarding job information. pls send a mail to me kool.balu@gmail.com
i have array that contain 100 records but i want read 1 to 10 only in cobol?
Give a suitable definition of software quality and briefly describe the rationale for your definition.
what is purchase life cycle IBM maximo
how to track the requirements if all ready it is available for that product
I am sonakshi did MBA in marketing and then SAP sd certification now i am unable to get job yet i have around 2 years of domain ex. what to do?