Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
What tasks do checkpoints perform in QTP?
Checkpoints in QTP are used to verify information which is expected to be displayed when running test. Following are 8 types of available checkpoints:
a.) Page - checks application characteristics
b.) Text - verifies that text strings are displayed at proper locations in the application
c.) Object - checks values of application objects
d.) Image - checks values of application images
e.) Table - verifies information in an application table
f.) Accessibility - checks web page for compliance with Section 508
g.) XML - verifies contents of XML data files or documents that are part of the application
h.) Database - verifies contents of databases accessed by the website
Write definition of ERD? Entity Relationship Diagram shows the graphical presentation of the object relationship pair. It is above all used in database applications.
Indexing: The CDS/ISIS package indexes all fields selected for indexing into a single file. This file is known as 'inverted file'. There are indexing techniques for building i
What is meant by Throw away Prototyping? Giving the user a system which is incomplete and then augmenting and modifying it so that user requirements become clear. The obj
What is software measure? A software measure is a mapping from a set of objects in the software engineering world information a set of mathematical construct like numbers or ve
Incremental testing is fractional testing of an incomplete product. The aim of incremental testing is to give an early feedback to software developers.
What is Relationship Entities are associated to each other by relationships. It denotes how two entities are associated. A diamond notation with name of relationship signifi
What is Test phase? Ans) The time period in the software life cycle in which the parts of a software product are evaluated and integrated, and the software product is evaluated
What is cycle stealing DMA operation? Cycle Stealing: In this process, the DMA controller transfers one data word at a time, after which it must return control of the buses to
State about the Elementary Modeling Techniques A model illustrating bare minimum requirements is known as Essential Model. It has two components: a) Environmental model B)
Q . Discuss the important issues that a SRS must address. Ans. SRS is the method of establishing the services the system should provide of the system in new it is difficult
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd