Description : Black box testing sometimes called ? Data Flow testing Loop Testing Behavioral Testing Graph Based Testing
Last Answer : Behavioral Testing
Description : White box testing, a software testing technique is sometimes called ? Basic path Graph Testing Dataflow Glass box testing
Last Answer : Glass box testing
Description : Behavioral testing is a) White box testing b) Black box testing c) Grey box testing d) None of the mentioned
Last Answer : Ans : b
Description : ..... is a black box testing method ? Boundary value analysis Basic path testing Code path analysis None of above
Last Answer : Boundary value analysis
Description : The testing that focuses on the variables is called (A) black box testing (B) white box testing (C) data variable testing (D) data flow testing
Last Answer : (A) black box testing
Description : Which of the following is true about White and Black Box Testing Technique:- a) Equivalance partitioning, Decision Table and Control flow are White box Testing Techniques. b) Equivalence partitioning ... , State Transition , Use Case Testing and Decision Table are White Box Testing Techniques.
Last Answer : c) Equivalence partitioning , State Transition , Use Case Testing are black box Testing Techniques.
Description : Equivalence partitioning is a .................. method that divides the input domain of a program into classes of data from which test cases can be derived. (A) White-box testing (B) Black-box testing (C) Orthogonal array testing (D) Stress testing
Last Answer : (B) Black-box testing
Description : Data from a computer are_______; the local loop handles _______ signals. A) analog; analog B) analog; digital C) digital; digital D) digital; analog
Last Answer : digital; analog
Description : _________control inthe datalink layer is based on automatic repeat request, which is the retransmission of data. A) Flow B) Error C) Transmission D) none of the above
Last Answer : Transmission
Description : The data rate is sometimes calledthe ___ rate. A) baud B) bit C) signal D) none of the above
Last Answer : bit
Description : The basic unit ofa worksheet into which you enter data in Excel is called a– (A) tab (B) cell (C) box (D) range (E) None of these
Last Answer : cell
Description : White Box techniques are also classified as a) Design based testing b) Structural testing c) Error guessing technique d) None of the mentioned
Description : Biometrics is a behavioral feature-based technology ?
Last Answer : Answer : Biometrics is a behavioral trait-based technology Biometrics is a type of technique or technology that can be used to identify or identify a specific person by a person's physical ... physical structure and behavior , features and qualities. So this is a behaviorally dependent technology.
Description : What Is Black Box Testing And White Box Testing?
Last Answer : Black box testing is an external perspective of the object that is to be tested to obtain test cases. These tests may be functional or non functional. The valid and invalid inputs are tested ... chosen by the tester to exercise paths through the code to determine the outputs that are appropriate.
Description : What Is Black Box Testing?
Last Answer : Black box testing or functional testing means testing the software for the outputs when specified inputs are provided. It is usually performed to see if the software meets the user's requirements. There's ... . An example of this could be manual testing of the system by a tester, assembly testing.
Description : Which of the following techniques is NOT a black box technique? a) State transition testing b) LCSAJ (Linear Code Sequence and Jump) c) syntax testing d) boundary value analysis
Last Answer : b) LCSAJ (Linear Code Sequence and Jump)
Description : Which testing methods are used by end-users who actually test software before they use it? A. Alpha & Beta Testing B. White Box Testing C. Black Box Testing D. Trial & Error Testing
Last Answer : A. Alpha & Beta Testing
Description : __________ testing assumes that the path of logic in a unit or program is known. A. Black Box testing B. Performance Testing C. White Box testing D. Functional testing
Last Answer : C. White Box testing
Description : A testing which checks the internal logic of the program is A. Black box testing B. White box testing C. Both (A) and (B) D. None of the above
Last Answer : B. White box testing
Description : One technique of Black Box testing is Equivalence Partitioning. In a programstatement that accepts only one choice from among 10 possible choices,numbered 1 through 10, the middle partition would be from _____ to _____ a) 4 to 6 b) 0 to 10 c) 1 to 10 d) None of the above
Last Answer : c) 1 to 10
Description : SRS is also known as specification of (A) White box testing (B) Stress testing (C) Integrated testing (D) Black box testing
Last Answer : (D) Black box testing
Description : A fault simulation testing technique is (A) Mutation testing (B) Stress testing (C) Black box testing (D) White box testing
Last Answer : (A) Mutation testing
Description : . A security audit performed on the internal network of an organization by the network administration is also known as ___________. A. Grey-box testing B. Black-box testing C. White-box testing D. Active testing
Last Answer : C. White-box testing
Description : A security audit performed on the internal network of an organization by the network administration is also known as ___________. a. Grey-box testing b. Black-box testing c. White-box testing d. Active testing E. Passive testing
Last Answer : c. White-box testing
Description : A security audit performed on the internal network of an organization by the network administration is also known as ___________. A. Grey-box testing B. Black-box testing C. White-box testing D. Active testing E. Passive testing
Description : A security audit performed on the internal network of an organization by the network administration is also known as ___________. ∙ A. Grey-box testing ∙ B. Black-box testing ∙ C. White-box testing ∙ D. Active testing ∙ E. Passive testing
Description : V- model uses -------- test models a) Component testing, integration testing, system testing and acceptance testing b) alpha testing, beta testing , acceptance testing and user testing c) black box testing, white box testing and gray box testing
Last Answer : a
Description : Which of the following is black box testing a) Basic path testing b) Boundary value analysis c) Code path analysis d) None of the mentioned
Description : Which of the following is non-functional testing? a) Black box testing b) Performance testing c) Unit testing d) None of the mentioned
Description : The testing in which code is checked a) Black box testing b) White box testing c) Red box testing d) Green box testing
Last Answer : Ans :b
Description : Boundary value analysis belong to? a) White Box Testing b) Black Box Testing c) White Box & Black Box Testing d) None of the mentioned
Last Answer : Ans: b
Description : Describe the use of decision table in black box testing with the help of suitable example.
