179
93.1k
Chapter:

210+ more mcqs Solved MCQs

in Software Testing

These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) , Bachelor of Business Administration in Computer Applications (BBA [CA]) , Bachelor of Business Administration (BBA) , Master of Computer Applications (MCA) .

Chapters

More MCQs
101.

__________ testing assumes that the path of logic in a unit or program is known.

A. Black Box testing
B. Performance Testing
C. White Box testing
D. Functional testing
Answer» C. White Box testing
102.

White Box techniques are also classified as

A. Design based testing
B. Structural testing
C. Error guessing technique
D. Strong testing
Answer» B. Structural testing
103.

Exhaustive testing is

A. Always possible
B. Practically possible
C. Impractical but possible
D. Impractical and impossible
Answer» C. Impractical but possible
104.

Which of the following is/are White box technique?

A. Statement Testing
B. Decision Testing
C. Condition Coverage
D. All of these
Answer» D. All of these
105.

What are the various Testing Levels?

A. Unit testing
B. System Testing
C. Integration Testing
D. All of the mentioned
Answer» D. All of the mentioned
106.

Boundary value analysis belongs to?

A. White Box Testing
B. Black Box Testing
C. Glass Testing
D. Alpha Testing
Answer» B. Black Box Testing
107.

Alpha testing is done at

A. Developer’s end
B. User’s end
C. Customer’s end
D. Tester’s end
Answer» A. Developer’s end
108.

SPICE stands for

A. Software Process Improvement and Compatibility Determination
B. Software Process Improvement and Control Determination
C. Software Process Improvement and Capability Determination
D. None of the mentioned
Answer» C. Software Process Improvement and Capability Determination
109.

Unit testing is done by

A. Users
B. Developers
C. Customers
D. Tester
Answer» B. Developers
110.

Behavioral testing is

A. White box testing
B. Black box testing
C. Grey box testing
D. Glass testing
Answer» B. Black box testing
111.

Which of the following is black box testing

A. Basic path testing
B. Boundary value analysis
C. Code path analysis
D. None of the mentioned
Answer» B. Boundary value analysis
112.

Which of the following is not used in measuring the size of the software

A. KLOC
B. Function Points
C. Size of module
D. Software Metric
Answer» C. Size of module
113.

When code is made available to others, it goes in a/an

A. hard drive
B. access-controlled library
C. servers
D. access control
Answer» B. access-controlled library
114.

What allows different projects to use the same source files at the same time?

A. Version Control
B. Access control
C. CM Process
D. Version Control and Access control
Answer» A. Version Control
115.

Why is decomposition technique required?

A. Software project estimation is a form of problem solving
B. Developing a cost and effort estimate for a software project is too complex
C. All of the mentioned
D. None of the mentioned
Answer» C. All of the mentioned
116.

If a Direct approach to software project sizing is taken, size can be measured in

A. LOC
B. FP
C. LOC and FP
D. None of the mentioned
Answer» A. LOC
117.

The expected value for the estimation variable (size), S, can be computed as a weighted average of the optimistic(Sopt), most likely (Sm), and pessimistic (Spess) estimates given as

A. EV = (Sopt + 4Sm + Spess)/4
B. EV = (Sopt + 4Sm + Spess)/6
C. EV = (Sopt + 2Sm + Spess)/6
D. EV = (Sopt + 2Sm + Spess)/4
Answer» B. EV = (Sopt + 4Sm + Spess)/6
118.

How many forms exists of Barry Boehm’s COCOMO Model?

A. Two
B. Three
C. Four
D. No form exists
Answer» B. Three
119.

Who suggested the four different approaches to the sizing problem?

A. Putnam
B. Myers
C. Boehm
D. Putnam and Myers
Answer» D. Putnam and Myers
120.

Which of the following is not one of the five information domain characteristics of Function Point (FP) decomposition?

A. External inputs
B. External outputs
C. External process
D. Internal Inputs
Answer» C. External process
121.

The main guide for selecting test cases is

A. To assess risks
B. To assess quality
C. Both (a) and (b)
D. None of the above
Answer» C. Both (a) and (b)
122.

Which of the following is not a risk reduction scheme?

A. Priority category scheme
B. Risk analysis
C. Interviewing
D. None of the above
Answer» D. None of the above
123.

The potential problems are identified and their probabilities and impacts are given weights in which technique

A. Priority categorization scheme
B. Risk analysis
C. Interviews
D. None of the above
Answer» B. Risk analysis
124.

Risk exposure is given by which formula

A. It is the product of probability of occurrence of risk and its impact
B. It is the sum of probability of its occurrence and its impact
C. It is the standard deviation of the sum of it’s probability and it’s impact
D. None of the above
Answer» A. It is the product of probability of occurrence of risk and its impact
125.

A risk matrix

A. Allows the testers to evaluate and rank potential problems by giving weights to probability or severity value as necessary
B. Allows testers to assign thresholds that classify the potential problems into priority categories
C. Both (a) and (b)
D. None of the above
Answer» C. Both (a) and (b)
126.

In diagonal band prioritisation scheme

A. Severity equals probability
B. Severity is never equal to probability
C. Either (a) or (b)
D. Both (a) and (b)
Answer» A. Severity equals probability
127.

Some managers found out that

A. Reducing the number of test cases
B. Increased the number of test cases
C. It does not affect the number of test cases
D. None of the above
Answer» B. Increased the number of test cases
128.

Equivalence partitioning is a technique for?

A. Correction regression testing
B. Retest-all strategy
C. Combinational explosion
D. None of the above
Answer» A. Correction regression testing
129.

The test cases derived from use cases

A. Are most useful in uncovering the defects in the process flows during real world use of the system.
B. Are most useful in uncovering the defects in the process flows during the testing use of the system.
C. Are most useful in covering the defects in the process flows during real world use of the system.
D. Are most useful in covering the defects at the integration level.
Answer» A. Are most useful in uncovering the defects in the process flows during real world use of the system.
130.

Several techniques for using test execution information to prioritize test cases for regression testing include,

A. Techniques that order test cases based on their total coverage of code components.
B. Techniques that order test cases based on their total coverage of code components not previously covered.
C. Techniques that order test cases based on their estimated ability to reveal faults in the code components that they cover.
D. All of the above
Answer» D. All of the above
131.

Regression testing should be tightly linked to _________, and be built from the successful test cases developed and used in it.

A. Functional Testing
B. Retesting
C. End to End testing
D. System Testing
Answer» A. Functional Testing
132.

Use case scenario is:

A. An input of a use case
B. An instance of a use case
C. An output of a use case
D. An information of a use case
Answer» B. An instance of a use case
133.

Which is not an accepted strategy for data validity?

A. Accept only known valid data
B. Reject known bad data
C. Sanitize all data
D. Reject non-effective data
Answer» D. Reject non-effective data
134.

Guidelines for generating validity checks should include the following:

A. Mandatory data inputs
B. Blank data inputs
C. Data range
D. All of the above
Answer» D. All of the above
135.

The most popular area of database testing is:

A. Websites
B. Networks
C. Scientific applications
D. Operating systems
Answer» A. Websites
136.

Use cases and use case diagrams are used to define:

A. Complexity of a system
B. Criticality of a system
C. Stability of a system
D. Behaviour of a system
Answer» D. Behaviour of a system
137.

Any variable in a use case has:

A. At least one valid value and one invalid value
B. At most one valid value
C. At most one invalid value
D. At most one valid value and one invalid value
Answer» A. At least one valid value and one invalid value
138.

A selection variable in a form:

A. Has one option
B. Has many options
C. Has no option
D. None of the above
Answer» B. Has many options
139.

Which is not the way to organize a risk matrix?

A. Threshold by quadrant
B. Threshold by diagonal quadrant
C. Threshold by available test cases
D. Threshold based on high impact of the problem
Answer» C. Threshold by available test cases
140.

Which prioritization technique is used when we assign equal importance to ‘probability of occurrence’ and ‘Impact of problem’ in risk matrix?

A. Threshold by quadrant
B. Threshold by diagonal quadrant
C. Threshold based on high impact of the problem
D. Threshold based on high probability of occurrence of problem
Answer» B. Threshold by diagonal quadrant
141.

In prioritizing what to test, the most important objective is to:

A. Find as many faults as possible.
B. Test high risk areas
C. Obtain good test coverage
D. Test easy areas
Answer» B. Test high risk areas
142.

Test cases are prioritized so that:

A. We shorten the time of testing
B. We do the best testing in the time available
C. We do more effective testing
D. We find more faults
Answer» B. We do the best testing in the time available
143.

A regression test:

A. Will always be automated
B. Will help to ensure that unchanged areas have not been affected
C. Will help to ensure that changed areas have not been affected
D. Will run during acceptance testing
Answer» B. Will help to ensure that unchanged areas have not been affected
144.

Which test cases are easy to identify?

A. Fault revealing
B. Modification revealing
C. Modification traversing
D. Bug revealing
Answer» C. Modification traversing
145.

Regression testing process may include:

A. Fault Identification
B. Code Modification
C. Test cases selection
D. All of the above
Answer» D. All of the above
146.

Which regression test cases selection technique is more useful?

A. Select all test cases
B. Select test cases randomly
C. Select modification traversing test cases
D. Select 50% of available test cases
Answer» C. Select modification traversing test cases
147.

Risk should include:

A. Probability of occurrence of a problem
B. Impact of that problem
C. Test cases
D. (a) and (b) both
Answer» D. (a) and (b) both
148.

Special requirements in a use case template define:

A. Business rules
B. Reliability requirements
C. Expectations of the users
D. Associated use cases
Answer» A. Business rules
149.

Which is not an actor in use cases?

A. External database
B. Administrator
C. Keyboard
D. Data entry operator
Answer» C. Keyboard
150.

Which activity is performed in crisis situations and under greater time constraints?

A. Regression testing
B. Development testing
C. Verification
D. Validation
Answer» A. Regression testing

Done Studing? Take A Test.

Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.