1. Which of these primary objectives have to be achieved for the requirement model?
Correct : D. All mentioned above
2. Which of the following is not a functional testing technique?
Correct : C. Regression Testing
3. Decision tables are useful in situations where
Correct : B. Number of combinations of actions is taken under varying sets of conditions.
4. ‘Causes’ and ‘Effects’ are related to
Correct : A. Input and Output
5. If ‘n’ represents the number of variables in a program then Boundary Value analysis yields how many test cases
Correct : B. 4n+1
6. For a function of ‘n’ variables, the robustness testing will yield how many cases
Correct : A. 6n+1
7. In decision tables, which of the following is true?
Correct : A. Number of test cases is equal to number of rules (columns)
8. Cyclomatic complexity is equal to
Correct : A. Number of independent paths
9. Data flow testing is related to
Correct : D. None of the above
10. In data flow testing, objective is to find
Correct : C. All du-paths that are not dc-paths
11. Every node is represented by
Correct : A. One row and one column in graph matrix
12. The testing technique that requires devising test cases to demonstrate that each program function is operational is called
Correct : A. black-box testing
13. What types of errors are missed by black-box testing and can be uncovered by whitebox testing?
Correct : D. Typographical errors
14. Black-box testing attempts to find errors in which of the following categories
Correct : D. All of the above
15. What is an equivalence partition (also known as an equivalence class)?
Correct : B. An input or output range of values such that only one value in the range becomes a test case
16. Functional system testing is:
Correct : C. Testing the end to end functionality of the system as a whole
17. One of the fields on a form contains a text box which accepts alpha numeric values. Identify the Valid Equivalence class
Correct : C. Boo01k
18. Which of the following techniques is not a White box technique?
Correct : D. Boundary value analysis
19. What is the relationship between equivalence partitioning and boundary value analysis techniques?
Correct : B. Opaque testing
20. White Box Techniques are also called as
Correct : A. Structural Testing
21. The cyclomatic complexity metric provides the designer with information regarding
the number of
Correct : D. Statements in the program
22. Condition testing is a control structure testing technique where the criteria used to design test cases is that they
Correct : C. Select test paths based on the locations and uses of variables
23. Data flow testing is a control structure testing technique where the criteria used to design test cases is that they
Correct : B. Exercise the logical conditions in a program module
24. Loop testing is a control structure testing technique where the criteria used to design test cases is that they
Correct : C. Select test paths based on the locations and uses of variables
25. An independent path is
Correct : A. Any path through DD path graph that introduces at least one new set of process statement or new condition
26. Cyclomatic complexity was developed by
Correct : B. T.J.McCabe
27. Cyclomatic complexity is denoted by
Correct : D. All of the above
28. The equation V(G)= No. of predicated nodes+1 is applicable only when node has
Correct : A. Two outgoing edges
29. The size of the graph matrix is
Correct : B. Number of nodes in the flow Graph
30. Data flow testing is related to
Correct : D. None of these
31. __________ testing assumes that the path of logic in a unit or program is known.
Correct : C. White Box testing
32. White Box techniques are also classified as
Correct : B. Structural testing
33. Exhaustive testing is
Correct : C. Impractical but possible
34. Which of the following is/are White box technique?
Correct : D. All of these
35. What are the various Testing Levels?
Correct : D. All of the mentioned
36. Boundary value analysis belongs to?
Correct : B. Black Box Testing
37. Alpha testing is done at
Correct : A. Developer’s end
38. SPICE stands for
Correct : C. Software Process Improvement and Capability Determination
39. Unit testing is done by
Correct : B. Developers
40. Behavioral testing is
Correct : B. Black box testing
41. Which of the following is black box testing
Correct : B. Boundary value analysis
42. Which of the following is not used in measuring the size of the software
Correct : C. Size of module
43. When code is made available to others, it goes in a/an
Correct : B. access-controlled library
44. What allows different projects to use the same source files at the same time?
Correct : A. Version Control
45. Why is decomposition technique required?
Correct : C. All of the mentioned
46. If a Direct approach to software project sizing is taken, size can be measured in
Correct : A. LOC
47. The expected value for the estimation variable (size), S, can be computed as a weighted average of the optimistic(Sopt), most likely (Sm), and pessimistic (Spess) estimates given as
Correct : B. EV = (Sopt + 4Sm + Spess)/6
48. How many forms exists of Barry Boehm’s COCOMO Model?
Correct : B. Three
49. Who suggested the four different approaches to the sizing problem?
Correct : D. Putnam and Myers
50. Which of the following is not one of the five information domain characteristics of
Function Point (FP) decomposition?
