Technology Questions

Q:

How to set breakpoints?

Answer

Setting up the break points:



  1.  Go to the line where you need to mark the breakpoint.

  2.  Click with mouse on left corner margin of that line.

  3.  Another way is to press F9

Report Error

View answer Workspace Report Error Discuss

Subject: .NET

0 1784
Q:

Can Manual Testing be completely replaced by Automation Testing?

Answer

Automated testing cannot replace manual testing because of following reason:


 


- Automated testing cannot replace the analytical skills required to conduct testing. It can only enhance or supplement manual testing,


- Through manual testing, information can be gathered about the application, and real-time decisions can be made about how to enhance a test that would be too difficult to program into an automated script.


- We need a manual tester to analyze and maintain the automated scripts after they can run.

Report Error

View answer Workspace Report Error Discuss

Subject: QA Testing

0 1783
Q:

When does the SQL statement gets executed when you use cursor in the application programming?

Answer

SQL statement gets executed when we open cursor


 

Report Error

View answer Workspace Report Error Discuss

0 1782
Q:

what are the types of standard SAP Internal Tables?

Answer

1)standered table


2)index table


3)hashed table


4)sorted table

Report Error

View answer Workspace Report Error Discuss

Subject: SAP

0 1781
Q:

In a DB2-CICS program which acts as co-ordinator and which is the participant?

Answer

DB2 acts as the participant and CICS acts as a co-ordinator


 

Report Error

View answer Workspace Report Error Discuss

0 1780
Q:

Assume that your app is running in the foreground but is currently not receiving events. In which sate it would be in?

Answer

An app will be in InActive state if it is running in the foreground but is currently not receiving events. An app stays in InActive state only briefly as it transitions to a different state.

Report Error

View answer Workspace Report Error Discuss

0 1780
Q:

What are the ways in which attackers can infiltrate the system?

Answer

- Web servers can be infiltrated using the command shell by an attacker to read the HTML files that is getting transferred. 


- If the set-uid scripts are not proper and bad then the infiltration can happen by the attacker. 


- The processes are not given proper permissions so that the password can be changed by using the “passwd” command to change the password of the system.


- This also authenticates the user for accessing the system and the files on it containing the data. 


- The program that is used in the operating system doesn’t follow the principle of least privilege and lead to security issues.

Report Error

View answer Workspace Report Error Discuss

Subject: Web Technology

0 1779
Q:

What is FDM?

Answer

FDM is an analog technique that can be applied when the bandwidth of a link is greater than the combined bandwidths of the signals to be transmitted.

Report Error

View answer Workspace Report Error Discuss

0 1777