Quiznetik

Software Testing | Set 3

1. Which of these primary objectives have to be achieved for the requirement model?

Correct : D. All mentioned above

2. Which of the following is not a functional testing technique?

Correct : C. Regression Testing

3. Decision tables are useful in situations where

Correct : B. Number of combinations of actions is taken under varying sets of conditions.

4. ‘Causes’ and ‘Effects’ are related to

Correct : A. Input and Output

5. If ‘n’ represents the number of variables in a program then Boundary Value analysis yields how many test cases

Correct : B. 4n+1

6. For a function of ‘n’ variables, the robustness testing will yield how many cases

Correct : A. 6n+1

7. In decision tables, which of the following is true?

Correct : A. Number of test cases is equal to number of rules (columns)

8. Cyclomatic complexity is equal to

Correct : A. Number of independent paths

9. Data flow testing is related to

Correct : D. None of the above

10. In data flow testing, objective is to find

Correct : C. All du-paths that are not dc-paths

11. Every node is represented by

Correct : A. One row and one column in graph matrix

12. The testing technique that requires devising test cases to demonstrate that each program function is operational is called

Correct : A. black-box testing

13. What types of errors are missed by black-box testing and can be uncovered by whitebox testing?

Correct : D. Typographical errors

14. Black-box testing attempts to find errors in which of the following categories

Correct : D. All of the above

15. What is an equivalence partition (also known as an equivalence class)?

Correct : B. An input or output range of values such that only one value in the range becomes a test case

16. Functional system testing is:

Correct : C. Testing the end to end functionality of the system as a whole

17. One of the fields on a form contains a text box which accepts alpha numeric values. Identify the Valid Equivalence class

Correct : C. Boo01k

18. Which of the following techniques is not a White box technique?

Correct : D. Boundary value analysis

19. What is the relationship between equivalence partitioning and boundary value analysis techniques?

Correct : B. Opaque testing

20. White Box Techniques are also called as

Correct : A. Structural Testing

21. The cyclomatic complexity metric provides the designer with information regarding the number of

Correct : D. Statements in the program

22. Condition testing is a control structure testing technique where the criteria used to design test cases is that they

Correct : C. Select test paths based on the locations and uses of variables

23. Data flow testing is a control structure testing technique where the criteria used to design test cases is that they

Correct : B. Exercise the logical conditions in a program module

24. Loop testing is a control structure testing technique where the criteria used to design test cases is that they

Correct : C. Select test paths based on the locations and uses of variables

25. An independent path is

Correct : A. Any path through DD path graph that introduces at least one new set of process statement or new condition

26. Cyclomatic complexity was developed by

Correct : B. T.J.McCabe

27. Cyclomatic complexity is denoted by

Correct : D. All of the above

28. The equation V(G)= No. of predicated nodes+1 is applicable only when node has

Correct : A. Two outgoing edges

29. The size of the graph matrix is

Correct : B. Number of nodes in the flow Graph

30. Data flow testing is related to

Correct : D. None of these

31. __________ testing assumes that the path of logic in a unit or program is known.

Correct : C. White Box testing

32. White Box techniques are also classified as

Correct : B. Structural testing

33. Exhaustive testing is

Correct : C. Impractical but possible

34. Which of the following is/are White box technique?

Correct : D. All of these

35. What are the various Testing Levels?

Correct : D. All of the mentioned

36. Boundary value analysis belongs to?

Correct : B. Black Box Testing

37. Alpha testing is done at

Correct : A. Developer’s end

38. SPICE stands for

Correct : C. Software Process Improvement and Capability Determination

39. Unit testing is done by

Correct : B. Developers

40. Behavioral testing is

Correct : B. Black box testing

41. Which of the following is black box testing

Correct : B. Boundary value analysis

42. Which of the following is not used in measuring the size of the software

Correct : C. Size of module

43. When code is made available to others, it goes in a/an

Correct : B. access-controlled library

44. What allows different projects to use the same source files at the same time?

Correct : A. Version Control

45. Why is decomposition technique required?

Correct : C. All of the mentioned

46. If a Direct approach to software project sizing is taken, size can be measured in

Correct : A. LOC

47. The expected value for the estimation variable (size), S, can be computed as a weighted average of the optimistic(Sopt), most likely (Sm), and pessimistic (Spess) estimates given as

Correct : B. EV = (Sopt + 4Sm + Spess)/6

48. How many forms exists of Barry Boehm’s COCOMO Model?

Correct : B. Three

49. Who suggested the four different approaches to the sizing problem?

Correct : D. Putnam and Myers

50. Which of the following is not one of the five information domain characteristics of Function Point (FP) decomposition?

Correct : C. External process

51. The main guide for selecting test cases is

Correct : C. Both (a) and (b)

52. Which of the following is not a risk reduction scheme?

Correct : D. None of the above

53. The potential problems are identified and their probabilities and impacts are given weights in which technique

Correct : B. Risk analysis

54. Risk exposure is given by which formula

Correct : A. It is the product of probability of occurrence of risk and its impact

55. A risk matrix

Correct : C. Both (a) and (b)

56. In diagonal band prioritisation scheme

Correct : A. Severity equals probability

57. Some managers found out that

Correct : B. Increased the number of test cases

58. Equivalence partitioning is a technique for?

Correct : A. Correction regression testing

59. The test cases derived from use cases

Correct : A. Are most useful in uncovering the defects in the process flows during real world use of the system.

60. Several techniques for using test execution information to prioritize test cases for regression testing include,

Correct : D. All of the above

61. Regression testing should be tightly linked to _________, and be built from the successful test cases developed and used in it.

Correct : A. Functional Testing

62. Use case scenario is:

Correct : B. An instance of a use case

63. Which is not an accepted strategy for data validity?

Correct : D. Reject non-effective data

64. Guidelines for generating validity checks should include the following:

Correct : D. All of the above

65. The most popular area of database testing is:

Correct : A. Websites

66. Use cases and use case diagrams are used to define:

Correct : D. Behaviour of a system

67. Any variable in a use case has:

Correct : A. At least one valid value and one invalid value

68. A selection variable in a form:

Correct : B. Has many options

69. Which is not the way to organize a risk matrix?

Correct : C. Threshold by available test cases

70. Which prioritization technique is used when we assign equal importance to ‘probability of occurrence’ and ‘Impact of problem’ in risk matrix?

Correct : B. Threshold by diagonal quadrant

71. In prioritizing what to test, the most important objective is to:

Correct : B. Test high risk areas

72. Test cases are prioritized so that:

Correct : B. We do the best testing in the time available

73. A regression test:

Correct : B. Will help to ensure that unchanged areas have not been affected

74. Which test cases are easy to identify?

Correct : C. Modification traversing

75. Regression testing process may include:

Correct : D. All of the above

76. Which regression test cases selection technique is more useful?

Correct : C. Select modification traversing test cases

77. Risk should include:

Correct : D. (a) and (b) both

78. Special requirements in a use case template define:

Correct : A. Business rules

79. Which is not an actor in use cases?

Correct : C. Keyboard

80. Which activity is performed in crisis situations and under greater time constraints?

Correct : A. Regression testing

81. Which of the following errors should not be tested when error handling is evaluated?

Correct : A. Error description is unintelligible

82. What is normally considered as an adjunct to the coding step

Correct : B. Unit testing

83. Which of the following is not regression test case?

Correct : D. Low-level components are combined into clusters that perform a specific software sub-function

84. Which testing is an integration testing approach that is commonly used when “shrinkwrapped” software products are being developed?

Correct : C. Smoke testing

85. In which testing level the focus is on customer usage?

Correct : D. Both Alpha and Beta

86. Risk management is one of the most important jobs for a

Correct : D. Project manager

87. Which of the following risk is the failure of a purchased component to perform as expected?

Correct : A. Product risk

88. Which of the following term is best defined by the statement: “There will be a change of organizational management with different priorities.”?

Correct : C. Management change

89. Which of the following term is best defined by the statement: “The underlying technology on which the system is built is superseded by new technology.”?

Correct : A. Technology change

90. What assess the risk and your plans for risk mitigation and revise these when you learn more about the risk?

Correct : A. Risk monitoring

91. Which of the following risks are derived from the organizational environment where the software is being developed?

Correct : A. People risks

92. Which of the following risks are derived from the software or hardware technologies that are used to develop the system?

Correct : B. Technology risks

93. The object of ___________within an OO system is to design tests that have a high likelihood of uncovering plausible bugs.

Correct : A. Fault-based testing

94. Which of the following is black-box oriented and can be accomplished by applying the same black-box methods discussed for conventional software?

Correct : D. Both Conventional testing and OO system validation testing

95. Software mistakes during coding are known as

Correct : C. bugs

96. Name an evaluation technique to assess the quality of test cases.

Correct : A. Mutation analysis

97. Which of the following is not a part of bug report?

Correct : D. LOC

98. Which testing integrates the set of classes required to respond to one input or event for the system?

Correct : B. thread-based testing

99. Which of the following is one of the steps in the integration testing of OO software?

Correct : A. cluster testing

100. __________ methods can be used to drive validations tests

Correct : B. Black-box testing