Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
What tasks do checkpoints perform in QTP?
Checkpoints in QTP are used to verify information which is expected to be displayed when running test. Following are 8 types of available checkpoints:
a.) Page - checks application characteristics
b.) Text - verifies that text strings are displayed at proper locations in the application
c.) Object - checks values of application objects
d.) Image - checks values of application images
e.) Table - verifies information in an application table
f.) Accessibility - checks web page for compliance with Section 508
g.) XML - verifies contents of XML data files or documents that are part of the application
h.) Database - verifies contents of databases accessed by the website
encoded micro instruction vs unecoded micro instruction
Q. Consider the program given below void main() { int i,j,k; readln (i,j,k); if( (i k) ) { writeln("then part"); if (j writeln ("j
What are the objectives of testing? i. Testing is a process of implementing a program with the intend of finding an error. ii. A good test case is one that has high probabi
Question: (a) Name two agent-oriented programming languages. (b) Distinguish between communication protocols and interaction protocols for agent systems. Give two example
Q. What is requirement elicitation methods? Subsequent to receiving the problem statement from the customer the first step is to arrange a meeting with the customer. During the
What is architectural transformation? This is a more radical approach to software change then maintenance as it involves making significant changes to the architecture of the s
of elicitation methods
how to get values from list
What is a state transition diagram? State transition diagram is mainly a collection of states and events. The events cause the system to change its state. It also shows what ac
After users are authenticated, what measures can be employed in order to maintain security when users are away from their computers? 2. Discuss ways in which the use of strong au
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd