Difference b/w srs and functional specifications? what are the approaches u'll follow while integrating the modules
2 11854what is the difference between the severity and priority and tell me high severity and low priority ,low severity and high priority ,high severity and high priority ,low severity and low priority
3 10524Post New L&T Manual Testing Interview Questions
. Give the C language equivalents of the following a)Function returning an int pointer b)Function pointer returning an int pointer c)Function pointer returning an array of integers d)Array of function pointer returning an array of integers
Hi, In source I have records like this No name address 10 manoj mum 10 manoj dilhi 20 kumar usa 20 kumar Tokyo I want records in target like shown below No name addr1 addr2 10 manoj mum dilhi 20 kumar usa Tokyo If it is reverse we can do this by using Normalizer transformation by setting occurance as 2. Somebody will say use denoralization technique. But as of my knowledge I couldn’t find any denormalization technique. Is there any concept like that? I tryid this seriously but I could find any idea to implement this. Can any one please help me ? Advance Thanks
How do I repair microsoft edge?
How will you delete a directory?
who introduced sql?
How to Create the HWC file with 2+2+2, 4+8, 6+6 Configuration (manually Cabling)
Can you explain any three-shift pattern matching techniques?
I am having major problems with some DB Table Checkpoints I add to my script. I 35 web based applications recorded and each has DB Table Checkpoints insert but only 1 script isn't recognizing the DB Table Checkpoints for some reason. I've checked the DB connections and the info in the Library Functions and still only this one script out of 35 doesn't recognize the DB Table Checkpoints. Can someone please help me figure out why only this one script out of 35 that's hitting the same database is having a problem.
Define the difference between a stable versus an unstable controlled system and some of the tools you might use to be able to detect when this is happening and assumptions used for control system application design that could contribute to instability
What is the login shell?
Why ctype h is used in c++?
How can you configur the log cleaner?
How much memory is taken by Distributed cache?
How can we share data between controllers?
what are the minimum requirements for statr testing?