

McqMate
These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) , Bachelor of Business Administration in Computer Applications (BBA [CA]) , Bachelor of Business Administration (BBA) , Master of Computer Applications (MCA) .
Chapters
251. |
The main guide for selecting test cases is |
A. | To assess risks |
B. | To assess quality |
C. | Both (a) and (b) |
D. | None of the above |
Answer» C. Both (a) and (b) |
252. |
Which of the following is not a risk reduction scheme? |
A. | Priority category scheme |
B. | Risk analysis |
C. | Interviewing |
D. | None of the above |
Answer» D. None of the above |
253. |
The potential problems are identified and their probabilities and impacts are given weights in which technique |
A. | Priority categorization scheme |
B. | Risk analysis |
C. | Interviews |
D. | None of the above |
Answer» B. Risk analysis |
254. |
Risk exposure is given by which formula |
A. | It is the product of probability of occurrence of risk and its impact |
B. | It is the sum of probability of its occurrence and its impact |
C. | It is the standard deviation of the sum of it’s probability and it’s impact |
D. | None of the above |
Answer» A. It is the product of probability of occurrence of risk and its impact |
255. |
A risk matrix |
A. | Allows the testers to evaluate and rank potential problems by giving weights to probability or severity value as necessary |
B. | Allows testers to assign thresholds that classify the potential problems into priority categories |
C. | Both (a) and (b) |
D. | None of the above |
Answer» C. Both (a) and (b) |
256. |
In diagonal band prioritisation scheme |
A. | Severity equals probability |
B. | Severity is never equal to probability |
C. | Either (a) or (b) |
D. | Both (a) and (b) |
Answer» A. Severity equals probability |
257. |
Some managers found out that |
A. | Reducing the number of test cases |
B. | Increased the number of test cases |
C. | It does not affect the number of test cases |
D. | None of the above |
Answer» B. Increased the number of test cases |
258. |
Equivalence partitioning is a technique for? |
A. | Correction regression testing |
B. | Retest-all strategy |
C. | Combinational explosion |
D. | None of the above |
Answer» A. Correction regression testing |
259. |
The test cases derived from use cases |
A. | Are most useful in uncovering the defects in the process flows during real world use of the system. |
B. | Are most useful in uncovering the defects in the process flows during the testing use of the system. |
C. | Are most useful in covering the defects in the process flows during real world use of the system. |
D. | Are most useful in covering the defects at the integration level. |
Answer» A. Are most useful in uncovering the defects in the process flows during real world use of the system. |
260. |
Several techniques for using test execution information to prioritize test cases for regression testing include, |
A. | Techniques that order test cases based on their total coverage of code components. |
B. | Techniques that order test cases based on their total coverage of code components not previously covered. |
C. | Techniques that order test cases based on their estimated ability to reveal faults in the code components that they cover. |
D. | All of the above |
Answer» D. All of the above |
261. |
Regression testing should be tightly linked to _________, and be built from the successful test cases developed and used in it. |
A. | Functional Testing |
B. | Retesting |
C. | End to End testing |
D. | System Testing |
Answer» A. Functional Testing |
262. |
Use case scenario is: |
A. | An input of a use case |
B. | An instance of a use case |
C. | An output of a use case |
D. | An information of a use case |
Answer» B. An instance of a use case |
263. |
Which is not an accepted strategy for data validity? |
A. | Accept only known valid data |
B. | Reject known bad data |
C. | Sanitize all data |
D. | Reject non-effective data |
Answer» D. Reject non-effective data |
264. |
Guidelines for generating validity checks should include the following: |
A. | Mandatory data inputs |
B. | Blank data inputs |
C. | Data range |
D. | All of the above |
Answer» D. All of the above |
265. |
The most popular area of database testing is: |
A. | Websites |
B. | Networks |
C. | Scientific applications |
D. | Operating systems |
Answer» A. Websites |
266. |
Use cases and use case diagrams are used to define: |
A. | Complexity of a system |
B. | Criticality of a system |
C. | Stability of a system |
D. | Behaviour of a system |
Answer» D. Behaviour of a system |
267. |
Any variable in a use case has: |
A. | At least one valid value and one invalid value |
B. | At most one valid value |
C. | At most one invalid value |
D. | At most one valid value and one invalid value |
Answer» A. At least one valid value and one invalid value |
268. |
A selection variable in a form: |
A. | Has one option |
B. | Has many options |
C. | Has no option |
D. | None of the above |
Answer» B. Has many options |
269. |
Which is not the way to organize a risk matrix? |
A. | Threshold by quadrant |
B. | Threshold by diagonal quadrant |
C. | Threshold by available test cases |
D. | Threshold based on high impact of the problem |
Answer» C. Threshold by available test cases |
270. |
Which prioritization technique is used when we assign equal importance to ‘probability of occurrence’ and ‘Impact of problem’ in risk matrix? |
A. | Threshold by quadrant |
B. | Threshold by diagonal quadrant |
C. | Threshold based on high impact of the problem |
D. | Threshold based on high probability of occurrence of problem |
Answer» B. Threshold by diagonal quadrant |
271. |
In prioritizing what to test, the most important objective is to: |
A. | Find as many faults as possible. |
B. | Test high risk areas |
C. | Obtain good test coverage |
D. | Test easy areas |
Answer» B. Test high risk areas |
272. |
Test cases are prioritized so that: |
A. | We shorten the time of testing |
B. | We do the best testing in the time available |
C. | We do more effective testing |
D. | We find more faults |
Answer» B. We do the best testing in the time available |
273. |
A regression test: |
A. | Will always be automated |
B. | Will help to ensure that unchanged areas have not been affected |
C. | Will help to ensure that changed areas have not been affected |
D. | Will run during acceptance testing |
Answer» B. Will help to ensure that unchanged areas have not been affected |
274. |
Which test cases are easy to identify? |
A. | Fault revealing |
B. | Modification revealing |
C. | Modification traversing |
D. | Bug revealing |
Answer» C. Modification traversing |
275. |
Regression testing process may include: |
A. | Fault Identification |
B. | Code Modification |
C. | Test cases selection |
D. | All of the above |
Answer» D. All of the above |
276. |
Which regression test cases selection technique is more useful? |
A. | Select all test cases |
B. | Select test cases randomly |
C. | Select modification traversing test cases |
D. | Select 50% of available test cases |
Answer» C. Select modification traversing test cases |
277. |
Risk should include: |
A. | Probability of occurrence of a problem |
B. | Impact of that problem |
C. | Test cases |
D. | (a) and (b) both |
Answer» D. (a) and (b) both |
278. |
Special requirements in a use case template define: |
A. | Business rules |
B. | Reliability requirements |
C. | Expectations of the users |
D. | Associated use cases |
Answer» A. Business rules |
279. |
Which is not an actor in use cases? |
A. | External database |
B. | Administrator |
C. | Keyboard |
D. | Data entry operator |
Answer» C. Keyboard |
280. |
Which activity is performed in crisis situations and under greater time constraints? |
A. | Regression testing |
B. | Development testing |
C. | Verification |
D. | Validation |
Answer» A. Regression testing |
281. |
Which of the following errors should not be tested when error handling is evaluated? |
A. | Error description is unintelligible |
B. | Error noted does not correspond to error encountered |
C. | Error condition causes system intervention prior to error handling |
D. | Error description provide enough information to assist in the location of the cause |
Answer» A. Error description is unintelligible |
282. |
What is normally considered as an adjunct to the coding step |
A. | Integration testing |
B. | Unit testing |
C. | Completion of Testing |
D. | Regression Testing |
Answer» B. Unit testing |
283. |
Which of the following is not regression test case? |
A. | A representative sample of tests that will exercise all software functions |
B. | Additional tests that focus on software functions that are likely to be affected by the change |
