What tasks do checkpoints perform in QTP, Software Engineering

Assignment Help:

What tasks do checkpoints perform in QTP?

Checkpoints in QTP are used to verify information which is expected to be displayed when running test. Following are 8 types of available checkpoints:

a.) Page - checks application characteristics

b.) Text - verifies that text strings are displayed at proper locations in the application

c.) Object - checks values of application objects

d.) Image - checks values of application images

e.) Table - verifies information in an application table

f.) Accessibility - checks web page for compliance with Section 508

g.) XML - verifies contents of XML data files or documents that are part of the application

h.) Database - verifies contents of databases accessed by the website

 


Related Discussions:- What tasks do checkpoints perform in QTP

Explain the empirical estimation models, Write short notes on empirical est...

Write short notes on empirical estimation models. Estimation model for computer software uses empirically derived formulas to expect effort as a function of line of codes (LOC)

Incremental model, four circumstances where incremental model is appropriat...

four circumstances where incremental model is appropriate?

Evaluate the usefulness of roce, Present an evaluation of the current perfo...

Present an evaluation of the current performance of your chosen company using ROCE, RI, EVA and SVA.  (All figures employed should be up to date , clearly explained / justified an

Name some common software standards, Name some Software Standards Num...

Name some Software Standards Numerous terms related to software engineering are regularly standardised by organisations like IEEE (Institute of Electrical and Electronics Engi

Database, explain why older data models are being replaced by new data mo...

explain why older data models are being replaced by new data models.

Define the factors of prime concern for system modeling, Define the factors...

Define the factors of prime concern for system modeling Following four factors are of prime concern for system modeling: 1. System modeling is undertaken with some simplifyi

What is boundary value, Explain Boundary value? (1)A data value that cor...

Explain Boundary value? (1)A data value that corresponds to a input, internal, or output value specified for a system or component. (2) A value which lies at, or just inside

Discuss the various strategies of design, Q. Discuss the various strategies...

Q. Discuss the various strategies of design. Which design strategy is most popular and practical? Ans The most commonly utilized software design strategy involved decomposing

Describe structure-based testing techniques, Describe Structure-based testi...

Describe Structure-based testing techniques - Structure-based testing techniques are also known as white-box testing techniques. - They use internal structure of the softwar

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd