You are on page 1of 8

Unit. Sr.

No. No. Question Option 1 Option 2 Option 3 Option 4


1 1 Concept of "Total Quality" was created in ______. Japan US UK South Korea
1 2 Quality can be defined as Conformance to _________. Specification Market Developer Company
Quality can be recongnized but not defined. This is called as the _________
1 3 view of quality Transcendental User Product Manufacturing

1 4 "Quality is fitness for purpose". This is called as the ______ view of quality. Product User Transcendental Manufacturing
When Quality depends on the amount which the customer is willing to pay,
1 5 it is called as _____. User Manufacturing Value Product
The cost which arises from the efforts to prevent defects is called as
1 6 ________. Appraisal cost Prevention cost Failure cost Miscellaneous cost
The cost which aries from defects like rework, repair etc. are called as
1 7 ________. Internal Failure Cost External Failure Cost Appraisal Cost Prevention Cost
The cost which aries from tasks like helpline support, warranty etc. are
1 8 called as ________. Appraisal Cost Prevention Cost Internal Failure Cost External Failure Cost
1 9 Cost of Quality = Cost of Control + _________ Cost of Failure of Control Appraisal Cost Cost of Internal Failure Prevention Cost
______ is the conformity of the software with the actual requirements and
1 10 specifications Reliability Performance Security Functionality
______ is the degree to which an application is protected against malicious
1 11 attacks. Reliability Security Performance Functionality
______ is the ability of the program to adapt to possible changes in its
1 12 requirements. Flexibility Functionality Security Performance
______ is the ability of an application to consistently perform the required
1 13 function on demand with failure. Reliability Performance Usability Security
1 14 ______ is the ease of use and learning ability of the system. Performance Reliability Functionality Usability
1 15 "Delivering the right product" is part of _________ view of quality. Customer Developer Supplier Market

______ principle of TQM (Total Quality Management) aims to create a


1 16 culture where employees feel involved with the organizaiton. Total Employee involvement Total Staff involvement Member involvement Resource involvement

______ principle of TQM (Total Quality Management) aims to create proper


1 17 functioning between units of the organization. Integrated System Combined System Department System Staff System
1 18 The cycle of Improvement Sequence is: Define, Monitor, Measure, Control, Improve Define, Measure, Monitor, Improve, Control
Define, Monitor, Measure, Improve, Control Define, Measure, Monitor, Control, Improve
Communication in TQM (Total Quality Management) can be based on which
1 19 of the following? Strategies Methods Timelines All of the above
The most successful tool used for Statistical Process Control (SPC) is
1 20 _______. Gantt Chart Control Chart Line Chart Bar Chart
Which among the following are included among the principles of TQM
1 21 (Total Quality Management)? Process-centered Customer-focused Integrated System All of the above
Organizational ________ refers to the pattern of shared values, beliefs etc.
1 22 within an organization. Setting Focus Culture Morals

1 23 The way to act and think within an organization is influenced by _________. Organizational Setting Organizational Culture Organizational Focus Organizational Morals
1 24 Organizational culture can include which of the following? Written rules Unwritten rules Beliefs All of the above
1 25 PDCA concept is related to? Process Improvement Process evaluation Process Selection None of the above
1 26 PDCA stand for ___________. Plan, Do, Change, Act Plan, Do, Check, Act Plan, Decide, Check, Act Plan, Do, Check, Arrange
1 27 What is termed as “Red Money”? Cost of Prevention Cost of Appraisal Cost of Failure Cost of Control
With respect to PDCA cycle- “ If any deviations are observed in actual
outcomes with respect to planned results the organization may need to
1 28 decide the actions” . This will come under which phase? Plan Do Change Act
1 29 Which of the following could be example of metrics for Software Quality? Number of tests executed Number of tests passed Number of tests failed All of the above
1 30 Which of these charts is used as a Problem solving Software Tool? Block diagram Flowchart Histogram Line chart
1 31 "Ishikawa diagram" is also known as ______. Fishbone diagram Linechart diagram Block diagram Flow diagram
1 32 Which of these are the components of a Fishbone diagram? Head Backbone Causes All of the above
Normally, Testing covers how much time of a Software Development
1 33 Lifecycle? 0 - 10 % 30 - 40 % 5 - 15 % 60 - 70 %
1 34 How is the concept of Productivity described for working projects? Output / Input Output x Input Output + Input Output - Input
1 35 Improvement in Quality has a ________ effect on Productivity. Positive Negative No effect Worsening
1 36 Which of the following are the mandatory way of doing things? Guidelines Standards Templates Format
__________ characteristic of a Software refers to its ability to be used in
1 37 most effective manner. Functionality Reliability Efficiency Maintainability
Ability to transform a software from one working platform to another is
1 38 called as ______. Security Portability Usability Functionality
1 39 Modifying the software to correct errors is referred to as ________. Efficiency Maintainability Portability Security
Abiliity to upgrade a software for more number of users is referred to as
1 40 ________. Scalability Portability Security Efficiency
Which of the following is the 3rd Tier of Quality Management System
1 41 Structure? Quality Manual Quality Policy Quality Objectives Quality Process
1 42
Users can be trained to use the software product during which phase of
1 43 SDLC? Deployment Maintainance Coding Testing
1 44 Which of the following is the example of an Application software? MS-Windows Word Processor Linux Unix
1 45 Which of the following is the example of a System software? Calculator Linux Word Processor Adode Photoshop
1 46 An Operating system can be considered an example of _________. Application Software Embedded Software System Software Non-system software
_________ is defined as the degree of impact a defect has on the
1 47 development of a Software. Severity Impact Effect Output
1 48 ________ defect affects the functionality of the software. Low Minor Major Small
1 49 Spelling mistake on a website is the example of a _____ level defect. Critical Major Minor Low
1 50 To become a billion dollar company could be termed as: Mission Goal Objective Vision
2 51 “One defect hides another defect” is termed as ? Camouflage Effect Cascading Effect Coverage Effect Redundant Code
2 52 Which of the following is not included in failure costs? rework repair failure mode analysis none of the mentioned
2 53 Which of the following is not included in External failure costs? Testing help line support warranty work complaint resolution
2 54 Which of the following is not an appraisal cost in SQA? inter-process inspection maintenance quality planning testing
The cost arises from efforts to prevent The cost arises form defects identified The cost arises from efforts to implement
2 55 What is prevention cost? defects. internally to correct them The cost arises from efforts to prevent cost. cost
_________ is define as the degree of impact a defect has on the
2 56 development of a component application being test. Quality Product Severity Process
___________ matrix is used to trace the requirement to the test that are
2 57 needed to verify whether the requirement are fulfilled Total quality management Requirement Traceability Requirement engineering Project Quality Management
____________ Testing is a type of software testing where we change
certain statements in the source code and check if the test case are able to
2 58 find error. Mutation Decision Table Big bang Boundary value
_________ is a version of the complete software tested by customer at his
2 59 or her own site without the developer being present. Alpha test Beta test Regression test System Testing
___________ is simply the input values to be passed to the system under
2 60 test. Test Plan Test Design Test Data Test Cases
________ is a document defines work products to be tested,how they will
2 61 tested and test type. Test Plan Test document Test case Test note
2 62 ___________ cost arises from efforts to defects. Appraisal Prevention Internal failure External failure.
A__________ document is a high level document defines software testing
2 63 approach to achieve testing objective. Test Plan Test Strategy Test case Test note
Which of the following defect attribute denotes the order in which defects
2 64 need to be fixed? Severity Priority Intensity Complexity
2 65 Which of the following term describes testing? Finding broken code A stage of all projects Evaluating deliverable to find error process of developing software
In which of the following testing strategies, a smallest testable unit is the
2 66 encapsulated class or object? Unit testing Integration testing System testing Component
2 67 Software mistakes during coding are known as errors failures bugs defects
2 68 Effective testing will reduce _______ cost. maintenance design coding documentation
2 69 Exhaustive testing is always possible practically possible impractical but possible impractical and impossible
In test team _________ is responsible for planning and execution of the
2 70 project and to ensure the success of a project QA leader Test analyst Test engineer Program manager
In test team _________ is responsible for executing test, gathereing and
2 71 managing test data and evaluate the outcome of each test. Test Analysts QA leader Program member Test engineer
In test team ___________ is responsible for writing and executing test cases
2 72 and reporting test defects. Test engineer test analyst program member QA leader
2 73 Cost of control= Prevention cost +_____________ Apprisal cost Internal failure cost External failure cost cost of control
2 74 Cost of Failure of control= internal Failure cost + _____________ Apprisal cost Internal failure cost External failure cost cost of control
The purpose of the _______________ document is to represent the testing
philosophy of the company as a whole and to provide a direction which the
2 75 resting department should ahere to and follow. Test policy Test plan Test case test data
2 76 What do you understand by V&V in software testing? Verified Version Version Validation Verification and Validation Version Verification
2 77 Which one of the following is not a phase of Prototyping Model? Quick Design Coding Prototype Refinement Engineer Product
2 78 What are the various Testing Levels? Unit Testing System Testing Integration Testing All the above
The Incremental Model is a result of combination of elements of which two
2 79 models? Build & FIX Model & Waterfall Model Linear Model & RAD Model Linear Model & Prototyping Model Waterfall Model & RAD Mode
Additional Functionality can be added at a
2 80 Identify the disadvantage of Spiral Model. Doesn’t work well for smaller projects High amount of risk analysis Strong approval and documentation control later date

2 81 Which two models doesn’t allow defining requirements early in the cycle? Waterfall & RAD Prototyping & Spiral Prototyping & RAD Waterfall & Spiral

2 82 Agile Software Development is based on Incremental Developmen Iterative Development Linear Development Both Incremental and Iterative Development
Only essential work products are
2 83 Which of the following does not apply to agility to a software process? Uses incremental product delivery strategy produced Eliminate the use of project planning and testing It is based on iterative model
Testing is conducted by the developer of Testing and debugging are different activities, but
Different testing techniques are appropriate the software or an independent test debugging must be accommodated in any testing
2 84 Which of the following is not a software testing generic characteristics? at different points in time group strategy None of the mentioned
2 85 Test cases should uncover errors like Nonexistent loop termination Comparison of different data types Incorrect logical operators or precedence All of the mentioned
2 86 In which testing level the focus is on customer usage? Alpha Testing Beta Testing Validation Testing both alpha and beta
What is the goal of the requirements analysis and specifications phase of understanding the customer requirements
2 87 software develoment life cycle? and organize them in an informal document Analyzing the cost of development Determine scope of the software designing model
Software tester focuses more on complex part of the software. Which of the
2 88 following testing principle implies this? Testing shows presence of defects Pesticide paradox Testing is context dependent Defect Clustering
2 89 Maintenance testing is performed using which methodology? Retesting Sanity testing Breadth test and depth test Confirmation testing
Following are fundamental test processes arranged randomly. What will be
the logical sequential flow of these activities.1. Test Closure activity
2. Implementation and execution
3. Evaluating exit criteria and Reporting
4. Analysis and Design
5. Planning and Control
2 90 5,4,2,1,3 5,2,3,4,1 5,4,2,3,1 5,2,4,3,1
2 91 Exit criteria is determined during Planning and Control Implementation and execution Evaluating exit criteria and Reporting Analysis and Design

If the same tests are repeated over and over Finding and fixing defects does not help if the
again , eventually the same set of test cases A small number of modules contain most Testing can show that defects are present , but can not system built is unusable and does not fulfill
2 92 What is pesticide paradox? will no longer find any new bugs of the defects prove that there are no defects the users need and expectations.
2 93 When testing principles are useful? During testing During execution During review Throughout life-cycle
2 94 Mutation testing is __________ type of testing Black box White Box yellow box Green box
2 95 Test cases are designed during which of the following stages? Test recording Test configuration Test planning Test specification
2 96 In the spiral model ‘risk analysis’ is performed In the first loop In every loop Before using the spiral model in first and second loop
2 97 Identify the disadvantage of the Spiral Model. Doesn’t work well for smaller projects High amount of risk analysis Strong approval and documentation control Earlier involvement of developer
A reasonable approach when a A useful approach when a customer The best approach to use for project with large Arisky model that rarely produces a
2 98 The Prototyping model of software development is requirements are well defined. cannot define requirements clearly development teams meaningful product
What are the four framework activities found in the Extreme
2 99 Programming(XP) process model analysis, design coding, testing planning,analysis,design,coding planning,analysis,coding,testing planning,design,coding,testing
2 100 Which is least required skill of a Tester? Good Programmer Reliable Attention to details Being diplomatic
3 101 What will be the next-date value for mm-dd-yy format for 07-31-2020? 08-31-2020 08/01/2020 07-32-2020 07/08/2021
When different combination of input requires different combination of Decision Table Boundary Value Analysis Equivalence Partition Decision Coverage
3 102 actions, which of the following technique is used in such situation?
3 103 Which of the following is/are White box technique? Statement Testing Boundary Value Analysis Error Guessing Equivalence Partitioning
3 104 Boundary value analysis belong to? White Box Testing Black Box Testing Grey Box Testing Red Box Testing
A city field in software accepts 3 to 25 alpha characters only. Using 2, 3, 25, 26 1, 3, 25, 27 2, 3, 25, 27 1, 3, 25, 27
3 105 Boundary Value Analysis technique what will be the possible number of
3 106 Which of the following is not a boundary value testing? Normal BVT Robust BVT Normal-Robust BVT Worst-case BVT
3 107 The independent considerations that apply to input domain testing are validity of inputs Validity of output Number of faults Errors
Stongly typed languages would include the following where ( states open
3 108 boundary and [denotes closed boundary (a,b] [a,b] (a,b) [a,b)
3 109 Which of the following is a fourth generation strongly typed language? Ada C Cobol Fortran
The basic idea to test normal boundary values are to check the given
3 110 options except minimum boundary nominal maximum boundary max+100
3 111 Real-time Boundary value problem does not include temperature pressure air commision problem
3 112 equivalence class testing does not include Weak -Robust Strong-Robust Weak Normal Normal-Normal
3 113 What will be the next-date value for mm-dd-yy format for 07-31-2020 08-31-2020 08/01/2020 07-32-2020 07/08/2021
In a decision-table for triangles there are ___________ways of creating an
3 114 isoseles triangle one two three four

3 115 Cause and effect graphs deploy the following discrete components except AND OR NOT Nor
Which second generation language uses statement labels to refer to target
3 116 paths for d-d graph FortranII C Ada Pascal
3 117 It is acceptable to create DD-Path graph for source code upto 50 lines 100 lines 200 lines 500 lines
3 118 In a weakly -coupled triplet one affects second One affects both One does not affect other All affect each other
AND conditions are ___________ coupled OR conditions are
3 119 _____________ coupled Strongly,strongly strongly, weakly weakly,weakly weakly,strongly
The mathematical notion of a “basis” has attractive possibilities for
3 120 __________ testing functional non-functional structural non-structural
3 121 McCabe Complexity can be calculated from the formula: v-n+2 v-n+3 v-n+4 v-n+5
3 122 A graph has 2 IF-conditions; what is itsMcCabe complexity? 1 2 3 4
A program has 4 slices in Slice Testing, the ___________ of all gives the
3 123 complete program Intersection Union difference SUM
The number of input variables to be tested in a Normal Boundary Value
3 124 system is 7 8 9 19
Boundary Value testing on NextDate program does not give _____________
3 125 results bad good poor excellent
3 126 Cyclomatic Complexity method comes under which testing method Black Box White box green box yellow box
A black box testing technique used only by A black box testing technique than can A black box testing technique appropriate to all levels A white box testing technique appropriate
3 127 Equivalence partitioning is: developers only be used during system testing of testing for component testing
3 128 Code Coverage is WhiteBox BlackBox GreyBox Green Box
3 129 A graph with McCabe complexity=3 has how many basis paths one two three four
3 130 Structured Testing includes the following except Path Coverage Call Coverage Loop Coverage Exit
3 131 Structured programming codes includes all except sequencing alteration iteration multiple exits from loops
In Robust Worst-Case Testing, there are ___ states and a total of ___ test
n n
3 132 cases will be generated. 7, 7 5,5 7,7 5,5
3 133 Robust Boundary Value Testing forces attention on ________. Exception Handling Error Input Output

Strong Normal Equivalence Class testing is based on the ______ assumption


3 134 which states that errors will result in a combination of faults. single multiple double random
_____ Testing is a hybrid of boundary value analysis and equivalence class
3 135 testing. Edge Robust Equivalence Robust Boundary Value Special Value
A Decision tables in which all the conditions are binary are called ______
3 136 Entry Decision Tables. Extended Limited Single Several
________ is a systematic approach where the different input combinations
and their corresponding system behaviour (output) are captured in a
3 137 tabular form. Cause Effect Graph Program Graph Equivalence Class Decision Table
______ coverage is when executed on the program, every node in the
3 138 program Graph is traversed. Edge Chain Program Node

Given a set of test cases for a program constitute ____________ if, when
3 139 executed on the program, every edge in the program Graph is traversed. Edge Coverage Path Coverage Chain Coverage Node Coverage
_________ slices S(v,n) refer to statement fragments that contribute to the
3 140 value of v at statement n. Forward Backward Upward Downward
DD-path graph is the directed graph in which_____ are DD-paths of its
program graph, and _______ represent control flow between successor DD-
3 141 paths. path,nodes nodes,edges edges,graph nodes,graph

3 142 When all the nodes are travesered in program graph then it is called as ____ graph coverage Edge coverage Node coverage path coverage
3 143 Which is type of coverage for exercising a set of rules such that each conditionDecesion is evaluated
coverage
to both true and false? condition coverage Statement coverage path coverage
3 144 Statement and branch coverage metrics are part of Analysis Model Design Model Testing Source Code
3 145 Statement coverage is also known as ______ Line coverage Path coverage Code coverage Decesion coverage
3 146 Major benefit of ............... is that it is greatly able to isolate the portion of code,
parameter
which could
coverage
not be executed. statement coverage Decision coverage Loop coverage
3 147 Cause-effect graphing is one form of: Structural testing Maintenance testing Regression testing Functional testing
3 148 The degree of an isolated node is always_____. 1 2 0 3
3 149 How the degree of node is calculated in directed graph? indeg(n) indeg(n)+outdeg(n) indeg(n)*2 outdeg(n)
3 150 The Decision to Decision (DD) path graph is an extension of a ________ program graph program graph path
Fitness of Use which is defined as the customer view of quality can also be
4 151 termed as_______________- Verification Validation Regression Confirmation
Conformance to requirement which is developer view of quality can also be
4 152 termed as___________- Verification Validation Regression Confirmation
4 153 One of the foolowing is not a component of verification workbench: Verification Process Process rework Standards Validation Process
which of the following is not considered as an official type of review in most
4 154 of the software verification processes Self Review Peer Review Inspection Walkthrough
4 155 __________isa formal type of review Self Review Peer Review Inspection Walkthrough
This audit checks whether all the requisite processes of delivery are
followed or not and whether the work product meets the delivery criteria or
4 156 not. Predelivery Audit Phase End Audit Periodic Audit Product Audit

In this review the author of the artifact presents it to all the team members
4 157 and the entire team discusses about the various aspects of the artifact Audit Superior Review Inspection Walkthrough

This is the one who leads the complete inspection process including
4 158 planning the inspection, running it, taking the follow up after the meeting. Manager Moderator Author Reviewer
4 159 In a typical inspection process which phase follows kickoff preparation Individual prepartion Inspection Meeting Planning for inspection Followup
_________decides the execution of the inspection,defines the
4 160 schedules,allocates time and defines objectives of inspection. Manager Moderator Author Reviewer
4 161 Name the step that is precedor to the step 'follow up' Decision on comment Inspection Meeting Planning for inspection Individual prepartion
name the audit that checks whether the phase defined in the SDLC model
4 162 achieves it outcome or not Predelivery Audit Phase End Audit Periodic Audit Product Audit
4 163 This is the person who prepares the artifact for inspection Scribe Moderator Author Reviewer
4 164 One of the following is not a a characteristic of nice domain orthogonal complete linear inconsistent
_____________testing invoves testing of software with software
environmental factors like database , operating system , where the
4 165 application is supposed to work. Interface testing Integration testing System Testing Unit Testing
Name the testing that involves testing of many units by combing them
4 166 together to form a module or sub module. Interface testing Integration testing System Testing Unit Testing
_______matrix starts with the requirements as stated in the requirement
4 167 specification and goes forward upto test results. Traceability Testing Specification Execution
This si a testing program based on specification like requirement
4 168 specification, design specification, user manual etc. Feature Coverage Specification Based Testing Functionality Coverage Integration Testing
4 169 One of the folowing is not included in levels of validation. Review Unit testing Integration Testing Acceptance testing

