brief about the methodologies to evaluate weightage of test cases and what are the basic parameters to be considered
2084what is regression testing, how effectively the QA lead / manager can implement this for product qualification
1712what are the differences between product branch qualification as well as product qualification !!! if a product branch supports more than a product then what is the QA strategy towards the same
1542how to calculate defect density rate and what are the retrospective mesures you have experienced / taken to reduce the same
1 8282
Can some one please answer the below interview questions. 1.Cut over activities for fixed assets 2.. Cut over activities for inventory posting 3. If you cut the check in RFFOUS_C program will there be any journal entry updated in fi 4. What are + Pay files & have you worked on + pay files 5. A/R - What is the logic behind lock box to receive payments in SAP.How it is connected to FI / How will system recognize lock box?what will be there in BAI file
what are the responsibilities of integrator
Hi Friends I am learning QTP and in preliminary stage, able to write statements with no addl constraints however i am not able to get a solution if there are two options to be selected from the weblist and also when there are options with radio buttons need your help Thanks
what is purchase life cycle IBM maximo
what happens if we didnt close cursor in a cobol/db2 program
I am looking for interview question / technical questions for veritas netbackup.
how to manage the requirement if it is included after Requirement specifications phase
what are the existing tools for SW planning
Why is it that a single, all – encompassing metric cannot be developed for programme complexity or programme quality?
I recently atten CSTB exam. One of the question is What is disadvantage of Static Analysis tool. Please help me find out answer
Highlight four principal dangers that are deemed to be security threats to information systems.answers should include a detailed explanation as to how the threat is a danger to the security of an IS. b. identify 6 software control that can be implemented so as to safeguard information system to ensure that dey perform according to management standards. c. For each software control describe how it safeguard and information system.
what are the artifacts maintained for resource planing and management
If there are 11 versions of a mapping and if you want to keep the latest version and delete the remaining versions .. how do you do it?
who are the stake holders in reviewing the plann
What are the main objectives of configuration management and version control?