Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
What tasks do checkpoints perform in QTP?
Checkpoints in QTP are used to verify information which is expected to be displayed when running test. Following are 8 types of available checkpoints:
a.) Page - checks application characteristics
b.) Text - verifies that text strings are displayed at proper locations in the application
c.) Object - checks values of application objects
d.) Image - checks values of application images
e.) Table - verifies information in an application table
f.) Accessibility - checks web page for compliance with Section 508
g.) XML - verifies contents of XML data files or documents that are part of the application
h.) Database - verifies contents of databases accessed by the website
Define query language? A query is a statement requesting the retrieval of information. The portion of DML that includes information retrieval is known as a query language.
What is Requirement Traceability? Explain its importance. Requirement Traceability is mapping of needs to test cases. There are two major traceability: Forward and Backward. It
What does the insert statement in extract datasets do? It describes the fields of a field group.
Sanity testing is performed whenever cursory testing is sufficient to show the application is functioning according to specifications. This level of testing is a subset of regressi
Define Data objects, attributes & relationship. Data object: Illustration of any composite information that must be understood by a software. It can be any external entity. Att
(a) Copying a graphic image from the Web can be as easy as pointing to it and clicking the right mouse button or performing a screen capture. The question is, under what circumsta
Q. Show the Advantages of Re-Engineering? 1) Reduced risk - there is a elevated risk in new software development. There possibly staffing problems, development problems and spe
State some guidelines for testing The below are some guidelines for testing: i) Test modules thoroughly, cover all the access paths and produce enough data to cover all the
Question: (a) What is a piconet in a Bluetooth context? (b) Discuss the concept of Master, slave, stand-by and parked devices with respect to a Bluetooth piconet. (c)
Ask What are the key elements of Business Model? question #Minimum 100 words accepted#
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd