June, July 2023 FSD QP Scheme
June, July 2023 FSD QP Scheme
Question Paper
SECTION-I
1. a) Explain how Digital transformation can bring revolution in banking process.
-10
b) Explain how design thinking has brought revolution in scanner experience that loved
-10
SECTION-II
3. a)BookMyShow is an online movie ticket booking application that helps its user to
book movie tickets by logging in. Users can find their movie from the listings. Once
found,User an check the availability of tickets for specific date and book ticket. After
booking is confirm the details are sent to user. Identify and write the user stories for this
application. -12
b) Write test cases for the above application.
-8
4. a) Swiggy is an online food ordering application that helps its users to buy variety of
authentic food items. This application allows users to log in for ordering food. Users can
search for their favorite food based on rating or price. Users can select the items and
add to the cart. Once the selection made go to payment page and make payment. write
the user stories for this application. -12
2
b)Write test cases for the above application.
-8
SECTION-III
5. a) Create a spring Boot application to maintain employee details such as employee id,
employee name, and department. Design entity or data JPA class, controller class and
repository.
-12
b) Compare spring and spring boot. -8
SECTION-IV
SECTION-V
10 . a) Create a form to add a new product detail to the product catalogue using React.
3
-10
b) Draw the CI/CD build process flow diagram for an online application and
explain each
component.
-10
4
Scheme of Valuation
Section-I
1. a) Explanation of Digital Transformation any 10 points related to banking Digital
transformation process. 10 Marks
b) Explanation of Design Thinking 10 Marks
GoogleAppEngine-Identification1Marks+Characteristics1Marks+advantages1Marks
= 3 Marks
Section-II
3. a) Identification of User Stories-3Marks + Writing of User Stories- 9Marks =
12Marks
b) Writing of Test Cases - 8
Marks
Section-III
5. a) Entity code 3Marks + repository code 2Marks +controller class code 7Marks
-12 Marks
b) Comparision -8 Marks
5
each=2*2M=4Marks
+ controller class code 4Marks = 2+4+4Marks= 10Marks
Section-V
9. a) Docker Client-3Marks + Docker Host-5 Marks + Docker Registries-2Marks =
10Marks
b) Differences -10 Marks
6
Model Answers
Section-I
1. a) Explain how Digital transformation can bring revolution in banking process.
-10
Digital transformation has the potential to revolutionize the banking process in numerous
ways, leading to enhanced efficiency, improved customer experience, and increased
innovation. Some key areas where digital transformation can bring about a revolution in
the banking industry:
1.Digital Banking Services: Digital transformation enables banks to offer a wide range
of digital banking services, including online banking, mobile banking apps, and virtual
wallets. Customers can access their accounts, make transactions, pay bills, and
manage finances conveniently from their devices, reducing the need for physical visits
to the bank.
2. Personalized Customer Experience: With data analytics and artificial intelligence,
banks can analyze customer behavior and preferences to offer personalized services
and product recommendations. Digital channels allow for targeted marketing and
tailored experiences, making customers feel valued and engaged.
7
and the development of new financial services and products.
9. Remote Banking and Virtual Branches: Digital transformation enables remote
banking services, reducing the need for physical branches. Virtual branches and remote
customer support ensure seamless banking experiences for customers, regardless of
their location.
10. Innovation and Agility: Digital transformation promotes a culture of innovation and
agility within banks. Embracing emerging technologies and adapting to market changes
quickly allows banks to stay competitive and meet evolving customer demands.
11. Cost Optimization: By automating processes and reducing the reliance on physical
infrastructure, banks can achieve cost optimization and operational efficiency.
1. b) Explain how design thinking has brought revolution in scanner experience that
Children
Loved.
-10
Design thinking has brought a revolution in the scanner experience for children by putting their
needs, preferences, and emotions at the center of the product design process. It has led to the
creation of scanners that are not just functional but also engaging, enjoyable, and loved by
children. This is how design thinking has influenced the scanner experience for children:
1.Empathizing with Children's Needs: Design thinking starts with empathizing with the
end-users, in this case, children. Designers and developers spend time observing and talking to
children to understand their preferences, interests, and pain points. By understanding children's
unique perspective, design teams can identify specific features and elements that would appeal
to them.
2. Child-Centric Design: Design thinking encourages child-centric design, where every aspect
of the scanner is tailored to suit the cognitive abilities and emotional needs of children. The user
interface is simplified, and the design incorporates vibrant colors, playful graphics, and
interactive elements that resonate with children.
4. Storytelling and Imagination: Design thinking harnesses the power of storytelling and
imagination. Scanners may incorporate characters or themes from children's favorite stories or
media. By making the scanner experience immersive and storytelling-driven, children become
more invested in the process.
5. Intuitive and Easy-to-Use: A key principle of design thinking is to create products that are
intuitive and easy-to-use. For children, this means reducing complexity and making the
scanning process straightforward and accessible. Large buttons, clear instructions, and minimal
steps ensure children can interact with the scanner effortlessly.
8
6. Iterative Prototyping and Testing: Design thinking involves iterative prototyping and testing
with real users, including children. This ensures that the scanner experience is continually refined
based on direct feedback from the target audience. User testing helps identify any usability
issues and allows designers to make improvements accordingly.
7.Inclusive Design: Design thinking promotes inclusive design, ensuring that the scanner
experience is accessible to children with diverse abilities. For instance, designers may consider
adding voice guidance for visually impaired children or making the scanner adaptable for
children with motor skill challenges.
3. Job Design and Role Definition: Job design involves creating and defining
individual job roles within the organization. This includes determining job responsibilities,
required skills and qualifications, reporting relationships, and the scope of authority for
each position.
9
7. Forming Teams and Departments: Based on the organizational structure, teams
and departments are formed to carry out specific functions within the organization.
Each team has a defined set of responsibilities and objectives aligned with the overall
goals of the enterprise.
8. Staffing and Recruitment: Once the roles and departments are defined, the
organization proceeds to hire and recruit employees. The recruitment process involves
sourcing, interviewing, and selecting the best candidates who fit the required skills and
qualifications.
9. Training and Development: To ensure that employees are equipped with the
necessary skills and knowledge, training and development programs are conducted.
This helps enhance their capabilities and productivity in their respective roles.
10. Establishing Communication Channels: Effective communication is essential for
the smooth functioning of an organization. Organizations need to establish clear and
efficient communication channels to facilitate the flow of information between
employees, departments, and management.
11. Implementing Technology and Systems: In the modern business landscape,
technology plays a crucial role in streamlining operations and improving efficiency.
Organizations need to implement relevant technologies and systems to support their
activities and processes.
12. Performance Management and Feedback: Regular performance evaluations
and feedback sessions help monitor employee progress and identify areas for
improvement. Constructive feedback motivates employees and promotes continuous
growth.
13. Continuous Evaluation and Improvement: Organizing an enterprise is an
ongoing process. Regular evaluation of the organizational structure, policies, and
processes is necessary to identify areas that need improvement and to adapt to
changing market dynamics.
2. b) Identify the following cloud service types and list their characteristics and
advantage
Cisco WebEx, Google App Engine, Amazon EC2. -10Marks
10
■ Sharing Task Is Easy
■ Best Platform For Education Sector
■ Stream Live Meetings On Social Media
• Reasonable Subscription Plans
Section-II
3. a) BookMyShow is an online movie ticket booking application that helps its user
11
to book movie tickets by logging in. Users can find their movie from the listings.
After booking is confirm the details are sent to user.. Identify and write the user
stories
for this application. -12
a) Registration
1. Sign-up:
As an unauthorized user, I want to sign up for the BookMyShow application through a
sign-up
form, so that I can access to movies list.
Acceptance Criteria:
1. While signing up-Use Name, Username, Email, and Password and Confirm
Password.
2. If sign up is successful, it will get automatically logged in.
3. If I sign up with an incorrect detail which are specified in step1, I will receive an error
Message for incorrect information.
4. If we are trying to sign up with an existing email address, we will receive an error
Message saying "email exists."
2. Login
As an authorized user, I want to log in for BookMyShow application, so that I can have
access to the application.
Acceptance Criteria:
1. While logging in, Username and password are required.
2. After successful log in, it will be redirected to the main page.
3. If we are trying to login with incorrect username or password, then error message will
be
displayed as "invalid login”.
3. Searching a movie
As an authorized user, I want to search for a movie in BookMyShow application, so
that I can book a movieticket in a specific theater.
Acceptance Criteria:
1 .While searching, Valid theater should be specified.
2. Checking for availability of a movieticket on specific date always should be
current date and ahead of the current date.
4. Booking ticket
As an authorized user, I want to book a ticket in BookMyShow application, so that I can
reserve the seat in a specific theater and date.
Acceptance Criteria:
1. While Booking, accommodation should be allotted according to the room size.
2. One should select the valid payment method based on the price of reserved room.
3. After successful payment one should get the booking details to registered mobile
Number and E-mail id.
5. Logout
As an authorized user, I want to log out of application, so that I can prevent
unauthorized access of my profile.
12
Acceptance Criteria: When I log out of my account, I will be redirected to the log-in
page.
By following these test cases, you can ensure that your online ticket booking system is
reliable and user-friendly. Thorough testing will help you identify and fix any issues
before your system goes live, ensuring a positive experience for your customers.
4. a) Swiggy is an online food ordering application that helps its users to buy variety
of
authentic food items. This application allows users to log in for ordering food.
13
Users can
search for their favorite food based on rating or price. Users can select the items
and add
to the cart.Once the selection made go to payment page and make payment.
write the user
stories for this application.
-12
Registration
Sign-up:
As a foodie, I want to sign up for Swiggy application through a New user form, so that I
can getaccess to order food of my favorite.
Acceptance Criteria:
• While signing up-Valid Phone Number/Email Id and OTP/Password.
• If sign up is successful, it will get automatically logged in.
• If I am trying to sign up with an invalid phone number/Email Id, I will receive an
error messageto enter a valid information.
• If we are trying to sign up with an existing phone number/Email Id, we will receive
an errormessage saying "you are already registered."
Login
As an authorized customer, I want to login for application, so that I can have access to
theapplication for searching and ordering food.
Acceptance Criteria:
• While logging in, Phone number/Email Id and OTP/Password are required.
• After successful log in, it will be redirected to the main page.
• If we are trying to login with incorrect mobile number/Email Id or OTP/Password,
then
error message will be displayed as "invalid credentials”.
Order Creation
As a customer,I should be able to browse through the menu and look at various food options
and restaurants and along with their price.
As a customer, I should be able to select items from the menu and add them to cart.
As a customer, I should have cart containing all the choosen items .
As a customer, I should be able to remove items from my cart or increase item count.
As a customer, I should be able to cancel my entire order.
As a customer, I should be able to view the items bill for my oder along with price of each item.
As a customer, I should be able to see the listing of restaurants selling food items.
Acceptance Criteria:
• Categorized menu with prices is visible and enabled with selection choices as
soon as the customer chooses items, the order is created in the database and is
visible to the customer.
• See a thumbnail image for each product
• Click to view details for product
• Add to cart from detail page
14
• Search for a item
• View food item by category
Order completion
As a customer, I should be able to provide feedback for service and the food.
Acceptance Criteria
• All the feedbacks are recorded in database for further improvement.
Logout
As a customer, I want to log out of application, so that I can prevent unauthorized
access of myprofile.
Acceptance Criteria:
• When I log out of my account, I will be redirected to the log-in page.
15
Test Cases For Cart Checkout Page
• Verify that user should be able to see added items into the cart.
• Verify that user is able to increase the quantity of the food items from the cart
page or not.
• Verify that user should be able to delete food items from the cart page.
• Verify that food price is displayed for the food items or not.
• Verify that user is able to edit delivery address or not.
• Verify that user is able to change delivery address or not.
• Verify that user is able to select payment method on cart checkout page.
• Verify that user is able to place order from the cart checkout page or not.
SECTION-III
5. a) Create a spring Boot application to maintain employee details such as employee id,
employee name, and department. Design entity or data JPA class, controller class and
repository. -12
create an Entity class for the Employee, a Controller class to handle HTTP requests, and
a Repository to interact with the database.
Entity Class (Employee.java):
import javax.persistence.Entity;
import javax.persistence.GeneratedValue;
import javax.persistence.GenerationType;
import javax.persistence.Id;
@Entity
public class Employee {
@Id
@GeneratedValue(strategy = GenerationType.IDENTITY)
private Long id;
16
Repository Interface (EmployeeRepository.java):
import org.springframework.data.jpa.repository.JpaRepository;
import org.springframework.stereotype.Repository;
@Repository
public interface EmployeeRepository extends JpaRepository<Employee, Long> {
}
import org.springframework.beans.factory.annotation.Autowired;
import org.springframework.http.HttpStatus;
import org.springframework.http.ResponseEntity;
import org.springframework.web.bind.annotation.*;
import java.util.List;
@RestController
@RequestMapping("/employees")
public class EmployeeController {
@Autowired
public EmployeeController(EmployeeRepository employeeRepository) {
this.employeeRepository = employeeRepository;
}
17
}
import org.springframework.boot.SpringApplication;
import org.springframework.boot.autoconfigure.SpringBootApplication;
@SpringBootApplication
public class EmployeeManagementApplication {
It simplify Java EE development thatIt shorten the code length and provide the
makesdevelopers more productive. easiestway to develop Web Applications.
