Which Company in India is best for Mobile Application
Development?
Answers were Sorted based on User's Feedback
Answer / herrypt
I found kryptonsoft is the company in india having best
outsourcing development centre. My experience with them was
very good. They have expertise in almost every mobile
application development platform. I developed with them my
iPhone app, and then i asked them to port it to BlackBerry,
Windows Mobile, Android and iPad. They really are best than
best.
Source(s):
http://www.kryptonsoft.com
http://www.kryptonsoft.com/outsourcing/mobile-development-
india
http://www.kryptonsoft.com/outsourcing/iphone-application-
development-india
http://www.kryptonsoft.com/outsourcing/windows-mobile-
development-india
http://www.kryptonsoft.com/outsourcing/blackberry-
development-india
| Is This Answer Correct ? | 2 Yes | 0 No |
Answer / sanjeev kumar
Hey..great to see you, we also develop iPhone Apps. If you
have any project for outsourcing, please contact us at http://
www.kryptonsoft.com
it's really amazing
Company For Application Development
Krypton Softwares
| Is This Answer Correct ? | 3 Yes | 2 No |
You are a contract project manager working with the State of Bliss. Your latest project involves rewriting the Department of Revenue's income tax system. As project manager, you have taken all the appropriate actions regarding confidentiality of data. One of the key stakeholders is a huge movie huff, and she has the power to promote you into a better position at the conclusion of this project. She's reviewing some report data that just happens to include confidential information regarding one of her favorite movie superstars. What is the most appropriate response? A. Report her to the management team. B. Request that she immediately return the information, citing conflict of interest and violation of confidential company data. C. Do nothing as she has the proper level of access rights to the data and this information showed up unintentionally. D. Request that she immediately return the information until you can confirm that she has the proper level of access rights to the data.
What is raid in project management?
Intellectual property includes all of the following except: A. Software B. Patents C. Hardware D. Business processes
The primary function of the Closing process is to: A. Formalize lessons learned and distribute this information to project participants B. Perform audits to verify the project results against the project requirements C. Formalize project completion and disseminate this information to project participants D. Perform post-implementation audits to document project successes and failures
You are a project manager for the information technology division of a local satellite TV broadcasting company. This spring, the chief information officer for your company gave you the project to convert and upgrade all the PCs in the department to the latest release of a specific desktop application. Prior to this conversion, all manner of desktop software existed on machines throughout the company and had caused increasing problems with sharing files and information across the company. A lot of unproductive hours were spent typing information into several formats. This project came about as a result of which of the following? A. Technological advance B. Business need C. Customer request D. Legal requirement
You have been asked to submit a proposal for a project that has been put out for bid. Prior to submitting the proposal, your company must register so that their firm is on the qualified seller list. Which of the following is true? A. The qualified seller list provides information about the sellers and is a tool and technique of the Solicitation process. B. The qualified seller list provides information about the project and the company that wrote the RFP and is an input to the Solicitation process. C. The qualified seller list provides information about the project and the company that wrote the RFP and is a tool and technique of the Source Selection process. D. The qualified seller list provides information about the sellers and is an input to the Solicitation process.
Lessons learned are used for all of the following except: A. To provide historical information that you can review during your next project B. To document employee performance C. To identify successes and failures on the project D. To record the causes of performance variances
Your selection committee is debating between two projects. Project A has a payback period of 18 months. Project B has a cost of $125,000 with expected cash inflows of $50,000 the first year and $25,000 per quarter after that. Which project should you recommend? A. Either Project A or Project B because the payback periods are equal B. Project A because Project B's payback period is 21 months C. Project A because Project B's payback period is 24 months D. Project A because Project B's payback period is 20 months
The amount of authority a project manager possesses can be related to: A. The project manager’s communication skills B. The organizational structure C. The amount of authority the manager of the project manager possesses D. The project manager's influencing skills
You have been hired as a contract project manager for Grapevine Vineyards. Grapevine wants you to design an Internet wine club for their customers. Customers must pre-register before being allowed to order wine over the Internet so that legal age can be established. You tested using data from Grapevine's existing database. This new module cannot be tested until the data from the existing system is loaded. This is an example of which of the following? A. Preferential logic B. Soft logic C. Discretionary dependency D. Hard logic
Your procurement department has obtained independent estimates. The vendor's proposal is substantially different than the independent estimates. All of the following are true except: A. The SOW was not detailed enough. B. The vendor failed to respond according to the terms of the proposal. C. The vendor failed to respond to all items in the SOW. D. The vendor failed to respond to all items in the contract.
Describe the risk in software engineering.