Estimation Analysis Interview Questions
Questions Answers Views Company eMail

what are the tools available for estimation evaluation

CA, CarrizalSoft Technologies,

1 3674

who does the estimation in perticular SW project

CA, CarrizalSoft Technologies,

2 3081

who is/are the stake holders in accepting the estimation for specific requirement

CA,

1359




what are the common estimation techniques followed

CA, TCS,

1 7695

what are the parameters / dependencies in calculating the estimation

IBM, CarrizalSoft Technologies,

1 2874

what are the basic loop holes in estimation evaluation

IBM,

1606

how to review the estimation, what are the check points

IBM, CarrizalSoft Technologies,

1 3573

what is the best fit phase in SDLC to do the estimation analysis

IBM, CarrizalSoft Technologies,

2 5163




is there any limitations for holystic estimation

Analogue Systems,

1 2533

please share your learnings in estimation and retrospects towards the same

Analogue Systems,

1347

Highlight four principal dangers that are deemed to be security threats to information systems.answers should include a detailed explanation as to how the threat is a danger to the security of an IS. b. identify 6 software control that can be implemented so as to safeguard information system to ensure that dey perform according to management standards. c. For each software control describe how it safeguard and information system.

1525

Use a search engine on "application service provider (ASP)"or other related terms to find what service(s) an ASP provide to its clients who are looking to acquire IT applications.make a note of the name of the ASP and there website address,List a mininmum of six service that are provided by an ASP.

BT,

1 2675

determine a minimum of of four advantage that the ASP has over the SDLC option to acquired IT

1 2901

you have given estimation to your customer for 15 days and later it requires more days then how will u handle this situations...

Global Logic,

1367


Post New Estimation Analysis Questions






Un-Answered Questions { Estimation Analysis }

you have given estimation to your customer for 15 days and later it requires more days then how will u handle this situations...

1367


Highlight four principal dangers that are deemed to be security threats to information systems.answers should include a detailed explanation as to how the threat is a danger to the security of an IS. b. identify 6 software control that can be implemented so as to safeguard information system to ensure that dey perform according to management standards. c. For each software control describe how it safeguard and information system.

1525


what are the basic loop holes in estimation evaluation

1606


who is/are the stake holders in accepting the estimation for specific requirement

1359


please share your learnings in estimation and retrospects towards the same

1347