Last Answer : I.Decision table testing is black box test design technique to determine the test scenarios for complex business logic. ii. Decision tables provide a systematic way of stating complex business rules, which is useful for ... when conditions are missed, it is easy to see. Example :
Description : Explain the concept of black box testing and white box testing.
Last Answer : Black Box Testing: * It is a way of software testing in which the internal structure or the program or the code is hidden and nothing is known about it. * It also known as ... implementation. * White-box testing is time-consuming, bigger programming applications take the time to test fully.
Description : A spanningtree is agraph in which there is no_____. A) node B) branch C) loop D) arc
Last Answer : loop
Description : The local loop has _______ cablethat connects the subscriber telephonetothe nearest end office. A) twisted-pair B) coaxial C) fiber-optic D) none of the above
Last Answer : twisted-pair
Description : In open-loop control, policies are applied to __________ A. Remove after congestion occurs B. Remove after sometime C. Prevent before congestion occurs D. Prevent before sending packets
Last Answer : C. Prevent before congestion occurs
Description : Which of the following statement(s) is/are TRUE with regard to software testing? I. Regression testing technique ensures that the software product runs correctly after the changes during maintenance. II. Equivalence partitioning is a ... (1) only I (2) only II (3) both I and II (4) neither I nor II
Last Answer : (1) only I
Description : The research instruments that a marketing researcher can make use of area. A. Questionnaires, Qualitative measure and mechanical devices B. Questionnaires, experimental research and behavioral data ... research and survey research E. Experimental research, behavioral data and mechanical devices.
Last Answer : A. Questionnaires, Qualitative measure and mechanical devices
Description : What types of models are created during software requirements analysis? (A) Functional and behavioral (B) Algorithmic and data structure (C) Architectural and structural (D) Usability and reliability
Last Answer : (A) Functional and behavioral
Description : The signal rate is sometimes called the ____ rate. A) baud B) bit C) signal D) none of the above
Last Answer : baud
Description : Sometimes, Session layer is also called ______ layer a. Virtual layer b. Port layer c. Segmentation layer d. Process layer
Last Answer : b. Port layer
Description : Transmission of computerized data from one location to another is called A. data transfer B. data flow C. data communication D. data management E. None of the above
Last Answer : data communication
Description : In IEEE 802.11, a BSS with an AP is sometimes referred toas ____________. A) an ad hocarchitecture B) an infrastructurenetwork C) either (a) or (b) D) neither (a) nor (b)
Last Answer : an infrastructurenetwork
Description : At the data link layer, Frame Relayusesa protocol that supports _____control. A) flow B) error C) either (a) or (b D) neither (a) nor (b)
Last Answer : neither (a) nor (b)
Description : In IPv6, the _______ field inthe baseheader and thesender IP address combineto indicate aunique path identifier for aspecific flow of data. A) flow label B) nextheader C) hoplimit D) destination IP address
Last Answer : flow label
Description : ______ refers to the physical or logicalarrangement of a network. A) Data flow B) Mode ofoperation C) Topology D) None of the above
Last Answer : Topology
Description : Data flow between two devices canoccur in a _______ way. A) simplex B) half-duplex C) full-duplex D) all of theabove
Last Answer : all of theabove
Description : An error-detectingcode inserted asa field in a blockof data tobe transmitted is known as A. Frame check sequence B. Error detecting code C. Checksum D. flow control E. None of the above
Last Answer : Frame check sequence
Description : Transport layer can identify the symptoms of overload nodes using _________ a. Flow control b. Traffic control c. Byte orientation d. Data integrity
Last Answer : b. Traffic control