Software Development Life Cycle Interview Questions
Questions Answers Views Company eMail

what are the most frequent requirement tracking and management tools available

CA,

1 1649

In new product development what is the source for requirements

CA,

1 1480

how many check points required to freeze the requirements ? what and why ???

CA,

1 1869




what are the atrifacts required to manage the requirement

CA, Elixir,

1117

what are the review standards to accept the requirement specification

CA,

1 1687

who are the stake holders in gathering requirement of a new product

CA,

1026

who are the stake holders in accepting the requirement for that project

CA,

1036

how to manage the requirement if it is included after Requirement specifications phase

IBM,

1183

what are the basic check points before completing the specific requirement for implementation

IBM,

1163

in SW development who will be the owner of the perticular requirement and what is his responsibilities

IBM,

1196

how to track the requirements if all ready it is available for that product

IBM,

1223

what are the major differences in requirement when compared among SW project requirement and Product requirement

Analogue Systems,

1150

which part of the SDLC includes Risk analysis

CA, CarrizalSoft Technologies,

4 7994

what are the parameters to be considered for evaluating Risk analysis

CA,

3952

how to weightage the risk analysis, what are the tools to evaluate !!

CA,

3009







Un-Answered Questions { Software Development Life Cycle }

is review done after testing process? explain

1342


Can we use OPNQRYF command without using OVRDBF command ?

778


Why does the "Null" appear in datastage output in those places where there are spaces?? What is the reason for different number of Null in dev and IST environment??

401


Hi All Can anybody tell me which are the tools used for Build and Release

1304


who are the key stake holders in resource management

2043






Highlight four principal dangers that are deemed to be security threats to information systems.answers should include a detailed explanation as to how the threat is a danger to the security of an IS. b. identify 6 software control that can be implemented so as to safeguard information system to ensure that dey perform according to management standards. c. For each software control describe how it safeguard and information system.

1548


how to weightage the risk analysis, what are the tools to evaluate !!

3009


How to designing a spreadsheet to display the QA basic metrics in Excel?

1454


How to get the MVFs in workflow

1664


what are the existing tools for SW planning

1301


in your organization in what way(phases) s/w is developed and in what way testing will be conducted?

1109


is QA expects any level of interaction from development engineer !!!

1091


in automatic payment program if we want to pay for 9 transactions out of 20 then what we have to do plz tell me

1503


in SW development who will be the owner of the perticular requirement and what is his responsibilities

1196


what are the expectations of QA from unit level testing

1121