Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Articles on Trending Technologies
Technical articles with clear explanations and examples
What is the order of test execution with priority in TestNG?
A TestNG class can have different tests like test1, test2, test3, etc. Once a user runs the TestNG class consisting of various tests, it runs the test cases in an alphabetic order based on the names provided. However, the user can assign the priority to these tests so that these tests can run as per user's priority. Priority starts from "0" which takes the highest priority and as the number moves up, the priority decreases.In this article, let's analyse how the order of execution with priority works in TestNG.Scenario 1If test2 (priority=0), test1 (priority=1), test3 (priority=2), then test2 will run ...
Read MoreHow to exclude a test class from a testing suite using testng.xml?
testng.xml has a format as where we define all the test classes that should be executed. There are no specific ways to exclude a class in , but there are workarounds that are quite useful in case you don't want to run a specific class in a testing suite.Following are some of the handy ways to exclude a test class run from a test suite.As usual, just mention the class names those are required to execute and remove the class names that are not supposed to execute.Mention all the class names inside including the ones that should not ...
Read MoreHow to retrieve the test suite name at runtime in TestNG?
TestNG supports native dependency injection. It allows to declare additional parameters in methods. At the runtime, TestNG automatically fills these parameters with the right value.Here is a list of some of the native dependencies in TestNG −ITestContextXmlTestMethodITestResultThese dependencies help to retrieve the test suite name depending on where these are called. If the user wants to retrieve the test suite name before execution or after execution, the best place is @BeforeSuite or @AfterSuite.@BeforeSuite and @AfterSuite support ITestContext. However, the full access of these dependencies is given in the following table −AnnotationITestContextXmlTestMethodITestResultBeforeSuiteYesNoNoNoBeforeTestYesYesNoNoBeforeGroupsYesYesNoNoBeforeClassYesYesNoNoBeforeMethodYesYesYesYesTestYesNoNoNoAfterMethodYesYesYesYesAfterClassYesYesNoNoAfterGroupsYesYesNoNoAfterTestYesYesNoNoAfterSuiteYesNoNoNoIn this article, we will use ITestContext dependency to show ...
Read MoreWhat is the difference between data security and data integrity?
Data SecurityData security define the collective measures used to protect and secure a database or database management software from improper use and malicious cyber threats and attacks. Database security is a layer of information security. It is basically concerned with physical protection of information, encryption of information in storage and data remanence issues.Data security is generally defined as the confidentiality, availability and integrity of data. In another terms, it is all of the practices and processes that are in place to provide data isn't being used or accessed by unauthorized individuals or parties. Data security provides that the data is ...
Read MoreWhy confidentiality is required in information system?
Confidentiality defines that sensitive information should be prohibited from being disclosed to illegal parties. There are generally two methods, or an amalgamation of these, in the course of which confidentiality can be supported. One method is to limit access to the information that should be maintain undisclosed. The other method is to encrypt the secret information. Confidentiality is at times also referred to as secrecy.The goals of security are confidentiality. It can strengthen internal control and restrict unauthorized access from both internal and external factors, thereby securing the confidentiality and integrity of resources and assets.Role-based security methods can be employed ...
Read MoreWhat is the difference between Physical Security and Logical Security in information security?
Physical SecurityPhysical security is represented as the security of personnel, hardware, programs, networks, and data from physical situations and events that can support severe losses or harm to an enterprise, departments, or organization. This contains security from fire, natural disasters, robbery, theft, elimination, and terrorism.Physical security is an essential part of a security plan. It forms the basis for some security efforts, such as data security. Physical security defines the protection of building sites and equipment (some data and software contained therein) from theft, vandalism, natural disaster, man-made catastrophes, and accidental damage (e.g., from electrical surges, extreme temperatures, and spilled ...
Read MoreWhat is Global information system in information security?
A Global information system is a system that generates, manages, analyzes, and maps all types of data. GIS connects data to a map, integrating location information with all types of descriptive data. This supports a foundation for mapping and analysis that is used in science and almost each industry.GIS provides users understand patterns, associationship, and geographic context. The benefits involve improved communication and efficiency and better management and decision making.The information system of an organization can be defined as a system that serves to provide information within the organization when and where it is required at some managerial level. An ...
Read MoreWhat are the privacy aspects of SOA in information security?
Service-oriented Architecture (SOA) is an approach of designing software to provide services to applications, or to other services, through published and discoverable interfaces. Each service provide a discrete chunk of business functionality by a loosely coupled (usually asynchronous), message-dependent communication model.The design of a high-quality software solution, including some other complex structure, needs early architectural decisions assisted by well-understood design methods, structural designs, and styles. These patterns address general service concerns such as scalability, reliability, and security.There are some aspects of Service-oriented architecture which are as follows −Architectural versus Implementation Models − As IT professionals goes to deliver applications using ...
Read MoreWhat is SOA in information security?
SOA stands for Service Oriented Architecture. It is a type of software design that creates software element reusable using service interfaces that use a common communication language over a network.A service is a self-included unit of software functionality, or set of functionalities, designed to complete a specific task including retrieving specified data or executing an operation. It includes the code and data integrations necessary to carry out a complete, discrete business function and can be accessed remotely and communicated with or updated separately.In another terms, SOA integrates software elements that have been independently deployed and maintained and enable them to ...
Read MoreHow to remove NaN from a Pandas Series?
In the pandas series constructor, the method called dropna() is used to remove missing values from a series object. And it does not update the original series object with removed NaN values instead of updating the original series object, it will return another series object with updated values.The parameters of the dropna() method are axis, inplace, and how.Example 1# importing packages import pandas as pd import numpy as np # Creating Series objects sr = pd.Series([42, np.nan, 55, 42, np.nan, 73, np.nan, 55, 76, 87], index=list("ABCDEFGHIJ")) print('Series object:', sr) # Remove missing elements result = sr.dropna() ...
Read More