Description : ‘Be bugging’ is known as A. Preventing the defects by inspection B. Fixing the defects by debugging C. Adding known defects by seeding D. A process of fixing the defects by tester
Last Answer : C. Adding known defects by seeding
Description : What is correcting errors in a program called? 1) Debugging 2) Compiling 3) Interpreting 4) None of these
Last Answer : 1) Debugging
Description : Which of the following is a myth in testing? a) Tester can find bugs b) Any user can test software c) Missed defects are not due to testers d) Complete testing is not possible
Last Answer : Ans : b
Description : Software Configuration Management is the discipline for systematically controlling (A) the changes due to the evolution of work products as the project proceeds. (B) the changes due to defects (bugs) being found and then fixed. (C) the changes due to requirement changes (D) all of the above
Last Answer : (D) all of the above
Description : Which is not a benefit of cloud computing? a) Streamline business processes b) Pervasive accessibility c) Economic of scale d) Program debugging
Last Answer : Program debugging
Description : Match the following. a) Java 1) is a tool for debugging java program b) Javah 2) is a tool for creating C-like header files c) Javap 3) runs java bytecode d) jdb 4) prints java code representation A) a-3, b-2,c-1 B) a-3, b-1, c-4, d-2 C) a-1, b-2, c-3, d-4 D) a-2, b-1, c-3, d-4
Last Answer : B) a-3, b-1, c-4, d-2
Description : _____is the process of finding errors in software code. 1) Compiling 2) Testing 3) Running 4) Debugging 6 5) None of these
Last Answer : Answer :4
Description : An approach that designs test cases by looking at the allowable data values. a) Data coverage b) Code Coverage c) Debugging d) Validation
Last Answer : Answer: a Explanation: Data coverage is an approach that designs test cases by looking at the allowable data values. Code coverage is an approach that designs test cases by looking at the code
Description : What is debugging?
Last Answer : Debugging is the process of identifying errors within a program. During program compilation, errors that are found will stop the program from executing completely. At this state, the programmer would look ... of errors, and plays an important role in ensuring that the expected program output is met.
Description : ..... is the process finding errors in software code. 1) compiling 2) Assembling 3) Interpreting 4) Debugging
Last Answer : 4) Debugging
Description : What is hacking ? a. Identifying weakness in computer system or networks b. Refers to act of locating vulnerabilities c. A security to your personal data d. Protocols of corrupting data
Last Answer : a. Identifying weakness in computer system or networks
Last Answer : d. Protocols of corrupting data
Description : Errors in a software program are referred to as: a) Viruses b) Bugs c) Computer Fault d) None of These
Last Answer : b) Bugs
Description : In direct method of contouring, the process of locating or identifying points lying on a contour is called (A) Ranging (B) Centring (C) Horizontal control (D) Vertical control
Last Answer : (D) Vertical control
Description : Which of the following will be the best definition for Testing :- a) The goal / purpose of testing is to demonstrate that the program works. b) The purpose of testing is to demonstrate that the ... does what it is supposed to do. d) Testing is executing Software for the purpose of finding defects.
Last Answer : d) Testing is executing Software for the purpose of finding defects.
Description : Repeated Testing of an already tested program, after modification, to discover any defects introduced or uncovered as a result of the changes in the software being tested or in another related or ... software component: a) Re Testing b) Confirmation Testing c) Regression Testing d) Negative Testing
Last Answer : c) Regression Testing
Description : Coverage based analysis is best described as: A. A metric used to show the logic covered during a test session providing insight to the extent of testing. B. A tool for documenting the unique ... their status through to resolution. D. The most traditional means for analyzing a system or a program
Last Answer : A. A metric used to show the logic covered during a test session providing insight to the extent of testing.
Description : What is the full form of UDP a. Union Development Program b. User Data Program c. User Datagram Protocol d. Unified Datagram Provider
Last Answer : c. User Datagram Protocol
Description : SPC stands (A) Standard Protocol Control (B) Stored Program Control (C) Signaling and switching Centre (D) Signaling Process Center
Last Answer : (B) Stored Program Control
Description : What are the four steps in debugging? -Technology
Last Answer : The four steps in debugging are as follows:1. Discovering of the bug2. Isolation of the bug3. Finding the bug4. Fixing the bug
Description : What is testing and debugging ?
Last Answer : Testing: Testing is to check if something is working properly. It may be a device or program you created. The programs that have been created have to be tested first to see if they are working properly ... debugging together can be said to find and correct the errors of any program or device.
Description : What is debugging ?
Last Answer : Debugging is the process of correcting errors in a program.
Description : Can you change the value of a variable while debugging a C# application?
Last Answer : Yes. If you are debugging via Visual Studio.NET, just go to Immediate window.
Description : What debugging tools come with the .NET SDK?
