Black box testing sometimes called ?
Data Flow testing
Loop Testing
Behavioral Testing
Graph Based Testing

1 Answer

Answer :

Behavioral Testing

Related questions

Description : Black box testing sometimes called ? Data Flow testing Loop Testing Behavioral Testing Graph Based Testing

Last Answer : Behavioral Testing

Description : White box testing, a software testing technique is sometimes called ? Basic path Graph Testing Dataflow Glass box testing

Last Answer : Glass box testing

Description : White box testing, a software testing technique is sometimes called ? Basic path Graph Testing Dataflow Glass box testing

Last Answer : Glass box testing

Description : Behavioral testing is a) White box testing b) Black box testing c) Grey box testing d) None of the mentioned

Last Answer : Ans : b

Description : ..... is a black box testing method ? Boundary value analysis Basic path testing Code path analysis None of above

Last Answer : Boundary value analysis

Description : The testing that focuses on the variables is called (A) black box testing (B) white box testing (C) data variable testing (D) data flow testing

Last Answer : (A) black box testing

Description : Which of the following is true about White and Black Box Testing Technique:- a) Equivalance partitioning, Decision Table and Control flow are White box Testing Techniques. b) Equivalence partitioning ... , State Transition , Use Case Testing and Decision Table are White Box Testing Techniques.

Last Answer : c) Equivalence partitioning , State Transition , Use Case Testing are black box Testing Techniques.

Description : Equivalence partitioning is a .................. method that divides the input domain of a program into classes of data from which test cases can be derived. (A) White-box testing (B) Black-box testing (C) Orthogonal array testing (D) Stress testing

Last Answer : (B) Black-box testing

Description : Data from a computer are_______; the local loop handles _______ signals. A) analog; analog B) analog; digital C) digital; digital D) digital; analog

Last Answer : digital; analog

Description : _________control inthe datalink layer is based on automatic repeat request, which is the retransmission of data. A) Flow B) Error C) Transmission D) none of the above

Last Answer : Transmission

Description : The data rate is sometimes calledthe ___ rate. A) baud B) bit C) signal D) none of the above

Last Answer : bit

Description : The basic unit ofa worksheet into which you enter data in Excel is called a– (A) tab (B) cell (C) box (D) range (E) None of these

Last Answer : cell

Description : White Box techniques are also classified as a) Design based testing b) Structural testing c) Error guessing technique d) None of the mentioned

Last Answer : Ans : b

Description : Biometrics is a behavioral feature-based technology ?

Last Answer : Answer : Biometrics is a behavioral trait-based technology Biometrics is a type of technique or technology that can be used to identify or identify a specific person by a person's physical ... physical structure and behavior , features and qualities. So this is a behaviorally dependent technology.

Description : What Is Black Box Testing And White Box Testing?

Last Answer : Black box testing is an external perspective of the object that is to be tested to obtain test cases. These tests may be functional or non functional. The valid and invalid inputs are tested ... chosen by the tester to exercise paths through the code to determine the outputs that are appropriate.

Description : What Is Black Box Testing?

Last Answer : Black box testing or functional testing means testing the software for the outputs when specified inputs are provided. It is usually performed to see if the software meets the user's requirements. There's ... . An example of this could be manual testing of the system by a tester, assembly testing.

Description : Which of the following techniques is NOT a black box technique? a) State transition testing b) LCSAJ (Linear Code Sequence and Jump) c) syntax testing d) boundary value analysis

Last Answer : b) LCSAJ (Linear Code Sequence and Jump)

Description : Which testing methods are used by end-users who actually test software before they use it? A. Alpha & Beta Testing B. White Box Testing C. Black Box Testing D. Trial & Error Testing

Last Answer : A. Alpha & Beta Testing

Description : __________ testing assumes that the path of logic in a unit or program is known. A. Black Box testing B. Performance Testing C. White Box testing D. Functional testing

Last Answer : C. White Box testing

Description : A testing which checks the internal logic of the program is A. Black box testing B. White box testing C. Both (A) and (B) D. None of the above

Last Answer : B. White box testing

Description : One technique of Black Box testing is Equivalence Partitioning. In a programstatement that accepts only one choice from among 10 possible choices,numbered 1 through 10, the middle partition would be from _____ to _____ a) 4 to 6 b) 0 to 10 c) 1 to 10 d) None of the above

Last Answer : c) 1 to 10

Description : SRS is also known as specification of (A) White box testing (B) Stress testing (C) Integrated testing (D) Black box testing

Last Answer : (D) Black box testing

Description : A fault simulation testing technique is (A) Mutation testing (B) Stress testing (C) Black box testing (D) White box testing

Last Answer : (A) Mutation testing

Description : . A security audit performed on the internal network of an organization by the network administration is also known as ___________. A. Grey-box testing B. Black-box testing C. White-box testing D. Active testing

Last Answer : C. White-box testing

Description : A security audit performed on the internal network of an organization by the network administration is also known as ___________. a. Grey-box testing b. Black-box testing c. White-box testing d. Active testing E. Passive testing

