Software Testing Test
Which of the following are the
objectives of using a "test harness"?
a. Automating the testing process
b. Executing test suites of test
cases
c. Generating test reports
d.
Creating reusable test logic to reduce maintenance and improve test coverage
Consider the following code
fragment:
If(a>b) && (b<c)
{
b= (a+c)/2;
}
In the options given below, each of the three numbers in parentheses represents the inputs for a test case, where the first, second and third number represents a, b, c respectively of the code fragment. Keeping this in mind, find out which of the following options gives a set of test case inputs that achieves decision coverage for this fragment of code in the minimum number of test cases?
If(a>b) && (b<c)
{
b= (a+c)/2;
}
In the options given below, each of the three numbers in parentheses represents the inputs for a test case, where the first, second and third number represents a, b, c respectively of the code fragment. Keeping this in mind, find out which of the following options gives a set of test case inputs that achieves decision coverage for this fragment of code in the minimum number of test cases?
a. (5, 3, 2)
b. (5, 3, 2); (5, 4, 0)
c. (5, 4, 0); (4, 5, 0)
d.
(4, 5, 0); (5, 4, 5)
_________ testing is used to
evaluate and understand the application's reliability, scalability and
interoperability when more users are added or the volume of data is increased
a. Integration
b.
Performance
c. Regression
d. Stability
Which of the following strategies
are used for Integration testing?
a. Big Bang
b. Top-down
c. Bottom-up
d.
Any of the above strategies can be used
The determination of adherence or
non adherence to a compliance is carried out during:
a.
Inspection
b. Audit
c. White-box testing
d. Walkthrough
Which of the following is true
regarding Static Analysis tools?
a. They help you find defects rather
than failures
b. They are used by developers only
c. They require compilation of code
d.
All of the above
Identify the defect which can be
detected by Equivalence Partitioning Technique:
a. Improper handling of sequences of
events
b. Mis-handling of combinations of
conditions
c. Irregular handling of large and
small values
d.
Improper handling of input classes
e. Invalid output generation
Which of the following is false
about software testing?
a.
Top-down integration testing has as its major advantage that low level modules
never need testing
b. Alpha testing is in-house testing
performed by the test team
c. Equivalence partitioning is used
to minimize the number of permutations and combinations of input data
d. Fuzz testing provides random data
to the input of a program
The review of a technical document
such as requirements specs or a test plan, with the purpose of looking for
problems and seeing what is missing, without fixing anything is called:
a. Inspection
b. Black box testing
c. White box testing
d.
Walkthrough
What is the main reason for testing
a software immediately before releasing it?
a. To ensure that the system will
work after release
b.
To decide when the software is of sufficient quality to release
c. To find as many bugs as possible
before release
d. To give information for a risk
based decision about release
Which of the following types of
testing emulates the real world use of a system and verifies that the product
fulfills the intended requirements?
a. System testing
b. Model testing
c. Integration testing
d.
User acceptance testing
Which of the following tools
supports traceability, recording of incidents, and scheduling of tests?
a. Static analysis tool
b. Debugging tool
c.
Test management tool
d. Configuration management tool
Selecting the test inputs that are
likely to reveal a failure associated with a particular defect is an example of
the use of:
a.
Activity analysis
b. Defect taxonomy for test design
c. Root cause analysis
d. Cleanroom software development
Which of the following Security
testing concepts deals with the process of determining whether a requester is
allowed to receive a service or perform an operation?
a. Confidentiality
b. Integrity
c. Authentication
d.
Authorization
The process of using a test case to
test a specific unit of code, function, or capability is called:
a. Test Run
b.
Test Script
c. Test Plan
d. Test Scenario
Which of the following are benefits
of automated testing?
a.
reusability
b.
efficiency
c.
speed
d. allows testing of video and mp3
files
Usability testing indicates that the
design and system should be modified if:
a. people have difficulty in
understanding the instructions
b. people have difficulty in
manipulating the parts
c.
people have difficulty in interpreting the feedback
d. all of the above
Which of the following is not
included in Non-functional testing?
a. Load/Stress testing
b.
Unit testing
c. Security testing
d. Stress testing
Which of the following statements is
not true regarding capture/replay tools?
a. They are used to support
multi-user testing
b. They capture aspects of user
behavior
c. They are the most frequently used
types of CAST tools
d.
They are used to capture and playback user requirements
Which of the following is not a type
of Incremental testing approach?
a. Top-down
b.
Big-bang
c. Bottom-up
d. None of the above
In which type of testing is random
data generated for input into the software?
a. Smoke testing
b. Marge testing
c.
Fuzz testing
d. Operation testing
Which of the following is written by
a programmer and is meant to call the function to be tested by passing test
data to it?
a. Stub
b.
Driver
c. Proxy
Which of the following types of
testing is likely to benefit the most from the use of test tools that provide
the test capture and replay facilities?
a. Integration testing
b.
Regression testing
c. System testing
d. User acceptance testing
Which of the following statements is
incorrect in relation to Test Automation?
a. Test Automation is the process of
writing a computer program to do testing that would otherwise need to be done
manually
b. Test Automation is the use of
software to control the execution of tests and the comparison of actual
outcomes to predicted outcomes
c. Test Automation tools may provide
record and playback features that allow users to interactively record user
actions and replay it back any number of times
d.
Test Automation is the set of procedures used by organizations to ensure that a
software product will meet its quality goals at the best value to the customer
Which of the following models of
software development incorporates testing into the whole software development
life cycle?
a. Agile model
b. Waterfall model
c.
V-Model
d. Spiral model
When a defect is detected and fixed,
the software should be retested to confirm that the original defect has been
successfully removed. This is called:
a. Regression testing
b. Maintenance testing
c.
Confirmation testing
d. None of the above
What is the normal order of
activities in which software testing is carried out?
a.
Unit, Integration, System, Validation
b. System, Integration, Unit,
Validation
c. Unit, Integration, Validation,
System
d. None of the above
Which of the following testing
occurs outside the development environment?
a. Installation testing
b.
White-box testing
c. Module testing
d. Fuzz testing
In Bottom-up integration testing,
a. Major decision points are tested
in the early phase
b. No drivers need to be written
c.
No stubs need to be written
d. Regression testing is not
required
Which of the following is incorrect
for Black-box testing?
a. It takes an external perspective
of the test object to derive test cases
b. It is sometimes also called as
Opaque Testing, Functional Testing and Closed Box Testing
c.
It uses an internal perspective of the system to design test cases based on
internal structure
Which of the following options
correctly defines the term "test harness"?
a. It is a high level document
describing the principles, approach and major objectives of the organization
regarding testing
b. It is a set of test activities
collected into a manageable phase of a project
c.
It is a collection of software and test data configured to test a program unit
by running it under varying conditions and monitoring its behavior and outputs
d. It is a set of several test cases
for a component or a system under test
What is the difference between
Regression testing and Retesting?
a. Retesting is done by programmers
while Regression testing is done by testers
b. Retesting checks for unexpected
side-effects while Regression testing ensures that the original fault has been
corrected
c.
Retesting ensures that the original fault has been corrected while Regression
testing checks for other unexpected side-effects
d. There is no difference between
Regression testing and Retesting
Which of the following types of
errors are uncovered in White-box testing?
a. Performance errors
b.
Logical errors
c.
Typographical errors
d. Behavioral errors
The cursory examination of all the
basic components of a software system to ensure that they work is called:
a.
Fuzz testing
b. Black-box testing
c. Sanity testing
d. Smoke testing
Which of the following statements
holds true for Verification and Validation?
a. Verification is used to check if
we are doing the right thing and Validation is used to check whether we have
developed the software as per the client's requirements or not
b. Validation is used to check if we
are doing the right thing and Verification is used to check whether we have
developed the software as per the client's requirements or not
c.
Validation tells us what to test and Verification decides on the methodology to
go about testing the application
d. None of the above
Which of the following is true about
Sanity Testing?
a. A Sanity test is used to
determine if a small section of the application is still working after a minor
change
b.
A Sanity test is run to check if the build of an application is stable and it
can be considered for further testing
c. A Sanity test is the process of
testing to make sure that the older programming still works with the new
changes
d. All of the above are true
Which of the following test
activities provides the maximum potential cost savings from the use of
Computer-Aided Software Testing (CAST)?
a.
Test execution
b. Test planning
c. Test management
d. Test design
What is the name of the testing
method in which (for each pair of input parameters) all the possible discrete
combinations of parameters are passed on?
a. Single testing
b.
Pairwise testing
c. Unit testing
d. None of the above
Which of the following statements is
incorrect in relation to Smoke testing and Sanity testing?
a. A Smoke test is designed to touch
every part of the application in a cursory way whereas a Sanity test is used to
determine if a small section of the application is still working after a minor
change
b.