4 170 ____________testing involves stubs and drivers in the process of testing Review Unit testing Integration Testing Acceptance testing
4 171 This testing is termed as dynamic testing. valication testing verification testing requirement testing stress testing
Name the technique used to find heavily used path from other path present
4 172 the application where the control goes rarely. Path Sensitizing Path Profiling Path Testing Path reading
4 173 In this stratergy we find a defect or a bug that go through the paths Path Sensitizing Path Profiling Path Testing Path reading
the testing done to find whher the application is alive or not and also finds
4 174 whether the user can work with it or not. Interface testing Integration testing System Testing Smoke Testing
_________testing is done when the developemnt organisation wishes to
4 175 check that the uninstallation is clean or not. Updation testing Installation testing Pre-requisite testing Unstallation testing
4 176 __________ testing is an onsite acceptance test. Beta Gamma Alpha Unit
4 177 ________ testing is also known as field testing. Beta Gamma Alpha Unit
4 178 __________ is an offsite acceptance test. Alpha Gamma Beta Unit
_________ Testing is carried out at clients site by the end users or the stake
4 179 holders of the product. Beta Gamma Alpha Unit
_________ Testing is carried out at the end of software deveopment
4 180 process and before handing over the software to clients. Beta Gamma Alpha Unit
4 181 Find which of the following are the types of acceptance testing. Alpha Testing Beta Testing Both Alpha and Beta Testing Unit testing
4 182 Acceptance testing is also referred as ________ testing. Blue Box Red Box Grey Box White Box
_________ model explains the validation activities associated with different
4 183 phases of software development. Verification VV Waterfall validation
4 184 Program level designs are associated with _________ testing. Unit Componant Integration Acceptance
4 185 At the code level to validate individual units ________ testing is done. Unit Componant Integration Acceptance
Design phase testing is associated with _______ testing which covers design
4 186 specification as well as structural testing. Unit interface integration acceptance.
Which of the following in testing is not the characteristic of Good
4 187 Requirement. Adequate Clear Verifiable Complex
____________ should be consistent with the application development
4 188 methodology,schedules and deliverables. Test Case Test Scenario Test Plan Test Document
_________ develops a test plan to incorporate test strategies,define
4 189 schedules and methods of testing. Test Lead Project Manager Test Manager Moderator
4 190 ___________ is responsible for defining test strategies in testing. Test Lead Project Manager Test Manager Moderator
___________ is the most vital stage in software development where
4 191 product is actually built. Designing coding testing Maintainance
__________ describes verification and validation activities associated with
4 192 software development during the entire lifecycle. RAD Model Incremetal VV Model Validation Model
The project team along with architests and designers may walk through the
design to find the completeness and give comments, if any this process is
4 193 called as _______________. Design Validation Design Verification Design Implementation Prioritorisation
____________ is carried out through the inspection of requirement
4 194 specification. requiement Verification Design Verification Design Validation Requirement Validation.
____________ review helps in identification of errors with respect to
4 195 indenting,commenting and coding standards. Requirement Review Code Review Design Review Team Review
___________ is the final user group or people who are actually sponsoring
4 196 the project. Developers Managers Customers Testers
__________ team includes test managers,test leads and testers as per the
4 197 scope of testing. Development Analysis Testing Maintainance
__________ is a technique used for constructing the program structure
while at the same time carrying out tests to uncover errors related with
4 198 interfacing. Integration Testing Interface Testing System Testing Unit Testing
The testing that is done to verify the interface functionality is called
4 199 ____________. Integration Testing Interface Testing System Testing Unit Testing
4 200 _________ is not involved in System Testing. Developers Designer User Testers
___________ is conducted on whole integrated system to estimate the
5 201 systems compliance with its specified set of requirements. Integration Testing Interface Testing System Testing Unit Testing
5 202 ____________is largely a white box oriented. Module testing Integration Testing Design testing Proposal testing
5 203 Hybrid Integration Testing is also known as ____________. Big-Bang Integration Testing Sandwich Integration Testing Bottom-Up Integration Testing Integration Testing
5 204 Which testing is concerned with behavior of whole product as per specified requirements?
Acceptance testing Component testing System testing Integration testing
5 205 System architecture is determined during which phase? Requirement gathering Implementation Development Design
Verifying that whether software components are functioning correctly and
5 206 identifying the defects in them is objective of which level of testing? Integration testing Acceptance testing Unit testing System Testing
5 207 "Stubs" and "Drivers" are used is which type of testing? Alpha Testing Beta Testing Integration Testing Unit Testing
To verify that system separately testable modules are
5 208 What is the objective of integration testing? To verify that system is functioning accordingTo
to verify
specified
thatrequirements
system meets user expectation
functioning
and needs properly To verify that interfaces between different parts of system
5 209 _______________are the Testers of System Testing? Developers Business Analysts Independent Testers Customers
5 210 Faults are found most cost-effectively in which test activity? Design Execution Planning Release
5 211 which of this is an disadvantages of small code? Avoids huge coding Reusability reduces code size testing becomes easier None of the above
5 212 ________ Testing makes sure that the functionality of product is working as Functionality Testing Recoverability Testing Performance Testing Reliability Testing
5 213 ________ Testing makes sure that system's stability is maintained after Usability Testing Scalability Testing Regressive Testing Recoverability Testing
5 214 modifications.
________ Testing aims to test the limits of the System. Stress Testing Volume Testing GUI Testing Installation Testing
5 215 ________ principle of Security Testing, means that data should not be Vulnerability Authorization Integrity Denial of Service
5 216 ________ is a testing technique for writing test cases. Installation Testing Stress Testing Decision Table Testing Integration testing
5 217 Recovery Testing comprises of _________. System Recovery System Design System Coding System Maintainence
5 218 ______ Testing checks if the system is capable of handling errors. Unit Testing Integration Testing Error Handling Testing Installation Testing
In ________ Testing, we give same inputs in two different versions of the Operations Testing Parallel Testing Smoke Testing Installation Testing
5 219 software application.
5 220 CMM stands for __________. Capability Maturity Model Common Maturity Model Capability Modification Model Common Modification Model
5 221 How many process maturity levels are there? Five Two Three Four
5 222 This is not a valid level in CMM Adhoc Managed Defined Premature
5 223 "Design a little, Code a little, test a little" is used in Conventional languages RDBMS Assembly Language Machine Language
5 224 The cost of finding and correcting errors _______ with time. Increases Decreases Remains same Depends on Software
5 225 ________ Testing is performed without any proper planning. Ad Hoc Testing Interstate Testing Parallel Testing Execution Testing
5 226 COTS' stands for Common Object Training Standard Commercial Off the Shelf Call Online Training Standard Capability Off the Shelf
_________ is a Security Testing technique where we try different SQL injection Database injection Brute Force Attack Scripting Attack
5 227 combinations of username and password.
Functional Testing approach of an eBusiness/eCommerce can include
Performance of system User interfaces Online help Shopping Cart
5 228 __________
________ type of Integration includes combining all the modules at once. Big-Bang Testing Top-Down Testing Bottom-up Testing Sandwich Testing
5 229
5 230 Agile Methodology includes __________. Adhoc processes Repeatable process Change management and communication Following fixed plan
5 231 A GUI is ___________________ Software interface Hardware interface interpreter Language controller
5 232 A test technique that involves testing with various ranges of valid and invalid inputs
Gorilla of
Testing
a particular module or component functionality
Monkey Testing
extensively is ___________. Agile Testing Baseline Testing
5 233 Code must be ______________with design componenets. Clarity Traceable Maintainable Complete
5 234 A design must be ______________in all respect. Clarity Traceable Implementable Complete
5 235 RFP stands for ______________________ Request for Performance Request for Proposal Request for Potential Request for prediction
5 236 ______________represent the possible attacks on the system from outsider. Perpetrators Vulnerability Threats Penetration