Correct : C. External process
51. The main guide for selecting test cases is
Correct : C. Both (a) and (b)
52. Which of the following is not a risk reduction scheme?
Correct : D. None of the above
53. The potential problems are identified and their probabilities and impacts are given weights in which technique
Correct : B. Risk analysis
54. Risk exposure is given by which formula
Correct : A. It is the product of probability of occurrence of risk and its impact
55. A risk matrix
Correct : C. Both (a) and (b)
56. In diagonal band prioritisation scheme
Correct : A. Severity equals probability
57. Some managers found out that
Correct : B. Increased the number of test cases
58. Equivalence partitioning is a technique for?
Correct : A. Correction regression testing
59. The test cases derived from use cases
Correct : A. Are most useful in uncovering the defects in the process flows during real world use of the system.
60. Several techniques for using test execution information to prioritize test cases for regression testing include,
Correct : D. All of the above
61. Regression testing should be tightly linked to _________, and be built from the successful test cases developed and used in it.
Correct : A. Functional Testing
62. Use case scenario is:
Correct : B. An instance of a use case
63. Which is not an accepted strategy for data validity?
Correct : D. Reject non-effective data
64. Guidelines for generating validity checks should include the following:
Correct : D. All of the above
65. The most popular area of database testing is:
Correct : A. Websites
66. Use cases and use case diagrams are used to define:
Correct : D. Behaviour of a system
67. Any variable in a use case has:
Correct : A. At least one valid value and one invalid value
68. A selection variable in a form:
Correct : B. Has many options
69. Which is not the way to organize a risk matrix?
Correct : C. Threshold by available test cases
70. Which prioritization technique is used when we assign equal importance to ‘probability of occurrence’ and ‘Impact of problem’ in risk matrix?
Correct : B. Threshold by diagonal quadrant
71. In prioritizing what to test, the most important objective is to:
Correct : B. Test high risk areas
72. Test cases are prioritized so that:
Correct : B. We do the best testing in the time available
73. A regression test:
Correct : B. Will help to ensure that unchanged areas have not been affected
74. Which test cases are easy to identify?
Correct : C. Modification traversing
75. Regression testing process may include:
Correct : D. All of the above
76. Which regression test cases selection technique is more useful?
Correct : C. Select modification traversing test cases
77. Risk should include:
Correct : D. (a) and (b) both
78. Special requirements in a use case template define:
Correct : A. Business rules
79. Which is not an actor in use cases?
Correct : C. Keyboard
80. Which activity is performed in crisis situations and under greater time constraints?
Correct : A. Regression testing
81. Which of the following errors should not be tested when error handling is evaluated?
Correct : A. Error description is unintelligible
82. What is normally considered as an adjunct to the coding step
Correct : B. Unit testing
83. Which of the following is not regression test case?
Correct : D. Low-level components are combined into clusters that perform a specific software sub-function
84. Which testing is an integration testing approach that is commonly used when “shrinkwrapped” software products are being developed?
Correct : C. Smoke testing
85. In which testing level the focus is on customer usage?
Correct : D. Both Alpha and Beta
86. Risk management is one of the most important jobs for a
Correct : D. Project manager
87. Which of the following risk is the failure of a purchased component to perform as expected?
Correct : A. Product risk
88. Which of the following term is best defined by the statement: “There will be a change of organizational management with different priorities.”?
Correct : C. Management change
89. Which of the following term is best defined by the statement: “The underlying technology on which the system is built is superseded by new technology.”?
Correct : A. Technology change
90. What assess the risk and your plans for risk mitigation and revise these when you learn more about the risk?
Correct : A. Risk monitoring
91. Which of the following risks are derived from the organizational environment where the software is being developed?
Correct : A. People risks
92. Which of the following risks are derived from the software or hardware technologies that
are used to develop the system?
Correct : B. Technology risks
93. The object of ___________within an OO system is to design tests that have a high
likelihood of uncovering plausible bugs.
Correct : A. Fault-based testing
94. Which of the following is black-box oriented and can be accomplished by applying the same black-box methods discussed for conventional software?
Correct : D. Both Conventional testing and OO system validation testing
95. Software mistakes during coding are known as
Correct : C. bugs
96. Name an evaluation technique to assess the quality of test cases.
Correct : A. Mutation analysis
97. Which of the following is not a part of bug report?
Correct : D. LOC
98. Which testing integrates the set of classes required to respond to one input or event for
the system?
Correct : B. thread-based testing
99. Which of the following is one of the steps in the integration testing of OO software?
Correct : A. cluster testing
100. __________ methods can be used to drive validations tests