Requirement Management (61)
Risk Analysis (22)
Estimation Analysis (14)
Planning & Integration (15) Highlight four principal dangers that are deemed to be security threats to information systems.answers should include a detailed explanation as to how the threat is a danger to the security of an IS. b. identify 6 software control that can be implemented so as to safeguard information system to ensure that dey perform according to management standards. c. For each software control describe how it safeguard and information system.
2583Use a search engine on "application service provider (ASP)"or other related terms to find what service(s) an ASP provide to its clients who are looking to acquire IT applications.make a note of the name of the ASP and there website address,List a mininmum of six service that are provided by an ASP.
BT,
1 4256determine a minimum of of four advantage that the ASP has over the SDLC option to acquired IT
1 4710i have to attend for an inerview (manual testing) in 4 days.this would be my first interview for this role.i would like to know wht questions are asked frequently in these interviews.i am sure there are lots of people out there with many years of experience.pls help me out guys
1 3671in your organization in what way(phases) s/w is developed and in what way testing will be conducted?
2146what is INFRASTRUCTURE MANAGEMENT and how it is related to database,mainframes,java, overall how can u explain what it is and how much it is useful for fresher in the company bec iam selected for IM training?(basically iam java trained candidate)
2047
IS IT POSSIBLE TO RUN GL IMPORT PROGRAM BY USING API FND_REQUSET.SUBMIT_REQUEST IF IT IS THEN PLZ MENTION THE C.P NAME
is QA expects any level of interaction from development engineer !!!
Host and Agent are the component associated with which tool?
what are the differences between product branch qualification as well as product qualification !!! if a product branch supports more than a product then what is the QA strategy towards the same
sap fico masters explain
I am looking for interview question / technical questions for veritas netbackup.
what is the difference between testing and quality analysis
Is it normal in your company, that you do not pay penalty, if that is agreed in contract?
what is the defference between test specification and test plan?
what are the new trends / methodologies in QA for SW product testing
Highlight four principal dangers that are deemed to be security threats to information systems.answers should include a detailed explanation as to how the threat is a danger to the security of an IS. b. identify 6 software control that can be implemented so as to safeguard information system to ensure that dey perform according to management standards. c. For each software control describe how it safeguard and information system.
Hi Friends... I faced an question in Tcs.But i unable to answer. find the question below.. A root filesytem"c0t0d0s0" caries 100 gb data. in this filesystem. i am having 3 files named a,b,c it caries 20 gb data each. I need to take backup only 3 files a,b,c. How i can take. Note you need to take only 3 files to an single tape having capacity 80 gb. Whats the commad used?
what is INFRASTRUCTURE MANAGEMENT and how it is related to database,mainframes,java, overall how can u explain what it is and how much it is useful for fresher in the company bec iam selected for IM training?(basically iam java trained candidate)
who are the stake holders in reviewing the plann
how to test the application/software without any requirements(like BRD,FRD etc.,) for a new project?