Last Answer : c. White-box testing

Description : A security audit performed on the internal network of an organization by the network administration is also known as ___________. A. Grey-box testing B. Black-box testing C. White-box testing D. Active testing E. Passive testing

Last Answer : C. White-box testing

Description : A security audit performed on the internal network of an organization by the network administration is also known as ___________. ∙ A. Grey-box testing ∙ B. Black-box testing ∙ C. White-box testing ∙ D. Active testing ∙ E. Passive testing

Last Answer : C. White-box testing

Description : V- model uses -------- test models a) Component testing, integration testing, system testing and acceptance testing b) alpha testing, beta testing , acceptance testing and user testing c) black box testing, white box testing and gray box testing

Last Answer : a

Description : Which of the following is black box testing a) Basic path testing b) Boundary value analysis c) Code path analysis d) None of the mentioned

Last Answer :  Ans : b

Description : Which of the following is non-functional testing? a) Black box testing b) Performance testing c) Unit testing d) None of the mentioned

Last Answer : Ans : b 

Description : The testing in which code is checked a) Black box testing b) White box testing c) Red box testing d) Green box testing

Last Answer :  Ans :b

Description : Boundary value analysis belong to? a) White Box Testing b) Black Box Testing c) White Box & Black Box Testing d) None of the mentioned

Last Answer : Ans: b

Description : Describe the use of decision table in black box testing with the help of suitable example.

Last Answer : I.Decision table testing is black box test design technique to determine the test scenarios for complex business logic. ii. Decision tables provide a systematic way of stating complex business rules, which is useful for ... when conditions are missed, it is easy to see.  Example : 

Description : Explain the concept of black box testing and white box testing.

Last Answer : Black Box Testing: * It is a way of software testing in which the internal structure or the program or the code is hidden and nothing is known about it. * It also known as ... implementation. * White-box testing is time-consuming, bigger programming applications take the time to test fully.

Description : A spanningtree is agraph in which there is no_____. A) node B) branch C) loop D) arc

Last Answer : loop

Description : The local loop has _______ cablethat connects the subscriber telephonetothe nearest end office. A) twisted-pair B) coaxial C) fiber-optic D) none of the above

Last Answer : twisted-pair

Description : In open-loop control, policies are applied to __________ A. Remove after congestion occurs B. Remove after sometime C. Prevent before congestion occurs D. Prevent before sending packets

Last Answer : C. Prevent before congestion occurs

Description : Which of the following statement(s) is/are TRUE with regard to software testing? I. Regression testing technique ensures that the software product runs correctly after the changes during maintenance. II. Equivalence partitioning is a ... (1) only I (2) only II (3) both I and II (4) neither I nor II

Last Answer : (1) only I 

Description : The research instruments that a marketing researcher can make use of area. A. Questionnaires, Qualitative measure and mechanical devices B. Questionnaires, experimental research and behavioral data ... research and survey research E. Experimental research, behavioral data and mechanical devices.

Last Answer : A. Questionnaires, Qualitative measure and mechanical devices

Description : What types of models are created during software requirements analysis? (A) Functional and behavioral (B) Algorithmic and data structure (C) Architectural and structural (D) Usability and reliability

Last Answer : (A) Functional and behavioral

Description : The signal rate is sometimes called the ____ rate. A) baud B) bit C) signal D) none of the above

Last Answer : baud

Description : Sometimes, Session layer is also called ______ layer a. Virtual layer b. Port layer c. Segmentation layer d. Process layer

Last Answer : b. Port layer

Description : Transmission of computerized data from one location to another is called A. data transfer B. data flow C. data communication D. data management E. None of the above

Last Answer : data communication

Description : In IEEE 802.11, a BSS with an AP is sometimes referred toas ____________. A) an ad hocarchitecture B) an infrastructurenetwork C) either (a) or (b) D) neither (a) nor (b)

Last Answer : an infrastructurenetwork

Description : At the data link layer, Frame Relayusesa protocol that supports _____control. A) flow B) error C) either (a) or (b D) neither (a) nor (b)

Last Answer : neither (a) nor (b)

Description : In IPv6, the _______ field inthe baseheader and thesender IP address combineto indicate aunique path identifier for aspecific flow of data. A) flow label B) nextheader C) hoplimit D) destination IP address

Last Answer : flow label

Description : ______ refers to the physical or logicalarrangement of a network. A) Data flow B) Mode ofoperation C) Topology D) None of the above

Last Answer : Topology

Description : Data flow between two devices canoccur in a _______ way. A) simplex B) half-duplex C) full-duplex D) all of theabove

Last Answer : all of theabove

Description : An error-detectingcode inserted asa field in a blockof data tobe transmitted is known as A. Frame check sequence B. Error detecting code C. Checksum D. flow control E. None of the above

Last Answer : Frame check sequence

Description : Transport layer can identify the symptoms of overload nodes using _________ a. Flow control b. Traffic control c. Byte orientation d. Data integrity

Last Answer : b. Traffic control