5 237 ____________are the entities who are unwelcome guests in the system. Perpetrators Threats Penetration Implementation
______________is performed with the help of automated software to scan
5 238 a system to detect the known vulnerability patterns. Vulnerability scanning Security scanning Penetration scanning Threat scanning
___________categorizes the inputs and outputs of a category so as to check
them severely. This minimizes the number of cases that have to be
5 239 designed.` Random Testing Partition Testing Scenario-based Testing Class Testing
____________is a software and business process which allows businesses
5 240 to work through internet that is digitally. E-Business Testing E-Commerce Testing E-content Testing E-Learning Testing
5 241 COTS is the acronym for ______________ Commercial-Off-the-Shelf Commercial-Off-the-Shelt Commercial-Off-the-Self Commerce-Off-the-Shelf
5 242 A datawarehouse is which of the following? Can be uploaded by user Can be uploaded by developer Organized around important subject areas Contains only current data
5 243 __________is to check system performance with increased volume of data inRecovery
the database.
Testing complexity-testing Stress-testing volume-testing
5 244 How many types of performance testing techniques are there? one Four Two Three
5 245 Which techniqe is applied for usability testing? White-box testing Black-box testing Gray-box testing Combined to all testing
____________is the process of executing the code and comparing the
5 246 expected and actual results. Test Execution Test analyst Test process Test expert
5 247 ____________ is a testing technique in which the same inputs are entered in Parallel
two different
testingversions of the application and complexity-testing
reporting the anomalies Stress-testing volume-testing
5 248 Agile testing is unstructured as compared to the _________________ and thereSDLC
is minimal planning. Agile Parallel approach waterfall approach
5 249 ____________ is minimal and the test process less structured. Test process Test planning Test case test data
5 250 Acceptance testing is conducted at the ___________of each iteration Start Middle end every step

You might also like