What tasks do checkpoints perform in QTP, Software Engineering

Assignment Help:

What tasks do checkpoints perform in QTP?

Checkpoints in QTP are used to verify information which is expected to be displayed when running test. Following are 8 types of available checkpoints:

a.) Page - checks application characteristics

b.) Text - verifies that text strings are displayed at proper locations in the application

c.) Object - checks values of application objects

d.) Image - checks values of application images

e.) Table - verifies information in an application table

f.) Accessibility - checks web page for compliance with Section 508

g.) XML - verifies contents of XML data files or documents that are part of the application

h.) Database - verifies contents of databases accessed by the website

 


Related Discussions:- What tasks do checkpoints perform in QTP

What are the various types of system testing, What are the various types of...

What are the various types of system testing? 1. Recovery testing - is intended to check the system's ability to recover from failures. 2. Security testing - verifies th

What is process and product quality, What is Process and product quality? ...

What is Process and product quality? The quality of a developed product is influenced by the quality of the production process. This is significant in software development

Cairs library management system , CARS-LMS: In this section let us try...

CARS-LMS: In this section let us try to learn about a different software package, which is commonly used in some of the libraries abroad. The package is known as CAIRS/LMS or

What do you mean by class, Q. What do you mean by class? A class is a t...

Q. What do you mean by class? A class is a template that specifies the properties of objects. Classes have an interface that consists of the operation a body which implements t

State the cocomo model, What is COCOMO model? COCOMO stands for COnstru...

What is COCOMO model? COCOMO stands for COnstructive COst MOdel. It is used for cost Effort=a * KDLOCb Where a and b are two parameters of the model whose specific values

State lehmans first law, State Lehman's First law. A program that is u...

State Lehman's First law. A program that is used in true world environment essentially must change or become progressively less useful in that environment.

What is top-down strategy, What is Top-Down Strategy? Ans) Top down inte...

What is Top-Down Strategy? Ans) Top down integration is basically an approach where modules are produced and tested starting at the top level of the programming hierarchy and re

What are the main approaches in debugging, What are the common approaches i...

What are the common approaches in debugging? Brute force method: The memory dumps and run-time tracks are checked and program with write statements is loaded to get clues to er

Define in brief about the silktest agent, Define in brief about the SilkTes...

Define in brief about the SilkTest Agent SilkTest component which receives testing commands from SilkTest Host and interacts with AUT (Application under Test) directly. SilkT

Define the term software architecture, Define the term "software architectu...

Define the term "software architecture." The software architecture of a program or a computing system is the basic structure of the system, which comprises software components

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd