in Technology by
edited by
Testing can be done effectively only on a system connected to the internet. 1) False 2) True

2 Answers

0 votes
by
edited by
Correct Answer is False
0 votes
by
Verification is: 1). Checking that we are building the right system 2). Checking that we are building the system right 3). Performed by an independent test team 4). Making sure that it is what the user really wants A regression test: 1). Will always be automated 2). Will help ensure unchanged areas of the software have not been affected 3). Will help ensure changed areas of the software have not been affected 4). Can only be run during user acceptance testing When a new testing tool is purchased, it should be used first by: 1). A small team to establish the best way to use the tool 2). Everyone who may eventually have some use for the tool 3). The independent testing team 4). The vendor contractor to write the initial scripts Defect Management process does not include: 1). Defect prevention 2). Deliverable base-lining 3). Management reporting 4). None of the above If an expected result is not specified then: 1). We cannot run the test 2). It may be difficult to repeat the test 3). It may be difficult to determine if the test has passed or failed 4). We cannot automate the user inputs To test a function, the programmer has to write a ______, which calls the function and passes it test dat1). 1). Stub 2). Driver 3). Proxy 4). None of the above Equivalence partitioning is: 1). A black box testing technique used only by developers 2). A black box testing technique than can only be used during system testing 3). A black box testing technique appropriate to all levels of testing 4). A white box testing technique appropriate for component testing Which of the following could be a reason for failure: 1) Testing fault 2) Software fault 3) Design fault 4) Environment Fault 5) Documentation Fault 1). 2 is a valid reason; 1,3,4 & 5 are not 2). 1,2,3,4 are valid reasons; 5 is not 3). 1,2,3 are valid reasons; 4 & 5 are not 4). All of them are valid reasons for failure Test are prioritized so that: 1). You shorten the time required for testing 2). You do the best testing in the time available 3). You do more effective testing 4). You find more faults Which of the following is not a static testing technique: 1). Error guessing 2). Walkthrough 3). Data flow analysis 4). Inspections Which of the following statements about component testing is not true? 1). Component testing should be performed by development 2). Component testing is also known as isolation or module testing 3). Component testing should have completion criteria planned 4). Component testing does not involve regression testing During which test activity could fault be found most cost-effectively? 1). Execution 2). Design 3). Planning 4). Check Exit criteria completion Which, in general, is the least required skill of a good tester? 1). Being diplomatic 2). Able to write software 3). Having good attention to detail 4). Able to be relied on The purpose of the requirement phase is : 1). To freeze requirements 2). To understand user needs 3). To define the scope of testing 4). All of the above The process starting with the terminal modules is called – 1). Top-down integration 2). Bottom-up integration 3). None of the above 4). Module integration The inputs for developing a test plan are taken from : 1). Project plan 2). Business plan 3). Support plan 4). None of the above Function/Test matrix is a type of : 1). Interim Test report 2). Final test report 3). Project status report 4). Management report Cyclomatic Complexity method comes under which Testing method: 1). White box 2). Black box 3). Green box 4). Yellow box What is the difference between testing software developed by contractor outside your country, versus testing software developed by a contractor within your country? 1). Does not meet people needs 2). Cultural difference 3). Loss of control over reallocation of resources 4). Relinquishments of control Which of the following is not a characteristic for Testability? 1). Operability 2). Observability 3). Simplicity 4). Robustness Software Testing accounts for what percent of software development costs? 1). 10-20 2). 40-50 3). 70-80 4). 5-10 A reliable system will be one that: 1). Is unlikely to be completed on schedule 2). Is unlikely to cause a failure 3). Is likely to be fault-free 4). Is likely to be liked by the users How much testing is enough: 1). This question is impossible to answer 2). The answer depends on the risks for your industry, contract and special requirements 3). The answer depends on the maturity of your developers 4). The answer should be standardized for the software development industry Which of these can be successfully tested using Loop Testing methodology? 1). Simple Loops 2). Nested Loops 3). Concatenated Loops 4). All of the above Inspections can find all the following except: 1). Variables not defined in the code 2). Spelling and grammar faults in the documents 3). Requirements that have been omitted from the design documents 4). How much of the code has been covered

Related questions

0 votes
    Testing for buffer-overflow in a system can be done manually and has two possible ways. (a) True (b) False ... Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    _______________ is done only after the target user has connected to the server. (a) Server hacking (b) ... -for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    To join the internet, a computer has to be connected to networks through an Select the correct answer from above options...
asked Dec 19, 2021 in Education by JackTerrance
0 votes
    Testing can readily be done in production environment. False True...
asked Oct 25, 2020 in Technology by JackTerrance
0 votes
    A computer which is connected by the user to the phone for gaining internet access is called client/server/host/none of these Select the correct answer from above options...
asked Dec 24, 2021 in Education by JackTerrance
0 votes
0 votes
    A _____________ is a number of Internet-connected systems, where each of them is running one or more bots. ... -for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
+1 vote
    Which of the following can slow down your ability to deliver code effectively? (1)Enterprise Alignment (2)Test Automation (3)Technical Debt (4)Infrastructure as Code...
asked Oct 13, 2020 in Technology by JackTerrance
0 votes
    ______________ is an internet scam done by cyber-criminals where the user is convinced digitally to provide ... Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    I am trying to simulate the look and feel of a Firefox disabled text input: textarea and input text. ... Questions for Interview, JavaScript MCQ (Multiple Choice Questions)...
asked Feb 25, 2022 in Education by JackTerrance
0 votes
    I am trying to simulate the look and feel of a Firefox disabled text input: textarea and input text. ... Questions for Interview, JavaScript MCQ (Multiple Choice Questions)...
asked Feb 24, 2022 in Education by JackTerrance
0 votes
    In computer security _______ means that computer system assets can be modified only by authorized parities. A. integrity B. confidentiality C. authenticity D. availability...
asked Mar 12, 2023 in Technology by JackTerrance
0 votes
    So, let's consider group of Websocket applications. Each user is connected to one of these servers. I ... Questions for Interview, JavaScript MCQ (Multiple Choice Questions)...
asked Apr 21, 2022 in Education by JackTerrance
...