Why do you create parameters, Computer Engineering

Parameters are like script variables. They are used to vary input to the server and to imitate real users. Dissimilar sets of data are sent to the server every time the script is run. Better replicate the usage model for more accurate testing from the Controller; one script can emulate many dissimilar users on the system.        

 

 

Posted Date: 4/3/2013 3:19:27 AM | Location : United States







Related Discussions:- Why do you create parameters, Assignment Help, Ask Question on Why do you create parameters, Get Answer, Expert's Help, Why do you create parameters Discussions

Write discussion on Why do you create parameters
Your posts are moderated
Related Questions
How to fetch random ID from table by SQL query Select * from Table_Name order by NewID()

Q. Show Various RISC Processors? RISC has fewer design bugs and its simple instructions decrease design time. Sodue to all the above important reasons RISC processors have beco

Q. How many instructions in a Computer? A computer can have a vast number of instructions and addressing modes. Older computers with the growth of Integrated circuit technolog

Explain the concept of top-down design for a program. Top down Design: A top-down approach is fundamentally breaking down a system to gain insight into its compositional s

Subtraction 11011-11001 using 2's complement. Ans. 11011 - 11001 = A - B 2's complement of B = 00111 1 1 0 1 1 + 0 0 1 1 1 1 0 0 0 1 0 Ignore carry to get answer as 00010 = 2.

Q. Process of An e-mail transfer across the Internet? When you open your mail client to read your e-mail, this is what normally happens: 1. Mail client (Netscape Mail, Micro

Explain different parameter passing mechanisms to a function with the help of example? The different parameter-passing mechanisms are given below: 1.   Call by value 2.

When the user is inputting commands into your shell, it should properly handle delete and backspace. When one of these characters is detected, you will need to remove one character

Explain the violating basic security principles There are drawbacks to permitting users to access the Intranet as well as not permitting them. A simple consideration such as a

The EFI community has formed an open source shell environment. Rather than booting directly into a full OS, on some executions, the user can boot to the EFI shell. The shell is an