A Smoke test adopts a shallow and wide approach whereas a Sanity test is a
narrow regression test that focuses on one, or a few areas of functionality.
Sanity testing is usually narrow and deep
c. A Smoke test is usually
unscripted whereas a Sanity test is scripted either using a written set of
tests or an automated test
d. A Smoke test is a normal health
checkup to a build of an application before taking it to in-depth testing
whereas a Sanity test is to verify whether all requirements are met or not,
checking all features breadth-first
From the options given below which
of the dynamic program analysis technique is aimed at improving application
performance?
a. Code complexity analysis
b. Profiling
c.
Network packet sniffing
d. Spelling and grammar checking
e. Program slicing
What would be the appropriate result
of a Stress test at its peak?
a. A gradual performance slow-down leading
to a non-catastrophic system halt
b.
A gradual performance improvement leading to a catastrophic system halt
c. A gradual performance slow-down
leading to a catastrophic system halt
d. A gradual performance improvement
to a non-catastrophic system halt
Which of the following statements is
incorrect in relation to Code coverage?
a. It describes the degree to which
the source code of a program has been tested
b. It is a form of White-box testing
c.
It is a form of Black-box testing
Which of the following resources are
tested by most of the Stress testing tools?
a. Disk space
b. Network bandwidth
c. Internal memory
d.
All of the above
Which of the following is not a part
of System testing?
a. Recovery testing and failover
testing
b. Performance, Load and Stress
testing
c. Usability testing
d.
Top-down integration testing
Which of the following statements
about Equivalence partitioning is correct?
a.
A software testing design technique in which tests are designed to include
representatives of boundary values
b. A type of software testing used
for testing two or more modules or functions together with the intent of
finding interface defects between the modules or functions
c. It is the degree to which the
source code of a program has been tested
d. A software testing technique that
divides the input data of a software unit into partitions of data from which
test cases can be derived
Which of the following is not a
Static testing methodology?
a. Code review
b. Inspection
c. Walkthroughs
d.
System tests
What do you understand by the term
"Monkey test"?
a.
It is random testing performed by automated testing tools
b. It is used to simulate the
actions a user might perform
c. It is another name for Monitor
testing
From the following options, choose
the best example which represents a reliability failure for an application:
a. Slow response time
b. Excessive application consumption
c.
Random application termination
d. Failure to encrypt data
Choose the correct description of a
Stub in software testing:
a. A Stub is basically the same as a
driver except that it is very fast in returning results
b.
A Stub is a dummy procedure, module or unit that stands in for an unfinished
portion of a system
c. A Stub is just a different name
for an Emulator
d. None of the above
Beta testing is performed by:
a. An independent test team
b. The software development team
c. In-house users
d.
External users
The main focus of Black-box testing
is:
a. to check for logical errors
b. to ensure that each code
statement is executed once
c.
to test the functionality of the system as a whole
d. to identify all paths through the
software
What is Boundary value testing?
a. It tests values at and near the
minimum and maximum allowed values for a particular input or output
b. It tests different combinations
of input circumstances
c. It is a testing technique
associated with White-box testing
d.
Both a and b
Identification of set-use pairs is
accomplished during which of the following static analysis activities?
a. Control flow analysis
b.
Data flow analysis
c. Coding standards analysis
d. Function Point Analysis
Performance testing is used for
real-time systems only.
a.
True
b. False
Which one of the following is a
major benefit of verification early in the software development life cycle?
a. It allows the identification of
changes in user requirements
b. It facilitates timely set up of
the test environment
c.
It reduces defect multiplication
d. It allows testers to become
involved early in the project
The testing performed by external
organizations or standards bodies to give greater guarantees of compliance is
called:
a. Usability testing
b.
Conformance testing
c. Integration testing
d. System testing
In which of the following testing
methodologies does the test case generation use the system model?
a. Repetitive testing
b.
Model testing
c. Modular testing
d. System testing
The testing phase in which
individual software modules are combined and tested as a group is called:
a. Unit testing
b.
Integration testing
c. Module testing
d. White-box testing
In which of the following testing
methodologies does the automatic generation of efficient test
procedures/vectors use models of system requirements and specified
functionality?
a. Repetitive testing
b.
Model testing
c. Modular testing
d. System testing
0 comments:
Post a Comment