A document that specifies how many times and with what data the program must be run in order to thoroughly test it. a) addressing plan b) test plan c) validation plan d) verification plan

1 Answer

Answer :

Answer: b Explanation: Test plan is the A document that specifies how many times and with what data the program must be run in order to thoroughly test it. It comes under testing

Related questions

Description : Which of the following statements is true about a software verification and validation program? I. It strives to ensure that quality is built into software. II. It provides management with insights into the state ... software development activities. A. I, II&III B.II, III&IV C.I, II&IV D.I, III&IV

Last Answer : C.I, II&IV

Description : Test summary report A. Functional testing is mostly B. Validation techniques C. Verification techniques D. Both of the above E. None of the above

Last Answer : B. Validation techniques

Description : Which one of the following is not a fundamental activity for processes in engineering ? a) Verification b) Validation c) design and implementation d) evolution e) specification

Last Answer : a) Verification

Description : Verification performed without any executable code is referred to as A. Review B. Static testing C. Validation D. Sanity testing

Last Answer : B. Static testing

Description : Coverage based analysis is best described as: A. A metric used to show the logic covered during a test session providing insight to the extent of testing. B. A tool for documenting the unique ... their status through to resolution. D. The most traditional means for analyzing a system or a program

Last Answer : A. A metric used to show the logic covered during a test session providing insight to the extent of testing.

Description : An approach that designs test cases by looking at the allowable data values. a) Data coverage b) Code Coverage c) Debugging d) Validation

Last Answer : Answer: a Explanation: Data coverage is an approach that designs test cases by looking at the allowable data values. Code coverage is an approach that designs test cases by looking at the code

Description : An approach that designs test cases by looking at the allowable data values. a) Maintenance b) Evaluation c) Data coverage d) Validation

Last Answer : Answer: c Explanation: Data coverage is the term used. It is responsible for designing the test cases

Description : Content of the program counter is added to the address part of the instruction in order to obtain the effective address is called_______ A. relative address mode. B. index addressing mode. C. register mode. D. implied mode.

Last Answer : A. relative address mode.

Description : Which attribute of tag specifies the color of visited links in a document? (a) vlink (b) alink -Technology

Last Answer : (a) vlink attribute specifies the color of visited links in an HTML document.

Description : In the United States, what document specifies which powers belong to the central government and which go to the states?

Last Answer : Constitution

Description : In XML, DOCTYPE declaration specifies to include a reference to ............ file. (A) Document Type Definition (B) Document Type Declaration (C) Document Transfer Definition (D) Document Type language

Last Answer : (A) Document Type Definition

Description : What is Digital Forensic? A. Process of using scientific knowledge in analysis and presentation of evidence in court B. The application of computer science and investigative procedures for a legal ... technology in the investigation and establishment of the facts or evidence in a court of law

Last Answer : B. The application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence after proper search authority, chain of custody, validation with mathematics, use of validated tools, repeatability, reporting, and possible expert presentation

Description : What is Digital Forensic? a. Process of using scientific knowledge in analysis and presentation of evidence in court b. The application of computer science and investigative procedures for a legal ... technology in the investigation and establishment of the facts or evidence in a court of law

Last Answer : b. The application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence after proper search authority, chain of custody, validation with mathematics, use of validated tools, repeatability, reporting, and possible expert presentation

Description : What is Digital Forensic? (A) Process of using scientific knowledge in analysis and presentation of evidence in court (B) The application of computer science and investigative procedures for a ... or technology in the investigation and establishment of the facts or evidence in a court of law

Last Answer : (B) The application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence after proper search authority, chain of custody, validation with mathematics, use of validated tools, repeatability, reporting, and possible expert presentation

Description : Which statement best describes the emphasis of the systems and substantive approaches in the audit plan? a. A thoroughly designed systems approach to auditing can eliminate the need for any ... computer systems to aid in the audit while the substantive approach focuses on more manual tests

Last Answer : The systems approach focuses on testing controls to make sure they are effective, while the substantive approach is the detailed testing of specific accounts for accuracy

Description : The Method section of the research plan typically specifies EXCEPT; a. The research participants b. The results of prior studies that address the phenomena of interest c. The apparatus, instruments, and materials for the research study d. The planned research procedures

Last Answer : b. The results of prior studies that address the phenomena of interes

Description : Which of the following is NOT a purpose of a marketing plan? A)it specifies how resources are to be allocated B)it co-ordinates marketing and production activities C)it assigns responsibilities, tasks and timing D)it assists in management

Last Answer : B)it co-ordinates marketing and production activities

Description : The primary advantage of key-to-tape data entry system is A) A large percentage of editing can be performed at the time of data entry B) Key verification is easily performed C) The tape is reusable D) Keying errors can be detected as they occur.

Last Answer : Answer : C

Description : Qualification of Inspector of Post office is a) An inspector must be a man of active habits and physically able to stand the strain of constant traveling, by night as will as day. b) He must be ... c) He must be able to conduct efficiency the investigation that are entrusted to him d) All the above

Last Answer : d) All the above

Description : What suffix that end of URL that specifies program?

Last Answer : Need answer

Description : The acceptance criteria for precision studies as per bioanalytical method validation is? A. % RE must be within + 10% B. % RE must be within + 15% C. % RE must be within + 20% D. % RE must be within + 5%

Last Answer : B. % RE must be within + 15%

Description : Which one of the following statements is incorrect ? (A) Pareto analysis is a statistical method used for analyzing causes, and is one of the primary tools for quality management. (B) Reliability of ... (D) In white-box testing, the test cases are decided from the specifications or the requirements.