Last Answer : 1. CorDBG – command-line debugger. To use CorDbg, you must compile the original C# file using the /debug switch. 2. DbgCLR – graphic debugger. Visual Studio .NET uses the DbgCLR.
Description : Given part of a stack trace: aspnet.debugging.BadForm.Page_Load(Object sender, EventArgs e) +34. What does the +34 mean?
Last Answer : It is an actual offset (at the assembly language level) – not an offset into the IL instructions.
Description : The best way to test the Project Management Plan (SPMP) is by a) Prototyping b) Inspection c) Simulation d) Compilation e) Debugging.
Last Answer : b) Inspection
Description : The explanation facility of an expert system may be used to ____________ a) construct a diagnostic model b) expedite the debugging process c) explain the system’s reasoning process d) explain the system’s reasoning process & expedite the debugging process
Last Answer : d) explain the system’s reasoning process & expedite the debugging process
Description : The explanation facility of an expert system may be used to __________ a) construct a diagnostic model b) expedite the debugging process c) explain the system’s reasoning process d) expedite the debugging process & explain the system’s reasoning process
Last Answer : d) expedite the debugging process & explain the system’s reasoning process
Description : The objective of testing is ? Debugging To uncover errors To gain modularity To analyze system
Last Answer : To uncover errors
Description : Define what is meant by errors and debugging?
Last Answer : Errors may be made during program creation even by experienced programmers. Such type of errors is detected by the compiler. Debugging means removing the errors.
Description : What are the three generic phases of software engineering? (A) Definition, development, support (B) What, how, where (C) Programming, debugging, maintenance (D) Analysis, design, testing
Last Answer : (A) Definition, development, support
Description : One or more defects or problems that prevent the software from working as intended or working at all is a: a) Bug b) Bot c) Programming Language d) Fuzzy Logic e) None of These
Last Answer : a) Bug
Description : Majority of the errors blamed on computers are actually due to (1) programming errors (2) hardware failure (3) defects in media (4) data entry errors
Last Answer : data entry errors
Description : At a work site, statistical quality control of concrete means (A) Measurement of risks to eliminate failures (B) Applying the theory' of probability to sample testing or inspection (C) Reduction in wastage of inspection costs (D) Reduction in costs for the removal of defects
Last Answer : (B) Applying the theory' of probability to sample testing or inspection
Description : TCP stands for: a) Tools Control Protocol b) Transmission Control Protocol c) Transfer Control Protocol d) None of These
Last Answer : b) Transmission Control Protocol
Description : The ________is a network layer Internet protocol that provides message packets to report errors and other information regarding IP packet processing back to the source: a) Internet Control Message ... Standard Flexible Message Protocol c) Internet Dynamic Chartered Message Protocol d) None of These
Last Answer : a) Internet Control Message Protocol
Description : The ________is a three layer network protocol that contains addressing information and some control information that enables packets to be routed: a) User Datagram Protocol b) Internet Protocol c) Dynamic Host Configuration Protocol d) None of These
Last Answer : b) Internet Protocol
Description : ........... is responsible for converting the higher level protocol addresses to physical Network Addresses. A) Address Resolution Protocol (ARP) B) Reverse Address Resolution Protocol (RARP) C) Bootstrap Protocol (BOOTP) D) Internet Control Message Protocol (ICMP)
Last Answer : A) Address Resolution Protocol (ARP)
Description : The most important and common protocols associated TCP/IP internetwork layer are. i) Internet Protocol (IP) ii) Internet Control Message Protocol (ICMP) iii) Bootstrap Protocol (BOOTP) iv) Dynamic Host Configuration Protocol (DHCP) V) ... C) i, iii, iv and v only D) All i, ii, iii, iv and v only
Last Answer : D) All i, ii, iii, iv and v only
Description : What is the full form of TCP : a. Transmission Control Protocol b. Transfer Control Protocol c. Travel Control Protocol d. Tracking Control Protocol
Last Answer : a. Transmission Control Protocol
Description : TCP stand for……… a. Transmission Control Protocol b. Transfer Control Protocol c. Travel Control Protocol d. Tracking Control Protocol
Description : An error in computer program is called: a) Hacking b) Virus c) Bug d) None of These
Last Answer : c) Bug
Description : Software that prevents unauthorized persons from accessing certain parts of a program, database or network is: a) Firewall b) Scanner c) Anti - Virus d) None of These
Last Answer : a) Firewall
Description : A program designed to destroy data on your computer which can travel to "infect" other computers is called as: a) Operational Risks b) Torpedo c) Infector d) Virus
Last Answer : d) Virus
Description : An error in a computer program is known as _______: a) Crash b) Power Failure c) Bug d) Virus e) Fatal Error
Description : An error in a computer program a) Crash b) Power Failure c) Bug d) Virus e) None of these