i
Fusion Informatics
Filter interviews by
Test cases ensure software quality. They should be comprehensive, clear, and repeatable.
Identify test scenarios and objectives
Create test cases with clear steps and expected results
Ensure test cases cover all functional and non-functional requirements
Execute test cases and report any defects found
Update test cases as needed based on changes to the software
HTTP is unsecured while HTTPS is secured with SSL/TLS encryption.
HTTP stands for Hypertext Transfer Protocol while HTTPS stands for Hypertext Transfer Protocol Secure.
HTTP operates on port 80 while HTTPS operates on port 443.
HTTP is vulnerable to attacks while HTTPS is secure due to SSL/TLS encryption.
HTTPS is used for secure online transactions such as online banking, e-commerce, etc.
Smoke testing is a quick and shallow test to check if the basic functionalities of the application are working. Sanity testing is a more thorough test to check if the major functionalities of the application are working after changes have been made.
Smoke testing is done to check if the application is stable enough for further testing.
Sanity testing is done to check if the changes made to the application have not affect...
Integration testing checks if different modules work together, Black box testing checks functionality without knowing code, Regression testing checks if changes affect existing functionality.
Integration testing verifies if different modules work together as expected
Black box testing checks functionality without knowing the code
Regression testing checks if changes affect existing functionality
Integration testing is done...
Retesting is testing the same functionality again after fixing the defects while regression testing is testing the entire system after making changes to ensure that the changes did not affect the existing functionality.
Retesting is done to ensure that the defects reported earlier have been fixed.
Regression testing is done to ensure that the changes made to the system did not affect the existing functionality.
Retesting ...
Top trending discussions
I am a dedicated and experienced System Engineer with a strong background in network infrastructure and troubleshooting.
Over 5 years of experience in designing, implementing, and maintaining network systems
Proficient in troubleshooting hardware and software issues
Skilled in network security protocols and best practices
Certified in Cisco CCNA and CompTIA Network+
Strong communication and problem-solving skills
STAR process is a structured method used in interviews to answer behavioral questions by outlining the Situation, Task, Action, and Result.
Situation - Describe the context or background of the situation
Task - Explain the specific task or goal that needed to be accomplished
Action - Detail the actions taken to address the task
Result - Summarize the outcome or impact of the actions taken
Example: 'Can you give me an exampl...
I applied via Naukri.com
This is the round in which basic quant questions were asked
In this round basic 2 java questions were asked
In this round one topic was given and we need to discuss about that topic
Java is a high-level, object-oriented programming language used to develop applications for various platforms.
Java is platform-independent, meaning it can run on any platform with a Java Virtual Machine (JVM)
It is known for its security features, such as the ability to run code in a sandbox environment
Java is used for developing a wide range of applications, from web applications to mobile apps and games
It is also used...
Searching is finding a specific item in a collection of items. Sorting is arranging items in a specific order.
Searching involves looking for a specific item in a collection of items.
Sorting involves arranging items in a specific order, such as alphabetical or numerical.
Searching and sorting are commonly used in computer science and data analysis.
Examples of searching algorithms include linear search and binary search.
E...
A binary tree is a data structure consisting of nodes, where each node has at most two children.
Nodes in a binary tree have a left and/or right child node.
The topmost node is called the root node.
Binary trees are used in search algorithms and data compression.
Examples of binary trees include binary search trees and heap trees.
I applied via Campus Placement and was interviewed in Oct 2020. There was 1 interview round.
I applied via Referral and was interviewed in Nov 2024. There were 3 interview rounds.
It was good. Interviewer are very supportive in nature.
I applied via Naukri.com and was interviewed before Dec 2023. There were 2 interview rounds.
I applied via Company Website and was interviewed in Nov 2024. There were 2 interview rounds.
Basic aptitude questions were asked
It had two questions on binary strings
I applied via LinkedIn and was interviewed in Aug 2024. There were 2 interview rounds.
Basic english , Maths (distance, speed, ratio, probability)
Different tests in software testing include unit testing, integration testing, system testing, and acceptance testing.
Unit testing focuses on testing individual components or modules of the software.
Integration testing checks if different modules work together correctly.
System testing validates the entire system against the requirements.
Acceptance testing ensures that the software meets the user's expectations.
Other ty...
Test cases are scenarios designed to validate the functionality of a software application.
Testing login functionality with valid credentials
Testing login functionality with invalid credentials
Testing password reset functionality
Testing search functionality with different input values
I applied via Walk-in and was interviewed in Oct 2024. There were 2 interview rounds.
The process of loans involves application, approval, disbursement, and repayment.
Application: Borrower submits loan application with required documents.
Approval: Lender reviews application, checks creditworthiness, and decides whether to approve or deny.
Disbursement: If approved, funds are disbursed to borrower.
Repayment: Borrower makes scheduled payments to repay the loan amount.
Examples: Personal loans, home loans, c
Defect life cycle is the process of identifying, reporting, fixing, retesting, and closing defects in a software application.
Defect identification: Defects are identified by testers during testing.
Defect reporting: Testers report defects in a defect tracking tool.
Defect fixing: Developers fix the reported defects.
Defect retesting: Testers retest the fixed defects to ensure they are resolved.
Defect closing: Once the def
Sanity testing is a quick test to check if the software is stable, smoke testing is a subset of sanity testing focusing on critical functionalities, and regression testing is retesting after code changes.
Sanity testing is a narrow and deep testing to ensure that the most critical functionalities work correctly after changes.
Smoke testing is a broad and shallow testing to ensure that the basic functionalities work befor...
Different types of https methods in api testing include GET, POST, PUT, DELETE, PATCH, OPTIONS, HEAD.
GET - Used to retrieve data from the server
POST - Used to submit data to the server
PUT - Used to update existing data on the server
DELETE - Used to delete data on the server
PATCH - Used to partially update data on the server
OPTIONS - Used to check what HTTP methods are supported by the server
HEAD - Used to retrieve head
Desktop Support Engineer
5
salaries
| ₹0 L/yr - ₹0 L/yr |
Digital Marketing Executive
5
salaries
| ₹0 L/yr - ₹0 L/yr |
SEO Analyst
4
salaries
| ₹0 L/yr - ₹0 L/yr |
Content Writer
4
salaries
| ₹0 L/yr - ₹0 L/yr |
Junior Android Developer
4
salaries
| ₹0 L/yr - ₹0 L/yr |
HCL Infosystems
Accel Frontline
Northcorp Software
Diverse Lynx