Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


hi friends
please tel me how to handle the recovery manager(All i.e
PopUp ,Application Crach ,Object state,etc) in QTP



hi friends please tel me how to handle the recovery manager(All i.e PopUp ,Application Crach ,Ob..

Answer / anonymous

Recoveries are 4 types which are implemented using Trigger
Events.
1. Popup:
When an user skipped the text field like password, a pop
up will come out telling that he hasn't entered/has skipped
a mandatory text field. Qtp handles this.
2. Object's state:
Somtimes, some buttons may be disabled depends on certain
conditions. - like Only after entered the data in DB, the
Delete button will be enabled, which indirectly tells us
that the data is being stored in db.
3.
a. Object Not Unique (Rarely used). Because every object
should represent a specific functionality and how is it
possible that two functionalities are same? Almost
Impossible, except itis just the Object properties are
similar.
b. Object Not found: when an object missed in the
current build (which was there in the previous build), then
qtp deals with this situation.

4. Application Crash: May be nobody has used it.

Tell me how you got IBM interview?
Is it real?

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More Programming Languages AllOther Interview Questions

What is meant by QUEUE?

4 Answers   Mascot,


How you ll create customizing Tcode.

1 Answers   IBM,


in network security,how we identified threat?some one say we found threat according to it's signature,but how we get signature or pattern of the virus?

0 Answers  


Which tag is used to create table row

2 Answers  


what is the BAM? where we can use it in BizTalk server?

0 Answers  


what is lazy loading in hibernate?Explain in detailed manner?

2 Answers   IBM, TCS,


Hi all... I had completed MSC(Computer) and had join the construction company based on sap.they want me to work on abap.but software company is totally different from construction company and they want me 2 grasp it as fast i can.i am finding it difficult.what should i do??????

0 Answers  


write algo for cobol program whichuse three flat file to extract some specific information 8 marks mainframe

0 Answers  


how to convert the data from HTML file to SAS dataset?

0 Answers   Accenture,


What are the compilers of JAVA and .NET Programming languages?

1 Answers   HCL, Microsoft,


what do you meant by Platform-Independent in Java?

6 Answers   Persistent,


What are the limitation in using querystring in .net?

1 Answers   Tesco,


Categories