One build is delivered. in that build button name is submit. but in the next buit that name of the button changed as login.are u continue with previous recorded script or u make any changes?6 4818
we are submitting data one form to another form.defaultly it is time period set as 5sec. but it is taken 15sec what to do5 5859
how to get the object property4 5245
what happen in object repository(shared)if we call an existing action from an external action ? and what happen in object repository(peraction)if we call an existing action from an external action ?2 11990
How to Test the mainframe application?(tell me few basic things)1 15238
we have a link in a website or webtable How can we record link in that table or site? link is not static we don't know exact location of that link? how ? if u know pls give reply with script also?6 10878
we have one text box and one list box(list box appear in same page or another page) what ever the text enter in text box that must be displyed in list box as first one. for example if we enter 10 in text box that is the 1st item in list box . after that we enter 11 then 11 is the 1st item and 10 is 2nd item. the maximum limit of list box is 10 items. if we enter 11th item the 10th item is deleted and llth one is add as 1st one and 9th one goes to 10th position3 4287
which checkpoint we use to validate yahoo login screen window after login with ur id and password in qtp8 7577
what is main diff of qtp8.2 and qtp9.0?1 2427
what are the frame work models of qtp?which frame work you follow in your company?and explain it process?1190
If an application name is changing frequently i.e while recording it has name “Window1” and then while running its “Windows2” in this case how does QTP handle?7 7622
you are recording on "WINDOW 1", say it has a link if you click on that, that leads you to "WINDOW 2". If you do any manipulations on "WINDOW 2" that are automatically updated in to "WINDOW 1". But "WINDOW 1" is currently invisible. But the updations in "WINDOW 1" must also be recorded as a script in QTP. The best Example is if you update your resume in JOB STREET portal it actually happens in other window, but the previous window is automatically updated. Now does QTP help you in this types of situations? Any body can answer this question. please..... Siva737
why we use visible spectrum for FSO (free space optic),although it seems strange that when we have to communicate in urban areas then too much light will be in atmosphere for the sake of communication.
what is pool waiting time prameters?
How to send a response early in a web application action?
Can we integrate the C programming with Pro-e (modelling software)through application program?
how meny typs of renging rod?
Create a registration form application by taking the details like username, address, phone number, email with password and confirm password (should be same as password).Ensure that the password is of 8 characters with only numbers and alphabets. Take such details for 3 users and display the details. While taking input password must appear as “****”.
in cvt,there are two windings,1a,1n and 2a,2n.in my one project i use only one winding i.e.1a,1n. the other winding is not in use, so i connect it in open delta and want to close it by ibsertibg thermal resistor. the output of cvt is 132kv/115/sqrt3. plesae tell me exact value of resistor, so i may close it to avoid the resonance phenomenin. send me answer on this email adress please. firstname.lastname@example.org
is all the test cases to be automized !!! if yes / no let explain the reason
I am experienced with house and industrial wiring but I don't have any licence how can I apply an licence and which type of licence i can get i didn't complete deee just only experience
Can we use target hash file as a lookup ?
In cryptography, you could often break the algorithm if you know what was the original (plain) text that was encoded into the current ciphertext. This is called the plain text attack. In this simple problem, we illustrate the plain text attack on a simple substitution cipher encryption, where you know each letter has been substituted with a different letter from the alphabet but you don’t know what that letter is. You are given the cipherText as the input string to the function getwordSets(). You know that a plain text "AMMUNITION" occurs somewhere in this cipher text. Now, you have to find out which sets of characters corresponds to the encrypted form of the "AMMUNITION". You can assume that the encryption follows simple substitution only. [Hint: You could use the pattern in the "AMMUNITION" like MM occurring twice together to identify this]
1.can i use super keyword in normal class(not inheritance) to call any method?if so how can i call particular variable? 2.In the inheritance how can i access the particular variable from the base class(it containing 5 variables) using super keyword?
What is the procedure for publication of research papers in Indian Journals & foreign Journals?Is it possible if any of the authority of that Research Journal publish my research paper by his name?In that case how to be safe from these malpractices?
A problem in a search space Is defined by, a) Initial state b) Goal test c) Intermediate states d) All of the above
How we can calculate the life of Lead acid battery