Defects discovered by static analysis tools include:
i. Variables that are never used.
ii. Security vulnerabilities.
iii. Programming Standard Violations
iv. Uncalled functions and procedures
a) i , ii,iii,iv is correct
b) iii ,is correct I,ii,iv are incorrect.
c) i ,ii, iii and iv are incorrect
d) iv, ii is correct

1 Answer

Answer :

a) i , ii,iii,iv is correct

Related questions

Description : Success Factors for a review include: i. Each Review does not have a predefined objective ii. Defects found are welcomed and expressed objectively iii. Management supports a good review process. iv. There is an emphasis on ... and ii is incorrect c) i , iii , iv , ii is in correct d) ii is correct

Last Answer : a) ii,iii,iv are correct and i is incorrect

Description : Which of the following helps in monitoring the Test Progress:- i. Percentage of Test Case Execution ii. Percentage of work done in test environment preparation. iii. Defect Information e.g. defect density, ... ii,iii are correct and iv is incorrect c) i,ii are correct and iii,iv are incorrect

Last Answer : b) i,ii,iii are correct and iv is incorrect

Description : Exit Criteria may consist of :- i. Thoroughness measures , such as coverage of code, functionality or risk ii. Estimates of Defect density or reliability measures. iii. Residual risk such as defects not fixed or ... correct and i,ii,iii are incorrect d) iii and iv are correct and i,ii are incorrect

Last Answer : b) i,ii,iii is correct and iv is incorrect

Description : Coverage based analysis is best described as: A. A metric used to show the logic covered during a test session providing insight to the extent of testing. B. A tool for documenting the unique ... their status through to resolution. D. The most traditional means for analyzing a system or a program

Last Answer : A. A metric used to show the logic covered during a test session providing insight to the extent of testing.

Description : Which of the following is the task of a Test Lead / Leader: i. Interaction with the Test Tool Vendor to identify best ways to leverage test tool on the project. ii. Write Test Summary Reports based on the ... is true and ii,iii,iv are false d) iii and iv is correct and i and ii are incorrect

Last Answer : a) i, ii, iii is true and iv is false

Description : Which of the following is a requirement of an effective software environment? I. Ease of use II. Capacity for incremental implementation III. Capability of evolving with the needs of a project IV. Inclusion of advanced tools A.I, II &III B.I, II &IV C.II, III&IV D.I, III&IV

Last Answer : A.I, II &III

Description : Defects are least costly to correct at what stage of the development cycle? A. Requirements B. Analysis & Design C. Construction D. Implementation

Last Answer : A. Requirements

Description : Which of the following is a part of Test Closure Activities? i. Checking which planned deliverables have been delivered ii. Defect report analysis. iii. Finalizing and archiving testware. iv. Analyzing lessons. a) i , ii , ... false c) i , iii , iv are true and ii is false d) All of above are true

Last Answer : c) i , iii , iv are true and ii is false

Description : Change request should be submitted through development or program management. A change request must be written and should include the following criteria. I. Definition of the change II. Documentation to be updated III. Name of the tester or developer IV. Dependencies of the change request.

Last Answer : A. Improve super vision, More reviews of artifacts or program means stage containment of the defects.

Description : Change request should be submitted through development or program management. A change request must be written and should include the following criteria. I. Definition of the change II. Documentation to be updated III. Name of the tester ... and IV B. I, II and III C. II, III and IV D. I, II and IV

Last Answer : D. I, II and IV

Description : Which of the following functions is typically supported by a software quality information system? I. Record keeping II. System design III. Evaluation scheduling IV. Error reporting A.I, II&III B.II, III &IV C.I, III &IV D.I, II & IV

Last Answer : C.I, III &IV

Description : Match the following types of variables with the corresponding programming languages: (a) Static variables (i) Local variables in Pascal (b) Stack dynamic (ii) All variables in APL (c) Explicit heap dynamic (iii) Fortran 77 (d) Implicit ... (ii) (C) (iii) (i) (iv) (ii) (D) (ii) (i) (iii) (iv)

Last Answer : (C) (iii) (i) (iv) (ii) 

Description : The testing attempts to violate those procedures, which should test the adequacy of the security procedures. A. Disaster testing B. Functional testing C. Regression testing D. Compliance testing

Last Answer : D. Compliance testing

Description : Impact Analysis helps to decide :- a) How much regression testing should be done. b) Exit Criteria c) How many more test cases need to written. d) Different Tools to perform Regression Testing

Last Answer : a) How much regression testing should be done.

Description : Regression testing should be performed: i. every week ii. after the software has changed iii. as often as possible iv. when the environment has changed v. when the project manager says a) i & ii are true, iii, iv & v are ... iv are true, i, iii & v are false d) ii is true, i, iii, iv & v are false

Last Answer : c) ii & iv are true, i, iii & v are false

Description : Match every stage of the software Development Life cycle with the Testing Life cycle: i. Hi-level design a Unit tests ii. Code b Acceptance tests iii. Low-level design c System tests iv. Business requirements d Integration tests a) i-d , ii ... i-b , ii-a , iii-d , iv-c d) i-c , ii-a , iii-d , iv-b

Last Answer : d) i-c , ii-a , iii-d , iv-b

Description : Consider the following statements: i. 100% statement coverage guarantees 100% branch coverage. ii. 100% branch coverage guarantees 100% statement coverage. iii. 100% branch coverage guarantees 100% decision coverage. iv. 100% decision ... & v are False d) ii, iii & iv are True; i & v are False

Last Answer : d) ii, iii & iv are True; i & v are False

Description : Validation involves which of the following: i. Helps to check the Quality of the Built Product ii. Helps to check that we have built the right product. iii. Helps in developing the product iv. Monitoring tool wastage and ... , ii, iii are true and iv is false d) iii is true and i, ii, iv are false

Last Answer : b) ii is true and i, iii, iv are false

Description : Deciding how much testing is enough should take into account:- i. Level of Risk including Technical and Business product and project risk ii. Project constraints such as time and budget iii. Size of Testing Team iv. Size ... ii are true and iii, iv are false d) ii, iii, iv are true and i is false

Last Answer : c) i, ii are true and iii, iv are false

Description : This life cycle model is basically driven by schedule and budget risks This statement is best suited for A. Water fall model B. Spiral model C. Incremental model D. V-Model Q33. The bug tracking ... these phases for each bug. I. Phase injected II. Phase detected III. Phase fixed IV. Phase removed

Last Answer : B. I, II and IV

Description : Which of the following statements is true about a software verification and validation program? I. It strives to ensure that quality is built into software. II. It provides management with insights into the state ... software development activities. A. I, II&III B.II, III&IV C.I, II&IV D.I, III&IV

Last Answer : C.I, II&IV

Description : Which of the following will be the best definition for Testing :- a) The goal / purpose of testing is to demonstrate that the program works. b) The purpose of testing is to demonstrate that the ... does what it is supposed to do. d) Testing is executing Software for the purpose of finding defects.

Last Answer : d) Testing is executing Software for the purpose of finding defects.

Description : Benefits of Independent Testing a) Independent testers are much more qualified than Developers b) Independent testers see other and different defects and are unbiased. c) Independent Testers cannot identify defects. d) Independent Testers can test better than developers

Last Answer : b) Independent testers see other and different defects and are unbiased.

Description : The Kick Off phase of a formal review includes the following :- a) Explaining the objective b) Fixing defects found typically done by author c) Follow up d) Individual Meeting preparations

Last Answer : a) Explaining the objective

Description : Repeated Testing of an already tested program, after modification, to discover any defects introduced or uncovered as a result of the changes in the software being tested or in another related or ... software component: a) Re Testing b) Confirmation Testing c) Regression Testing d) Negative Testing

Last Answer : c) Regression Testing

Description : ‘Be bugging’ is known as A. Preventing the defects by inspection B. Fixing the defects by debugging C. Adding known defects by seeding D. A process of fixing the defects by tester

Last Answer : C. Adding known defects by seeding

Description : Defect Density' calculated in terms of A. The number of defects identified in a component or system divided by the size of the component or the system B. The number of defects found by a test phase ... The number of defects found by a test phase divided by the number found by the size of the system

Last Answer : A. The number of defects identified in a component or system divided by the size of the component or the system

Description : In preparation for developing the acceptance criteria, the user should A. Know the defects in the application B. Acquire the basic knowledge of the application for which the system is ... D. Know new enhancement and basic understanding of how the application is implemented in users organization

Last Answer : Understand the risks and benefits of the development methodology that is to be used in correcting the software system

Description : The selection of test cases for regression testing A. Requires knowledge on the bug fixes and how it affect the system B. Includes the area of frequent defects C. Includes the area which has undergone many/recent code changes D. All of the above

