Answer Posted / ramprasad.s
HI
autherisation : Security
authentication : Access Rights.
sun_ramprasad@yahoo.com
| Is This Answer Correct ? | 5 Yes | 3 No |
Post New Answer View All Answers
list of methods that is used to document the requirements of a software.
Who are all involved in an inspection meeting?
What if an organization is growing so fast that fixed testing processes are impossible? What to do in such situations?
which domain is of high demand for software testing, Right now i am working in Education domain .How about demand for Education domain and which companies are recruiting in education domain
Hi Could someone please provide Siebel Testing Interview questions for 5 years exp.
IN SQL SERVER 2005, With out using Query, hw can u break down USER NAME & PASSWORD to enter the software.
How do you go about testing a project?
Can test condition,testcase and testscript help u in performing the static testing
Hi ALl, Can you please list out Q & A for Test Lead,which Interviewer may ask in interview for Test Lead position
What is actually a rule based testing
What are the main key components in web applications and client and server applications?
How to Generate Test Case for Shopping Cart?
How many types of api testing are there?
what is independent question and what is retriewing and what is problem of severity.
Hi everyone, My name is Salil Mishra. I am having 1.7 years of experience in manual testing. But as i m 2008 passout, there are limited position for me in the companies. Please help me out in getting a good job guys..I f you find something then please mail me at salilmishra29@gmail.com