you have given estimation to your customer for 15 days and
later it requires more days then how will u handle this
situations...
No Answer is Posted For this Question
Be the First to Post Answer
what are the common estimation techniques followed
who is/are the stake holders in accepting the estimation for specific requirement
who does the estimation in perticular SW project
2 Answers CA, CarrizalSoft Technologies,
what is the best fit phase in SDLC to do the estimation analysis
2 Answers CarrizalSoft Technologies, IBM,
how to review the estimation, what are the check points
1 Answers CarrizalSoft Technologies, IBM,
what are the tools available for estimation evaluation
1 Answers CA, CarrizalSoft Technologies,
you have given estimation to your customer for 15 days and later it requires more days then how will u handle this situations...
Highlight four principal dangers that are deemed to be security threats to information systems.answers should include a detailed explanation as to how the threat is a danger to the security of an IS. b. identify 6 software control that can be implemented so as to safeguard information system to ensure that dey perform according to management standards. c. For each software control describe how it safeguard and information system.
what are the basic loop holes in estimation evaluation
is there any limitations for holystic estimation
please share your learnings in estimation and retrospects towards the same
Use a search engine on "application service provider (ASP)"or other related terms to find what service(s) an ASP provide to its clients who are looking to acquire IT applications.make a note of the name of the ASP and there website address,List a mininmum of six service that are provided by an ASP.