I am from non IT field but would like to start my career in IT as a manual and automation tester. I know a little bit about manual testing. I would like to gain experience working as manual tester and then come in automation.… Continue reading
Author: Guest (Page 9 of 11)
I was asked in an interview about GA release. I’m not really sure what GA stands for.
Please help
Is there a file lock software that can prevent hackers from accessing my data?
Hi,
I wanted to know if using Page Object Model can reduce reuse of Code.
For Example,
If we have a clickLogin operation for Login Page in LoginPage.class & clickSaveButton on Home Page inside HomePage.class, both are performing Click on a UI Element.… Continue reading
Hello, this is Swapna. Finished with my graduation and planning to learn testing related technology. I have no idea about learning the best course. So, can you please guide me?
Hi Thanh,
Hope you are doing good.
I am working as a system admin on Linux operating systems since 10 years.
I want to switch to software or hardware testing , or basically testing is what I want to do.
What knowledge I need to acquire before I make a move.… Continue reading
I ‘m going to learn Selenium/Appium. Some friend of mine recommend me Python. But I also learn that Java also good for automation . Could you recommend me a language that i should learn for automation?
Hi admin,
I would like to ask about take a part-time job by testing website? In vietnam, are there any website that allow for us to earn money with testing like usertesting.com , .. so so.
Many thanks,
Linh
Hi everyone,
What are different testing techniques and methodologies we need to know when testing? Also, which one is the most important one to you?
Thank you
In this guide, you will learn about the need for pentesting, components to be tested, qualities of a good pentester and much more.
In simple words, penetration testing is to test the information security measures of a company.
Information security measures entail a company’s network, database, website, public-facing servers, security policies, and everything else specified by the client.… Continue reading