18
The primary feature of the SpringThe primary feature of Spring
Frameworkisdependency injection. Boot is Autoconfiguration. It automatically
configuresthe classes based on the
requirement.
It helps to develop loosely coupledIt helps to create a stand-alone application
applications. with lessconfiguration.
To test the Spring project, we need to setSpring Boot offers embeddedserver such
up thesever explicitly. as Jetty and Tomcat, etc.
function App() {
// React States
const [errorMessages, setErrorMessages] = useState({});
const [isSubmitted, setIsSubmitted] = useState(false);
const errors = {
uname: "invalid username",
19
pass: "invalid password"
};
20
);
return (
<div className="app">
<div className="login-form">
<div className="title">Sign In</div>
{isSubmitted ? <div>User is successfully logged in</div> : renderForm}
</div>
</div>
);
}
ORM when compared to JDBC is easier to work with as it does all the work by itself.
It maps Java classes to the database variables via XML. While working with
domain-driven applications and in the case of complex object relationships, ORM is
mostly preferred but when the application is simple enough then it is better to use
JDBC.
ORM frameworks handles data coversion JDBC requires manual handling of data
automatically. conversion between the database
21
Object Relational Mapping Java Database Connectivity
The flow from Object/data to hibernate i.e. Whereas when the data is stored in the
the frontend part is based on the ORM database finally i.e., the backend part is
technique still based on JDBCin
SECTION-IV
7. a) Discuss how REST API is best over SOAP API illustrate.
-10
There is no direct comparison between SOAP and REST APIs. But there are some
points to be listed below which makes you choose better between these two web
services.
SOAP uses only XML for REST is not restricted to XML and its the choice
exchanging information in its to use like XML, JSON, Plain-text. Moreover,
message format. REST can use SOAP protocol but SOAP cannot
use REST.
22
SOAP is difficult to implement and REST is easy to implement and requires less
it requires more bandwidth. bandwidth such as smartphones.
Because it is XML based and relies It works with GET, POST, PUT, DELETE
on SOAP, it works with WSDL
SOAP cannot make use of REST REST can make use of SOAP because it is an
since SOAP is a protocol without architectural pattern having protocol.
any architectural pattern.
SOAP cannot make use of REST
23
• job to perform and use cases
The data objects are the logical constructs representing the data being used. The data
actions are the commands that are used on one or more data objects, possibly on
different types of data, to perform a task. The job to perform represents the function the
users are calling to fulfill their organizational roles. The jobs to perform may be captured
as use cases, user stories, or other documentation involving user input.
Microservices Architecture
24
As we can see the databases are also separated out.
ACID is an acronym that stands for atomicity, consistency, isolation, and durability.
Atomicity
Atomicity guarantees that all of the commands that make up a transaction are treated
as a single unit and either succeed or fail together. This is important as in the case of an
unwanted event, like a crash or power outage, we can be sure of the state of the
database. The transaction would have either completed successfully or been rollbacked
if any part of the transaction failed.
If we continue with the above example, money is deducted from the source and if any
anomaly occurs, the changes are discarded and the transaction fails.
Consistency
Consistency guarantees that changes made within a transaction are consistent with
database constraints. This includes all rules, constraints, and triggers. If the data gets
into an illegal state, the whole transaction fails.
Going back to the money transfer example, let’s say there is a constraint that the
balance should be a positive integer. If we try to overdraw money, then the balance
won’t meet the constraint. Because of that, the consistency of the ACID transaction will
be violated and the transaction will fail.
25
Isolation
Isolation ensures that all transactions run in an isolated environment. That enables
running transactions concurrently because transactions don’t interfere with each other.
For example, let’s say that our account balance is $200. Two transactions for a $100
withdrawal start at the same time. The transactions run in isolation which guarantees
that when they both complete, we’ll have a balance of $0 instead of $100.