Last Answer : (D) In white-box testing, the test cases are decided from the specifications or the requirements.

Description : According to -energy audit means verification, monitoring, analysis of use of energy including submission of technical report containing recommendations for improving energy efficiency with cost benefit analysis ... act 2001 b) Industrial act 1946 c) Factory act 1947 d) none of act

Last Answer : Energy conservation act 2001

Description : Which of the following endorsement specifies the name of the transferee for the payment of the bill? A. Restrictive Endorsement B. Partial Endorsement C. Conditional Endorsement D. Facultative Endorsement E. Special Endorsement

Last Answer : E. Special Endorsement Explanation: An endorsement which specifies the name of the transferee for the payment of the bill is called special endorsement.

Description : What happen During the operational Test (OT) effort the purpose of validation is to determine?

Last Answer : Need answer

Description : Which is the process of gathering evidence supporting inferences based test scores? a. Validation b. Validity c. Reliability d. Prediction

Last Answer : a. Validation

Description : What is Digital Forensic? A. Process of using scientific knowledge in analysis and presentation of evidence in court B. The application of computer science and investigative procedures for a legal ... technology in the investigation and establishment of the facts or evidence in a court of law

Last Answer : B. The application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence after proper search authority, chain of custody, validation with mathematics, use of validated tools, repeatability, reporting, and possible expert presentation

Description : Write the order of precedence for validation of a column in a table ?

Last Answer : I. done using Database triggers. ii. done using Integarity Constraints.?

Description : What is the normal order of activities in which software testing is organized? (A) unit, integration, system, validation (B) system, integration, unit, validation (C) unit, integration, validation, system (D) none of the above

Last Answer : (A) unit, integration, system, validation

Description : In which of the following mode, the BBPOU receives all the bill payment requests for that particular biller without any validation? A. Online Mode B. Offline Mode (A) C. Offline Mode (B) D. All of the Above E. None of the Above

Last Answer : C. Offline Mode (B) Explanation: In Offline Mode (B) receives all the bill payment requests for that particular biller without any validation.

Description : Which field property specifies whether the field can be left empty when entering data into a record? -Technology

Last Answer : Required property.

Description : The x.25 standard specifies a a. technique for start-stop data b. technique for dial access c. DTE/DCE interface d. data bit rate e. none of above

Last Answer : DTE/DCE interface

Description : Which field property helps in setting data validation in a table? -Technology

Last Answer : (d) Validation Rule property specifies a condition that must be met before the data is accepted into the database.

Description : Which of the following is an application of NN (Neural Network)? a) Sales forecasting b) Data validation c) Risk management d) All of the mentioned

Last Answer : d) All of the mentioned

Description : Which of the following is an application of NN (Neural Network)? a) Sales forecasting b) Data validation c) Risk management d) All of the mentioned

Last Answer : d) All of the mentioned

Description : An audit program is a. A generic document that auditing firms have developed to lead the process of the audit through a systematic and logical process. b. An overview of the company and a general ... d. A budget of the time that should be necessary to complete each phase of the audit procedures

Last Answer : The detailed plan of audit procedures to be performed in the course of the audit.

Description : Which of the following is/are restriction(s) in classless addressing ? (A) The number of addresses needs to be a power of 2. (B) The mask needs to be included in the address to define the block. (C) The starting address must be divisible by the number of addresses in the block. (D) All of the above

Last Answer : (D) All of the above

Description :  Which of the following processes are performed in the Closing process group and in  what order?  A. Contract Closure and then Close Project B. Scope Verification and then Close Project C. Contract Closure and then Scope Verification D. Close Project and then Contract Closure

Last Answer : A. Contract Closure and then Close Project

Description : The adjective first-order distinguishes first-order logic from ___________ in which there are predicates having predicates or functions as arguments, or in which one or both of ... Representational Verification b) Representational Adequacy c) Higher Order Logic d) Inferential Efficiency

Last Answer : c) Higher Order Logic

Description : An Indian Postal Order presented for payment not bearing the round MO stamp of office of issue a) Cannot be paid b) Can be paid after necessary verification from the office of issue c) Will be returned to office of issue for suplly of omission and paid d) None of these

Last Answer : b) Can be paid after necessary verification from the office of issue

Description : Cryptography is the study of information______: a) Hiding b) Verification c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Authentication means: a) Verify Password Only b) Verification of Login name and Password c) To know details of login name d) None of These

Last Answer : b) Verification of Login name and Password

Description : Cryptography is the study of information______: a) Hiding b) Verification c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Which is not a property of representation of knowledge?  Inferential Adequacy  Representational Adequacy  Representational Verification  Inferential Efficiency

Last Answer :  Representational Adequacy

Description : Which is not a property of representation of knowledge? (A) Representational Verification (B) Representational Adequacy (C) Inferential Adequacy (D) Inferential Efficiency

Last Answer : (A) Representational Verification

Description : Features to be tested, approach, item pass/fail criteria and test deliverables should be specified in which document? a) Test case specification b) Test procedure specification c) Test plan d) Test design specification

Last Answer : c) Test plan

Description : _________must be developed to describe when and how testing will occur. A. Test Strategy B. Test Plan C. Test Design D. High Level document

Last Answer : B. Test Plan

Description : Which document helps you to track test coverage? A. Traceability Matrix B. Test plan C. Test log

Last Answer : A. Traceability Matrix

Description : The primary advantage of key-to-tape data entry system is a. A large percentage of editing can be performed at the time of data entry b. Key verification is easily performed c. The tape is reusable d. Keying errors can be detected as they occur

Last Answer : The tape is reusable