Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Articles on Trending Technologies
Technical articles with clear explanations and examples
What is Continuous Testing in DevOps(Definition, Benefits, Tools)?
Continuous TestingContinuous testing in DevOps is a kind of software testing that entails testing the program at each phase of the software development cycle. The purpose of continuous testing is to evaluate the software quality at each stage of the Continuous Delivery Process by checking promptly and frequently.In DevOps, the Continuous Testing phase encompasses participants such as Developers, DevOps, QA, and the operational system.This article will teach you −What is Continuous Testing?How is Continuous Testing different?How Is Continuous Testing Different from Test Automation?How to do Continuous TestingContinuous testing toolsBenefits of Continuous testingChallenges of continuous testingHow is Continuous Testing different?The traditional ...
Read MoreWhat is Software Testing Metrics with Types & Example?
Software Testing metrics are quantitative steps taken to evaluate the software testing process's quality, performance, and progress. This helps us to accumulate reliable data about the software testing process and enhance its efficiency. This will allow developers to make proactive and precise decisions for upcoming testing procedures.What is a metric in software testing metrics?A Metric is a degree to which a system or its components retains a given attribute. Testers don't define a metric just for the sake of documentation. It serves greater purposes in software testing. For example, developers can apply a metric to assume the time it takes ...
Read MoreWhat is Agile Testing? (Process, Strategy, Test Plan, Life Cycle Example)
What is Agile Testing?Agile Testing is a method of testing that adheres to the rules and concepts of agile software development. Unlike the Waterfall technique, Agile Testing may commence at the beginning of a project with continuous integration of testing and development. The agile testing approach is not chronological (in the sense that it is only conducted after the coding process), but rather consistent.In this article, we will talk about −Agile Test PlanAgile Testing StrategiesThe Agile Testing QuadrantQA challenges with agile software developmentRisk of Automation in Agile ProcessAgile Test PlanThe kind of test performed in that iteration are included in ...
Read MoreDesign Verification & Validation Process in Software testing
You will learn the following in this article −What is Design Verification?Difference between Design Verification and ValidationDesign Verification ProcessDesign Validation ProcessAdvantages of Design Validation and VerificationDesign ValidationDesign Validation is the process of testing a software product to ensure that it meets the specific needs of the customer or partners. The goal of design validation is to check the software product after it has been developed to confirm that it fits the criteria for implementations in the user's environment.Validation is focused on establishing the design's accuracy and reliability in relation to the user's demands. This is the step in which you ...
Read MoreHow to set the background color of a ttk.Combobox in tkinter?
Tkinter supports ttk widget which is used to change the style and properties of any widget in a tkinter application. We can set the background color, foreground color, and other attributes of the Combobox widget by visiting the configure function in ttk and passing 'TCombobox' as the first parameter.ExampleIn this example, we will set the background color of the Combobox widget by defining its values in the ttk widget.# Import the required libraries from tkinter import * from tkinter import ttk # Create an instance of tkinter frame win = Tk() # Set the size of the tkinter ...
Read MoreWhat is Scareware?
While browsing the Internet, many users might have received a pop-up alerting them of a virus attack on their system and asking for downloading an application to remove that virus. In anticipation of removing the virus, users download that application which is, in fact, a malicious program known as Scareware.Let us talk more about Scareware and learn how to deal with it.What is ScarewareScareware, also known as Fraudware, are malicious computer applications that pretend to be helpful to the user. As it is clear, the word Scareware is the combination of two terms, Scare and Software. It is basically the ...
Read MoreWhat is Rootkit?
There are certain malware programs that are more dangerous than the others because of the level of havoc they create and the difficulty in detecting them. Other than the Ransomware and Trojans, most organizations are afraid of the Rootkits.Let us understand what Rootkit is, why it is considered one of the most dangerous cyberattacks, how it can be utilized, and how to prevent a Rootkit attack on your system.What is RootkitA Rootkit is a malicious computer program that provides the root level, i.e., the admin-level privileges, to the attacker behind it. The term Rootkit is derived from two words, Root ...
Read MoreWhat is Riskware?
On the Internet, you will find many legitimate programs whose functionalities are misused by intruders to carry out malicious activities. Such applications are known as Riskware.Let us discuss more on Riskware and how to prevent their attack.What is RiskwareThe term Riskware is coined using two words Risk and Software. Riskware is a legal program, but its functionalities and weakness can be exploited by cybercriminals for carrying out illicit activities. The attackers can use it to their advantage to delete, edit, block and perform other modifications on the files and applications of your system. It can also slow down your network ...
Read MoreWhat is Phishing?
Cybercriminals can go to any extent to infiltrate systems or networks with malware programs and perform illicit activities. They use several techniques to do that; one of those is the Social Engineering attack. One of the most dangerous and widely performed Social Engineering attack forms is Phishing, In this guide, we would know in detail what Phishing is, how it is performed, its examples and how to stay protected from it.What is PhishingPhishing is a type of Social Engineering attack in which the victims are psychologically manipulated to provide sensitive information or install malicious programs. It is similar to 'fishing.' ...
Read MoreWhat is Malvertising?
Today Internet users see ads everywhere. While browsing the Internet, watching videos, playing games, advertisements are everywhere. Because of the popularity and reach of the ads to a larger audience, cybercriminals are using it as a medium to spread malicious files, and this is where Malvertising comes in.In this post, we would get to know what Malvertising is, how it works, its types, and how to protect against Malvertising.What is MalvertisingMalvertising is the term used for legitimate advertisements that intentionally or unintentionally promote malware programs. The term Malvertising is the fusion of two words, Malicious and Advertising.Most Internet users confuse ...
Read More