Technology Questions

Q:

How to derive test scenarios and use cases? What are the contents and format?

Answer

 Test scenarios are derived from requirement documents. We follow each and every functionality (called business rules) mentioned in the requirement document. One functionality can have multiple business rules. For example, let us say in there is one requirement called “Login”. This “Login” may have various scenarios. For example, one scenario is, enter the right User ID and wrong password. The system should display an error message. Another scenario would be to enter wrong User ID and right Password. The system should display an error message. The third scenario could be to enter the right User Name and right Password. The system should allow the user to get into the system. This is how the test cases are derived from the requirement documents or from the Use Cases.

Report Error

View answer Workspace Report Error Discuss

Subject: QA Testing

0 2367
Q:

What is Exploratory Testing and Specification-Driven testing?

Answer

Exploratory testing: means testing an application without a test plan and test script. In exploring testing test explore the application on the basis on his knowledge. The tester has no knowledge about the application previously. He explores the application like an end user and try to use it. While using the application his main motive is to find the bugs which are in the application.


Specification-driven testing: means to test the functionality of software according to the user requirements. In this, tester inputs multiple data and monitors the outputs from, the test object. In this testing tester evaluate the showstopper bugs which break the major functionality of the application. This type of testing requires test plan and test.

Report Error

View answer Workspace Report Error Discuss

Subject: QA Testing

0 2365
Q:

Explain about various caches available in Data Integrator

Answer

  •  NO_CACHE – It is used for not caching values.

  •  PRE_LOAD_CACHE – Result column preloads and compares the column into the memory, prior to executing the lookup.

  •  PRE_LOAD_CACHE is used when the table can exactly fit in the memory space.

  •  DEMAND_LOAD_CACHE – Result column loads and compares the column into the memory when a function performs the execution.

  •  DEMAND_LOAD_CACHE is suitable while looking up the highly repetitive values with small subset of data.

Report Error

View answer Workspace Report Error Discuss

0 2365
Q:

What do you mean by early binding?

Answer

Early binding refers to the events that occur at compile time. Early binding occurs when all information needed to call a function is known at compile time. Examples of early binding include normal function calls, overloaded function calls, and overloaded operators. The advantage of early binding is efficiency.

Report Error

View answer Workspace Report Error Discuss

Subject: C++

0 2363
Q:

Explain the basic difference between 32-bit and 64-bit operating system?

Answer

A 32 bit processor is faster than a 64 bit processor, 64 bit processors are very commonly used that you can find it easily in any home pc but the main difference is the hardware you are having on your machine. For 32 bits there isn't any need of any wide main bus to carry 32 bits at a time but for 64 bits its must that you should have a wider bus to carry 64bits.

Report Error

View answer Workspace Report Error Discuss

0 2363
Q:

How do we measure progress in Data Integration?

Answer

Look for the existence of the following items:


- Generic Data Models


- An Enterprise Data Platform


- Identify the Data Sources


- Selection of a MDM Product


- Implementation of a Customer Master Index or appropriate alternative

Report Error

View answer Workspace Report Error Discuss

0 2362
Q:

What are the different types of components involved in URI?

Answer

URI is known as Uniform Resource Identifier as it identifies the resources requested by clients and fetches them from the server. 


The components that are used in URI are as follows:


- http: is the first thing that is used in a URL and it is used to tell what kind of resource that needs to be retrieved over the server.


 This includes the server details and it is itself a protocol known as Hypertext Transfer Protocol (HTTP) that is used to fetch the information. 


- Web browsers sometimes use the secure protocol that is represented using HTTPs used in case of secure transaction over the internet. 


- FTP: is also a protocol that is known as File Transfer Protocol that allows the transfer from a file from local computer to server

Report Error

View answer Workspace Report Error Discuss

Subject: Web Technology

0 2357
Q:

What do you think about the challenges faced by a Business Analyst ?

Answer

Change management is the biggest challenge in each and every industry. After requirements stage when development is started client will come-up with some new changes or enhancements. 


Cross departmental or cross team management – like conflict management between teams. Also individuals. This requires soft skills and smartness. 


Communication problems – In real time this can happen. You might be good in speaking and understanding the English language. BUT sometimes it happens like Different people across the globe speak different style of English. In USA itself Mexico people speak English differently. Romans speak different English. So at initial level to understand the accent can be a challenge but after some time you will become perfect. 

Report Error

View answer Workspace Report Error Discuss

0 2357