One. Q: In the Windows environment, encounter with anti-virus software can not kill the virus in addition to redo the system should do, how to close the background process, MSN can not be what the problem, how to solve.
a) for viruses, consider the following:
I use the command "msconfig" to turn on the System Configuration Utility, turn off unfamiliar startup items, and then reboot to observe the operation of the system.
Ii. use Task Manager to kill abnormal processes and see how the system works.
III. Use the command "regedit" to open the Registry Configuration tool to clear the registry entries.
Iv. If the antivirus tool provides a virus identification, you can use the search engine to find the relevant manual deletion method.
v. Use the Kill tool for removal.
VI. Give the system a corresponding patch.
VII. Use System Restore to restore the system.
B) Close the background process:
I. Use the services in Administrative tools to turn off the corresponding services.
II. Use Gpedit.msc to configure the system.
Iii. shut down using the management tools that are brought in by the service.
Iv. kill processes directly in task management.
C) Problem with MSN:
i. First check that the network connection is properly connected.
II. Check that the firewall rules are normal and that programs or ports are disabled. The
III. account number is stolen and the password is modified.
Iv. Depending on the returned error message, on the Messenger subweb of the MSN Web site, find the appropriate help and troubleshoot the problem according to the Help wizard.
Two Q: You found a bug in the test, but the development manager thought it was not a bug and how you solved it.
A) First, submit the issue to the defect management library for filing.
b) Then, to obtain the basis and criteria of judgment:
V. According to the requirements specification, product description, design documents, etc., to confirm whether the actual results are inconsistent with the plan, to provide a direct basis for the identification of defects;
Vi. If there is no document basis, can be based on the general characteristics of similar software to indicate whether there is inconsistency, to confirm whether the defect;
VII. According to the user's general use habits, to confirm whether the defect;
Viii. with designers, developers and customer representatives and other related personnel to identify whether it is a defect;
C Reasonable exposition, to the Test manager to explain their own reasons for judgment, attention to objectivity, rigorous, not mixed personal emotions.
(d) Wait for the Test manager to make a final decision and, if there is still a dispute, can be reflected to the superior through the channels provided by the company policy, and a decision is made by the superior.
Third, ask: give you a website, how you test.
A first, look for requirements, web design and other related documents, analysis of testing requirements.
b to develop a test plan, determine the scope of the test and test strategy, generally including the following sections:
I. Functional Testing
Ii. Interface Testing
Iii. Performance Testing
Iv. Database Testing
V. Security testing
Vi. Compatibility testing
c) Design Test cases:
I. Functional testing may include, but is not limited to, the following:
1. Link test. Link is correct jump, whether there are empty pages and invalid pages, whether there are incorrect error information returned, and so on.
2. Submit the function of the test.
3. Whether multimedia elements can be loaded and displayed correctly.
4. Multi-lingual support is able to display the selected language correctly.
Ii. interface testing can include, but is not limited to, several aspects:
1. Whether the page style is unified, beautiful
2. Whether the page layout is reasonable, the key content and hot content is outstanding
3. The control is used normally
4. Do you have the ability to automatically download and install the space that must be installed?
5. Text Checking
Iii. performance testing is generally considered in the following two aspects:
1. Stress test
2. Load test
3. Strength test
Iv. database testing needs to be specifically determined whether or not to be carried out. Databases generally need to consider connectivity, access to data operations, data content validation and so on.
V. Security testing:
1. Basic checking of login function
2. Whether there is an overflow error, resulting in system crashes or permission leaks
3. Check for common security issues in related development languages, such as SQL injection.
4. If you need advanced security testing, determine the help of a professional security company, outsource testing, or get support
VI. Compatibility testing, according to the requirements of the content, determine the supported platform combination:
1. Browser compatibility
2. Compatibility of operating systems
3. Software platform compatibility
4. Compatibility of databases
(d) Conducting tests and documenting defects. Arrange the test schedule reasonably, get the resources needed for the test in advance, and establish the management system (e.g., requirements change, risk, configuration, test document, defect report, human resources etc.).
E regularly review, evaluate and summarize the test, and adjust the content of the test.
Four Q: In the search engine input Chinese characters can be resolved to the corresponding domain name, how to use LoadRunner to test.
(a) Establish a test plan, determine test standards and test scope
b Design test Cases for typical scenarios, covering common business processes and infrequently used business processes.
(c) Develop automated test scripts and scenarios based on test cases:
I. Recording test scripts
1. Create a new script (web/html protocol)
2. Click the Record button and enter "About:blank" in the URL of the pop-up dialog box.
3. After the normal operation process in an open browser, end the recording.
4. Debug scripts and save them. You may want to note the association of character sets.
Ii. Setting Up test scenarios
1. Targeted to set test scenarios, the main judge under normal circumstances, the system's average transaction response time is up to standard
2. For the pressure load set test scenario, the main judge in a long time at full load or beyond the system load capacity conditions, the system will collapse.
Iii. execute test, obtain test results, analyze test results
Five Q: What is the difference between a client with 300 clients and 300 clients with 300 clients pressuring the server?
A 300 users on one client will consume more resources from the client and affect the results of the test.
b There may be interference between threads, resulting in some exceptions.
c) 300 users need greater bandwidth on one client.
d IP address issues, you may need to use IP spoof to circumvent the server's limit on the maximum number of connections to a single IP address.
E All users on a client, regardless of the issue of distributed management, and users distributed on different clients, you need to consider using a controller to the overall deployment of users on different client machines. Also, you need to give the appropriate permissions configuration and firewall settings.
Six. Q: How many categories of software are there?
Depending on the functionality, computer software can be roughly divided into four levels:
1, the most close to the computer hardware is some small software. They implement some of the most basic functions, usually "solidified" in a read-only memory chip, so called firmware.
2, the system software includes the operating system and compiler software. The system software and hardware provide a "platform" together. They manage and optimize the use of computer hardware resources.
3, support software. Including graphical user interface, software development tools, software evaluation tools, database management system, middleware and so on.
4, the most applicable software, including Office software, E-commerce software, communication software, industry software, game software and so on.