Durability
Durability guarantees that once the transaction completes and changes are written to
the database, they are persisted. This ensures that data within the system will persist
even in the case of system failures like crashes or power outages.
A REST controller class using Spring Boot to perform CRUD operations on a Product
entity. I'll also provide the corresponding request and response DTOs (Data Transfer
Objects) to handle the data sent to and received from the API.
Product entity
Product.java
import javax.persistence.Entity;
import javax.persistence.GeneratedValue;
import javax.persistence.GenerationType;
import javax.persistence.Id;
@Entity
public class Product {
@Id
@GeneratedValue(strategy = GenerationType.IDENTITY)
private Long id;
private String productName;
private String productCategory;
private double price;
// Constructors, getters, and setters
}
ProductRequestDTO:
// ProductRequestDTO.java
26
public class ProductRequestDTO {
private String productName;
private String productCategory;
private double price;
// Constructors, getters, and setters
}
ProductResponseDTO:
// ProductResponseDTO.java
ProductController:
// ProductController.java
import org.springframework.beans.factory.annotation.Autowired;
import org.springframework.http.HttpStatus;
import org.springframework.http.ResponseEntity;
import org.springframework.web.bind.annotation.*;
import java.util.List;
import java.util.stream.Collectors;
@RestController
@RequestMapping("/api/products")
public class ProductController {
@Autowired
public ProductController(ProductService productService) {
this.productService = productService;
}
27
return new ResponseEntity<>(responseDTO, HttpStatus.CREATED);
}
28
responseDTO.setProductCategory(product.getProductCategory());
responseDTO.setPrice(product.getPrice());
return responseDTO;
}
}
SECTION-V
Docker Components
These are the Docker Components:
1. DOCKER CLIENT
The Docker client enables users to interact with Docker.
Docker runs in a client-server architecture that means docker client can connect to the
docker host
locally or remotely.
Docker client and host (daemon) can run on the same host or can run on different hosts
and communicate through sockets or a RESTful API.
The Docker client is the primary way that many Docker users interact with Docker.
When we use commands such as docker run, the client sends these commands to
docker daemon, whichcarries them out. The docker command uses the Docker API.
The Docker client can communicate with more than one daemon.
We can communicate with the docker client using the Docker CLI. We have some
commands through which we can communicate the Docker client. Then the docker
29
client passes those commands to the Docker daemon.
docker build ... docker run ... docker push ..etc.
2. DOCKER HOST
The Docker host provides a complete environment to execute and run applications. It
includesDockerdaemon, Images, Containers, Networks, and Storage.
a.Docker Daemon
Docker Daemon is a persistent background process that manages Docker images,
containers, networks, and storage volumes. The Docker daemon constantly listens for
Docker API requestsand processes them.
b.Docker Images:
Docker-images are a read-only binary template used to build containers. Images also
contain metadata that describe the container’s capabilities and needs.
• Create a docker image using the docker build command.
• Run the docker images using the docker run command.
• Push the docker image to the public registry like DockerHub using the docker push
command after pushed we can access these images from anywhere using
docker pull command.
• An image can be used to build a container. Container images can be shared
across teams within an enterpriseusing a private container registry, or shared with
the world using a public registrylike Docker Hub.
c) Docker Containers:
A container is a runnable instance of an image. We can create, start, stop, move, or
delete a container using the Docker API or CLI. We can connect a container to one or
more networks, attach storage to it, or even create a new image based on its current
state.
d) Docker Networking
Through the docker networking, we can communicate one container to other containers.
By default, we get three different networks on the installation of Docker – none, bridge,
and host. The none and host networks are part of the network stack in Docker. The
bridge networkautomatically creates a gateway and IP subnet and all containers that
belong to this network can talk to each other via IP addressing.
e) Docker Storage
A container is volatile it means whenever we remove or kill the container then all of its
datawill be lost from it. If we want to persist the container data use the docker storage
concept.
We can store data within the writable layer of a container but it requires a storage
driver. Interms ofpersistent storage, Docker offers the following options:
30
• Data Volumes
• Data-Volume Container
• Bind Mounts
3. DOCKER REGISTRIES
Docker-registries are services that provide locations from where we can store and
downloadimages.ADocker registry contains repositories that host one or more Docker
Images.
Public Registries include Docker Hub and Docker Cloud and private Registries can
also beused. Wecan also create our own private registry.