C. | Tests that focus on the software components that have been changed |
D. | Low-level components are combined into clusters that perform a specific software sub-function |
Answer» D. Low-level components are combined into clusters that perform a specific software sub-function |
284. |
Which testing is an integration testing approach that is commonly used when “shrinkwrapped” software products are being developed? |
A. | Regression Testing |
B. | Integration testing |
C. | Smoke testing |
D. | Validation testing |
Answer» C. Smoke testing |
285. |
In which testing level the focus is on customer usage? |
A. | Alpha Testing |
B. | Beta Testing |
C. | Validation Testing |
D. | Both Alpha and Beta |
Answer» D. Both Alpha and Beta |
286. |
Risk management is one of the most important jobs for a |
A. | Client |
B. | Investor |
C. | Production team |
D. | Project manager |
Answer» D. Project manager |
287. |
Which of the following risk is the failure of a purchased component to perform as expected? |
A. | Product risk |
B. | Project risk |
C. | Business risk |
D. | Programming risk |
Answer» A. Product risk |
288. |
Which of the following term is best defined by the statement: “There will be a change of organizational management with different priorities.”? |
A. | Staff turnover |
B. | Technology change |
C. | Management change |
D. | Product competition |
Answer» C. Management change |
289. |
Which of the following term is best defined by the statement: “The underlying technology on which the system is built is superseded by new technology.”? |
A. | Technology change |
B. | Product competition |
C. | Requirements change |
D. | None of the mentioned |
Answer» A. Technology change |
290. |
What assess the risk and your plans for risk mitigation and revise these when you learn more about the risk? |
A. | Risk monitoring |
B. | Risk planning |
C. | Risk analysis |
D. | Risk identification |
Answer» A. Risk monitoring |
291. |
Which of the following risks are derived from the organizational environment where the software is being developed? |
A. | People risks |
B. | Technology risks |
C. | Estimation risks |
D. | Organizational risks |
Answer» A. People risks |
292. |
Which of the following risks are derived from the software or hardware technologies that are used to develop the system? |
A. | Managerial risks |
B. | Technology risks |
C. | Estimation risks |
D. | Organizational risks |
Answer» B. Technology risks |
293. |
The object of ___________within an OO system is to design tests that have a high likelihood of uncovering plausible bugs. |
A. | Fault-based testing |
B. | Integration testing |
C. | Use-based testing |
D. | Scenario-based testing |
Answer» A. Fault-based testing |
294. |
Which of the following is black-box oriented and can be accomplished by applying the same black-box methods discussed for conventional software? |
A. | Conventional testing |
B. | OO system validation testing |
C. | Test case design |
D. | Both Conventional testing and OO system validation testing |
Answer» D. Both Conventional testing and OO system validation testing |
295. |
Software mistakes during coding are known as |
A. | errors |
B. | failures |
C. | bugs |
D. | defects |
Answer» C. bugs |
296. |
Name an evaluation technique to assess the quality of test cases. |
A. | Mutation analysis |
B. | Validation |
C. | Verification |
D. | Performance analysis |
Answer» A. Mutation analysis |
297. |
Which of the following is not a part of bug report? |
A. | Test case |
B. | Output |
C. | Software Version |
D. | LOC |
Answer» D. LOC |
298. |
Which testing integrates the set of classes required to respond to one input or event for the system? |
A. | cluster testing |
B. | thread-based testing |
C. | use-based testing |
D. | none of the mentioned |
Answer» B. thread-based testing |
299. |
Which of the following is one of the steps in the integration testing of OO software? |
A. | cluster testing |
B. | thread-based testing |
C. | use-based testing |
D. | none of the above |
Answer» A. cluster testing |
300. |
__________ methods can be used to drive validations tests |
A. | Yellow-box testing |
B. | Black-box testing |
C. | White-box testing |
D. | All of the mentioned |
Answer» B. Black-box testing |
Done Studing? Take A Test.
Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.