1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergiy2304 [10]
3 years ago
13

Please briefly describe your QA / testing process?

Computers and Technology
1 answer:
gtnhenbr [62]3 years ago
4 0

Answer: The QA/Testing process consist of the following:

1. Requirement specification

2. Reviewing the code.

3. Unit testing

4. Integration test

5. Performance testing

Explanation:

We start of by the requirement specification try to gather all the information accurately. Then begins the coding process where there is review of the code so that they perform their desired purpose. After modules are completed we perform unit testing of the different modules individually and also do the integration testing once all the modules are completed. At the end we perform the performance testing to take a note on their desired output and other quality parameters.

You might be interested in
About C header files of C programming
Neko [114]

Answer:

A header file is a file with an extension. Which contains C function declarations and macro definitions to be shared between several source files. There are two types of header files: the files that the programmer writes and the files that come with your compiler.

3 0
3 years ago
Robin ensures that she is always available if anyone in the team needs her. Which quality is shown by robin?
Inessa05 [86]
Helpful, resourceful, friendly, welcoming.
8 0
3 years ago
Read 2 more answers
How do we store value in a variable? Give an example
Komok [63]

Answer:

hi

Explanation:

im not smart

4 0
3 years ago
Can Someone help plz?
Ugo [173]

Answer:

i dont understand sorry

Explanation:

7 0
3 years ago
6.An organization wants to implement a remote dial-in server to ensure that personnel can connect to the organization's network
Sauron [17]

Answer:

Challenge-Handshake Authentication Protocol (CHAP).

Explanation:

In Computer technology, authentication can be defined as the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication ensures a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification.

In this scenario, an organization wants to implement a remote dial-in server to ensure that personnel can connect to the organization's network from remote locations. The authentication protocol must include encryption to prevent hackers from accessing the network.

Hence, the protocol which should be used is Challenge-Handshake Authentication Protocol (CHAP).

A Challenge-Handshake Authentication Protocol (CHAP) can be defined as a standard network access control protocol in which a client program dials in to a network access server to receive a random value and identification number that can only be used once.

5 0
3 years ago
Other questions:
  • What is the software called that allows the user to create, access, and manage a database? question 8 options:
    10·1 answer
  • Sam wanted to open a file that he saved yesterday. Which component inside the computer stores this file? the hard drive the fax
    13·2 answers
  • if the president goes for vice president after his 2 term and the present president dies is the old president the president agai
    8·2 answers
  • All queries have an explicit location. true of false
    13·2 answers
  • A security policy is a
    11·1 answer
  • If a tv was showing a flat black or blue screen or had "snow", what steps would you take to fix it? Give an example of the direc
    11·1 answer
  • What is single user operating system? Write two examples.​
    12·2 answers
  • The template code provided is intended to check whether an integer entered by the user is outside of the range 20-29 (inclusive)
    9·1 answer
  • Plagiarism is considered
    6·1 answer
  • Explain the pros and cons of touchscreen, non-touchscreen, and hybrid devices:
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!