Last Answer : D. All of the above

Description : The purpose of software testing is to A. Demonstrate that the application works properly B. Detect the defects C. Validate the logical design

Last Answer : A. Demonstrate that the application works properly

Description : UAT is different from other testing types normally because of A. Data B. Cycles C. Defects D. None of the above

Last Answer : A. Data

Description : When planning the audit, if the auditor has no reason to believe that illegal acts exist, the auditor should a. Include audit procedures which have a strong probability of detecting illegal ... c. Still include some audit procedures designed specifically to uncover illegalities. d. Ignore the topic

Last Answer : Make inquiries of management regarding their policies and regarding their knowledge of violations, and then rely on normal audit procedures to detect errors, irregularities, and illegalities

Description : When planning the audit, if the auditor has no reason to believe that illegal acts exist, the auditor should a. Make inquiries of management regarding their policies and their knowledge of ... Ignore the topic. d. Include audit procedures which have a strong probability of detecting illegal acts

Last Answer : Make inquiries of management regarding their policies and their knowledge of violations, and then rely on normal audit procedures to detect errors, irregularities, and illegalities

Description : Test design mainly emphasizes all the following except A. Data planning B. Test procedures planning C. Mapping the data and test cases D. Data synchronization

Last Answer : D. Data synchronization

Description : Drivers are also known as: i. Spade ii. Test harness iii. Scaffolding a) i , ii are true and iii is false b) i , iii are true and ii is false

Last Answer : c) ii , iii are true and i is false

Description : System test can begin when? I. The test team competes a three day smoke test and reports on the results to the system test phase entry meeting II. The development team provides software to the test team 3 business days prior ... . I and II only B. II and III only C. I and III only D. I, II and III

Last Answer : D. I, II and III

Description : Verification performed without any executable code is referred to as A. Review B. Static testing C. Validation D. Sanity testing

Last Answer : B. Static testing

Description : : Load Testing Tools _______ A. Reduces the time spent by the testers B. Reduces the resources spent like hardware C. Are mostly used in web testing D. All of the above

Last Answer : D. All of the above

Description : Which of the following is true about White and Black Box Testing Technique:- a) Equivalance partitioning, Decision Table and Control flow are White box Testing Techniques. b) Equivalence partitioning ... , State Transition , Use Case Testing and Decision Table are White Box Testing Techniques.

Last Answer : c) Equivalence partitioning , State Transition , Use Case Testing are black box Testing Techniques.

Description : Which of the following techniques is NOT a black box technique? a) State transition testing b) LCSAJ (Linear Code Sequence and Jump) c) syntax testing d) boundary value analysis

Last Answer : b) LCSAJ (Linear Code Sequence and Jump)

Description : Which of the following is not phase of the Fundamental Test Process? a) Test Planning and Control b) Test implementation and Execution c) Requirement Analysis d) Evaluating Exit criteria and reporting

Last Answer : c) Requirement Analysis

Description : Which of the following uses Impact Analysis most? a) Component testing b) Non-functional system testing c) User acceptance testing d) Maintenance testing

Last Answer : d) Maintenance testing

Description : We use the output of the requirement analysis, the requirement specification as the input for writing :- a) User Acceptance Test Cases b) Integration Level Test Cases c) Unit Level Test Cases d) Program specifications

Last Answer : a) User Acceptance Test Cases

Description : Evaluating testability of the requirements and system are a part of which phase:- a) Test Analysis and Design b) Test Planning and control c) Test Implementation and execution d) Evaluating ... text box which accepts alphabets in lower or upper case. Identify the invalid Equivalence class value.

Last Answer : a) Test Analysis and Design

Description : Which technique can be used to achieve input and output coverage? It can be applied to human input, input via interfaces to a system, or interface parameters in integration testing. A. Error Guessing B. Boundary Value Analysis C. Decision Table testing D. Equivalence partitioning

Last Answer : D. Equivalence partitioning

Description : Change X requires a higher level of authority than Change Y in which of the following pairs? Change X Change Y A. Code in development Code in production B. Specifications during requirements ... Documents requested by customers D. A product distributed to several sites A product with a single user

Last Answer : D. A product distributed to several sites A product with a single user

Description : When testing a grade calculation system, a tester determines that all scores from 90 to 100 will yield a grade of A, but scores below 90 will not. This analysis is known as: A. Equivalence partitioning B. Boundary value analysis C. Decision table D. Hybrid analysis

Last Answer : A. Equivalence partitioning