New Product Development Interview Questions
Questions Answers Views Company eMail

is there any limitations for holystic estimation

Analogue Systems,

1 3588

please share your learnings in estimation and retrospects towards the same

Analogue Systems,

1896

what are the responsibilities of planner

CA,

1914

what are the responsibilities of integrator

CA,

1860

between which phases the planning phase exists in SDLC

CA,

1859

what are the scope of planning in SDLC

CA,

1982

what are the parameters / dependencies to be considering while planning

CA,

1799

who are the stake holders in reviewing the plann

CA,

1819

whose responsponsibility in SDLC to accept or reject the submitted plan

CA, CarrizalSoft Technologies,

1 4014

what are artifacts generated while planing phase

IBM,

1796

what are the existing tools for SW planning

IBM,

1812

what are the tools required for sw integration

CNC, IBM,

1769

what are the key things to be considered for resource management

2 8800

what are the basic rules have to be followed for successful resource planning

2348

what are "the things" one can consider for resource planing and management

1 2675


Un-Answered Questions { New Product Development }

What are the negative test cases for water bottle?

1942


what is the difference between software development lifecycle and system development lifecycle

2563


what are the basic loop holes in estimation evaluation

2179


explain the model(s) of co-ordination you experienced for effective delivery of the product

1582


what are the tools required for sw integration

1769






all sap abap ale (idoc) interview questions

3267


in automatic payment program if we want to pay for 9 transactions out of 20 then what we have to do plz tell me

1993


brief about the methodologies to evaluate weightage of test cases and what are the basic parameters to be considered

2101


Highlight four principal dangers that are deemed to be security threats to information systems.answers should include a detailed explanation as to how the threat is a danger to the security of an IS. b. identify 6 software control that can be implemented so as to safeguard information system to ensure that dey perform according to management standards. c. For each software control describe how it safeguard and information system.

2177


Is it normal in your company, that DRC System do not complete projects?

773


what are the disadvantages of selenium IDE..?

1123


How you test a Pen?

3041


what are the usual metrics one have to apply for SW improvement projects

1638


Lines of code (LOC) and function point counts (FPC) are two measures of the size of a system. Explain the advantages and disadvantages of using these two metrics for measuring systems.

565


what are the existing tools for SW planning

1812