THERE R MORE MNC COMPANIES, LIKE HCL,WIPRO,TCS, LEAVING THOSE COMPANIES WHY DID U COME HERE TO ATTEND INTERVIEW FOR THIS COMPANY
21 51553how to validate the pop up window Example :assume there is an webpage in that webpage we had a button to browser or file to upload . how to validate this button if we click on that botton window should appear else back to the page i need in VB Script Code since i am using QTP for testing
1 5049As u told write Libarary files in QTP. Do u use ever oject repositary 0r spy while writing scripts and for which type of testing u prepared test scripts.
1 3640I heard that 2 0r 3 tier applications can be tested using
Browser in the <
How do I connect to postgresql using putty?
What is transactional replication?
What is recursive function in r?
Which list does not allow duplicates in java?
What are the types of maven repository?
What is batch processing and how to perform batch processing in jdbc?
How do you write your own SerDe?
How we get browser details of clients machine?
What is srs and brs document?
How would you directly trigger javascript in a test?
when i send the request to the JSP page it will print as it is and why? and how to solve this problem please inform me that solution
Explain the difference between .net and c#?
Why we use jquery .each() function?
How do you reference the host of a component?
Assuming one link of the Trojan horse copy-and-observe-later chain is broken. There are two other possible angles of attack by Alice: Alice logging on and attempting to read the string directly, and alice assigning a security level of sensitive to the back-pocket file. Does the reference monitor prevent these attacks?