I. Q.
A) for viruses, consider the following:
I. Run the "msconfig" command to enable the System Configuration Utility, disable unfamiliar startup items, and restart to observe the system running status.
Ii. Use the task manager to kill abnormal processes and check the system running status.
Iii. Run the "Regedit" command to enable the Registry Configuration tool and clear the table items in the registry.
IV. If the antivirus tool provides a virus identifier, you can use the search engine to find the relevant manual deletion method.
V. Use the kill tool to clear the vulnerability.
Vi. patch the system accordingly.
VII. Use System Restoration to restore the system.
B) Disable background processes:
I. Use "service" in "Administrative Tools" to close the corresponding service.
Ii. Use gpedit. MSC to configure the system.
Iii. Disable it using the built-in management tools of the service.
Iv. directly kill the process on the task manager.
C) MSN problems:
I. First check whether the network connection is normal.
Ii. Check whether the firewall rules are normal and DisabledProgramOr port.
Iii. Whether the account has been stolen by others and the password has been changed.
Iv. Based on the returned error message, go to the messenger sub-site on the msn website, find the corresponding help, and solve the problem according to the help wizard.
2. Q: You have found a bug in the test, but the development manager thinks this is not a bug and how do you solve it.
A) First, submit the problem to the defect management database for ICP filing.
B) then, obtain the judgment basis and standards:
V. Check whether the actual results are inconsistent with those in the plan based on the requirement statement, product description, and design documents, and provide a direct basis for defect validation;
Vi. If there is no document basis, you can identify the inconsistency based on the general characteristics of similar software to determine whether it is a defect;
VII. check whether it is a defect based on users' general usage habits;
VIII. Discuss with designers, developers, customer representatives, and other related personnel to determine whether the problem is a defect;
C) give a reasonable discussion, explain the reasons for your judgment to the test Manager, and pay attention to objectivity and rigor.
D) Wait for the test manager to make a final decision. If there is still a dispute, it can be reflected to the superior through the channels provided by the company's policies, and a decision can be made by the superior.
3. Q: How do you test a website?
A) First, find the Requirement Description, website design, and other related documents to analyze the test requirements.
B) Develop a test plan and determine the test scope and Strategy, which generally includes the following parts:
I. Functional Testing
Ii. Interface Test
Iii. Performance Testing
Iv. Database Testing
V. Security Testing
Vi. Compatibility Test
C) design test cases:
I. Functional testing may include but is not limited to the following:
1. link test. Whether the link is correctly redirected, whether there are blank pages or invalid pages, and whether incorrect error messages are returned.
2. Test the submission function.
3. Can multimedia elements be correctly loaded and displayed.
4. Whether the selected language can be correctly displayed in multiple languages.
II. The interface test may include but is not limited to the following aspects:
1. Unified page style and beautiful appearance
2. Whether the page layout is reasonable, and whether the key content and hotspot content are prominent
3. Whether the control is in normal use
4. Whether the automatic download and installation functions are provided for the required but installed Space
5. Text check
Iii. Performance testing generally involves two aspects:
1. Stress Testing
2. Load Testing
3. Strength Test
Iv. Whether or not to perform a database test depends on the database test. Databases generally need to consider connection, data access, and data content verification.
V. Security Testing:
1. Check basic login Functions
2. Whether an overflow error exists, causing system crash or permission Leakage
3. Check common security issues related to development languages, such as SQL injection.
4. If advanced security testing is required, be sure to get help from professional security companies, outsource testing, or get support
Vi. compatibility test. Determine the supported platform combinations based on the requirements:
1. browser compatibility
2. operating system compatibility
3. software platform compatibility
4. Database compatibility
D) conduct tests and record defects. Adjust the Test Progress reasonably, obtain the resources required for the test in advance, and establish a management system (such as requirement change, risk, configuration, Test Documents, defect reports, and human resources ).
E) conduct regular reviews, evaluate and summarize the tests, and adjust the test content.
4. Q: You can enter Chinese characters in the search engine to parse the corresponding domain name. How can I use LoadRunner for testing.
A) Establish a test plan and determine the test standards and scope.
B) design test cases in typical scenarios, covering common business processes and non-commonly used business processes.
C) Develop automatic test scripts and scenarios based on test cases:
I. Recording test script
1. Create a new script (Web/html Protocol)
2. Click the recording button and enter "about: blank" in the URL of the pop-up dialog box ".
3. Complete the recording after the normal operation is performed in the open browser.
4. debug the script and save it. You may need to note the association of character sets.
Ii. Set test scenarios
1. Set the test scenario for performance, mainly to determine whether the average transaction response time of the system is up to standard under normal circumstances
2. Set a test scenario for the pressure load to determine whether the system will crash if the system is at full load for a long time or exceeds the system's load capacity.
Iii. perform tests, obtain test results, and analyze test results
5. Q: What is the difference between a client with three hundred customers and three hundred clients with three hundred customers putting pressure on the server?
A) 300 users on a single client will occupy more resources of the client and affect the test results.
B) Interference between threads may occur, and some exceptions may occur.
C) 300 users need larger bandwidth on one client.
D) ip address problems may require ip spoof to bypass the server's limit on the maximum number of connections from a single IP address.
E) all users on one client do not need to consider the issue of Distributed Management. Users distributed on different clients need to consider using controllers to allocate users on different clients as a whole. At the same time, you also need to grant the corresponding permission configuration and firewall settings.
6. Q: How many types of software are available?
depending on different functions, computer software can be roughly divided into four layers:
1. Some small software that is most close to computer hardware. They implement some of the most basic functions, usually "Solidified" in the read-only memory chip, so it is called the firmware.
2. system software includes the operating system and compiler software. System software and hardware provide a "Platform" together ". They manage and optimize the use of computer hardware resources.
3. supported software. Including graphical user interfaces, software development tools, software evaluation tools, database management systems, and middleware.
4. Most application software types, including Office software, e-commerce software, communication software, industry software, game software, and so on.