Answer Posted / shakun garg
It is used to map requirement with associated test cases. It is also used to map bug to specific requirement.
| Is This Answer Correct ? | 1 Yes | 0 No |
Post New Answer View All Answers
Can you explian $ pillar of Agile
Could someone please send me real check list for Database Security testing.Please my mail ID- patil.ramchandra@yahoo.co.in. Thanks.
Explain briefly your project.
What is junit & api?
how can we give (ASSIGN) bug privitorirs and seviroty to the bug explain with exanple
What is common interface?
what is scrum how with ex?
integration test cases for mouse and keyboard
what is the challenging position faced in the testing not in point of management point of view it must be in the point of while testing the application?
What are microsoft 6 rules?
Architectural structure of the insurance project?
When we are recording in WinRunner and interact with the AUT, what does WinRunner do?
is it possible web application make it as executable file
How can data caching have a negative effect on load testing results?
*) Internal review defect gets detected… 1) During peer review. 2) By the own stuff member onsite/offshore. 3) During Informal review process. 4) None of these 5) All of these