Push or pull image from docker registry using the following commandsdocker push
docker pulldocker run
The key differences between manual deployment and automated deployment are :
31
applications may vary without human
based on individual skill intervention. This
levels and the complexity consistency ensures that
of the application. the deployment process
is reliable and predictable.
Consistency and Human-based Automated deployment
Reproducibility deployment can lead to ensures consistency and
inconsistencies between reproducibility. The same
different environments deployment process is
(e.g., development, applied across all
testing, production). If the environments, reducing
same steps are not the risk of configuration
followed accurately, drift and errors.
issues may arise during
deployment.
Risk and Error Minimization Human error is a Automated systems can
significant risk in manual help minimize human
deployment. Typos, errors as the deployment
misconfigurations, or process is predefined
missed steps can lead to and thoroughly tested.
deployment failures and Automated rollback
downtime. mechanisms can also be
implemented to revert to
a stable state in case of
deployment issues.
Scalability and Complexity Manual deployment Automation can handle
becomes challenging and more complex
time-consuming as the deployments and scale
application and easily as it is designed to
infrastructure scale in size handle a wide range of
and complexity. scenarios. It is
well-suited for modern
microservices-based
architectures and
cloud-native applications.
Continuous Deployment and Implementing continuous Automated deployment is
Continuous Integration (CI/CD) deployment and a key enabler for CI/CD
continuous integration workflows, where
without automation is changes are
difficult and may not be automatically tested,
practical. integrated, and deployed
to production, often
multiple times a day.
10 a) Create a form to add a new product detail to the product catalogue using
React. -10
32
React component code for Productform.js
// Add code here to submit the data to the server or state management system.
// You can also reset the form fields after submission if needed.
};
return (
<form onSubmit={handleSubmit}>
<div>
<label htmlFor="productName">Product Name:</label>
<input
type="text"
id="productName"
value={productName}
onChange={(e) => setProductName(e.target.value)}
required
/>
</div>
<div>
<label htmlFor="description">Description:</label>
<textarea
id="description"
value={description}
onChange={(e) => setDescription(e.target.value)}
required
/>
</div>
<div>
<label htmlFor="price">Price:</label>
<input
type="number"
id="price"
value={price}
onChange={(e) => setPrice(e.target.value)}
required
33
/>
</div>
<button type="submit">Add Product</button>
</form>
);
};
10. b) Draw the CI/CD build process flow diagram for an online application and
explain each
component. -
10
The CI/CD build process flow diagram for an online application typically involves multiple
stages and components to automate the building, testing, and deployment of the
application. Below is a simplified representation of the CI/CD process flow.
User Acceptance
Deployment to
Testing (UAT)
Production
(Approval )
1. Source Code (Version Control): This is the central repository where developers store
and manage the application's source code. Popular version control systems include Git,
SVN, etc. Developers push code changes to this repository.
2. CI Server (Continuous Integration): The CI server monitors the version control
system for code changes. Whenever a new commit is pushed or a pull request is
submitted, the CI server is triggered. Its primary purpose is to automate the integration of
code changes into a shared repository and perform various automated tasks.
3. Automated Build (Build Server): Upon triggering, the CI server initiates an automated
build process. It compiles the source code, gathers dependencies, and generates a
build artifact (e.g., executable, binary, or container image). This artifact represents the
built application.
4. Automated Unit Tests and Code Analysis: After the build, the CI server runs
34
automated unit tests to check the functionality and correctness of the application.
Additionally, it may perform static code analysis to identify potential issues, bugs, or
code style violations.
5. Automated Testing Environment: This is an isolated environment where the
application is deployed for automated testing. It simulates the production environment
but may have fewer resources. Automated integration tests, regression tests, and other
tests are conducted here.
6. Deployment to Staging Environment: If all the previous stages (build and automated
tests) are successful, the application is deployed to a staging environment. The staging
environment is a near-production replica where final testing is conducted before going
live.
7. User Acceptance Testing (UAT): In this phase, the application is tested by actual
users (typically non-technical stakeholders) to ensure it meets business requirements
and user expectations.
Deployment to Production: Upon successful UAT and approval, the application is
deployed to the production environment, making it available to end-users.
CERTIFICATE
Certified that, as per the guidelines the question paper and the model
answers are prepared and typed by me for the course Full Stack
Development-20CS52I and they are found correct according to my
knowledge.
THARA B S
Lecturer in CS& E
Government Polytechnic,
Tumakuru
35