meeting time: 2017 December 23rd Venue: East Nine teaching building teachers ' loungeMaster hold person: Wu Huiattendees: Wu Hui, liusi Jia, Gao Changlei, Wang Junjie, Wu HuijieRemember Record Person: Liusi Jiameeting Topic: The division of work and the initial arrangementTool selectionSoftware Testing course, the math exam is gradually approaching, our group set up, first discuss the division of labor, formally began to the operation of the specific arrangements. The static
Name
Mainly responsible for part
Complete situation
ZhihiheMr Jeremy Lau
Phase one, software evaluation. The comparison and analysis of the website of China Science and Software Institute are mainly embodied in the aspects of function and interface. Describe the site's flaws.
In progress
Luchamvy
Phase two, user research. The use of the website of the Chinese branch of a user to conduct research, in
. How to count off? Define a variable count log off3. Once the count is 3, what do you do with it?4. How do I get rid of a person? Place the element 05. Indicates the current or the number of people? Define the variable number;6. Because of the number of uncertain cycles, cycle conditions with Whlie numbers > 17. How to cycle off? If i = 13, go to the first person to continue the count.The code is as follow
/findresults11File:/home/kiosk/desktop/rh124-exam1 Page 2 of 2Find all lines containing ich in the file/usr/share/mime/packages/freedesktop.org.xml, will findCat/usr/share/mime/packages/freedesktop.org.xml | grep "Ich" >/root/linesThe lines are copied to/root/lines in sequence.File, the/root/lines file does not contain spaces, and the contents of the line are the exact/usr/share/mime/packages/freedesktop.org.xml original line of the source fileCopy%s/^\ *//g/* Remove all spaces that begin with s
V directly after-su
NMAP-SUV 192.168.0.1
XMAS scan: for operating systems running unxi and Linux.
NMAP-SX-p-PN 192.168.0.1
Using-SV, you can analyze the banner information to determine the port situation when the other party uses this port.
-O parameters provide information about the operating system.
-The t parameter changes the scanning speed. The parameter range is: 0 ~ 5. Reduce the speed to avoid being detected. Too fast will lead to inaccurate results.
Common Remo
The group is divided as follows:Qin Yao: Phase one: Software evaluation-basic performance analysisGuo Chao: Phase one: Software evaluation-front-end performance analysisLi Yi: Phase II: User ResearchLiu Yao: Stage Three: Give a conclusionZhu Dan: stage Four: AnalysisGroup Progress:Zhu Dan: In-depth analysis of the blog Park and CSDN, online access to information, began to write survey documentsWeb Test
Python practice 2: view the encoding of a webpage. python practice
Programming Environment: Virtual linux (cygwin in windows)
Identify the encoding method of a webpage,
Usage: python coding http: // www. ***. com
Test results:
Encoding of Web Page capture in python
, we think of some methods, in the process of equipment baking, we have to run a test script, similar to the graphics test program, it performs a variety of extreme instructions, at the same time through the device's sensor to receive the baking machine process parameters, including time, load, mechanical conditions, s
Abstract: A classmate due to 2 per cent difference with Tsinghua missed! The classmate's teacher in charge of the class said that his failed, it is likely because the handwriting is not neat!! A college entrance examination of the teacher said that the handwriting is good, well-written, really important. "In the middle of the college entrance examination, a cl
Martin's "Continuous Integration"I believe a lot of readers are like me. The concept of first exposure to continuous integration was the famous article "continuous integration" from Martin. The article was first published in September 2000, after which a revision was made in 2006. It clearly explains the concept of continuous integration. and summed up 10 practices, which were:
Just maintain
a bird. You can assume this every bird has a distinct name and the name have no white space. The name has only alphabetical letters, i.e. A-Z and a-Z. The following-integers is the date and the unit of food, the bird found on the. (1NOutputOutput "Case #T: "Before each test
Java Programming Practice: Determine whether the Java file name is correct, determine whether the mailbox format is correct, and count the number of times a character in a specified string appears1. Determine whether the Java file name is correct and whether the mailbox format is correct
Function: determines whether the Java file name is correct and whether the m
This product from 2014 began the formal implementation of agile transformation, to 2016 to achieve product-level agility, about two years of time. This article is based on my experience in ZTE these two years to do the summary, insight is relatively superficial, and most of it is written down by memory, inevitably there are some inconsistencies in the place. first, the Agile Transformation Program 1 Project Overview
• Product use: China Mobile IPTN bearer network transmission equipment
• Project
Lan network performance test method HDtune 64K has a cache speed test method, let you know your network performance, hdtune64k
This method can effectively test the network transmission performance. This method is applicable to disks, diskless (System Virtual Disk), game Virtual Disks, and other virtual disk software wi
Linux inter-process communication (IPC) Programming Practice (9) System V semaphores-A toolset for encapsulating a semaphores operationMain API # include
# Include
# Include
Int semget (key_t key, int nsems, int semflg );Int semctl (int semid, int semnum, int cmd,...); int semop (int semid, struct sembuf * sops, unsigned nsops );
SemgetInt semget (key
Alex Big God needs (to be honest, he needs akzent, it's hard to meet him):Write a user Login interface: Enter the user name password, after the successful authentication display welcome information, the wrong three times after the lock;#edited by: Shanlong#User Login function entered more than 3 times will be locked, in order to facilitate the input and test, the cipher password to clear textImportos;Import
Original URL:
http://blog.csdn.net/superqa/article/details/6817539
In testing, especially performance testing or system stability testing, memory usage is an important monitoring point, whether from the point of view of resource usage or from the point of view of memory leak problems.
If you look at it in general, it's about two metrics, the memory usage of the system, and the memory used by the process. But the real world things are not so simple, a
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.