An approach that designs test cases by looking at the allowable data values. a) Maintenance b) Evaluation c) Data coverage d) Validation

1 Answer

Answer :

Answer: c Explanation: Data coverage is the term used. It is responsible for designing the test cases

Related questions

Description : An approach that designs test cases by looking at the allowable data values. a) Data coverage b) Code Coverage c) Debugging d) Validation

Last Answer : Answer: a Explanation: Data coverage is an approach that designs test cases by looking at the allowable data values. Code coverage is an approach that designs test cases by looking at the code

Description : Coverage based analysis is best described as: A. A metric used to show the logic covered during a test session providing insight to the extent of testing. B. A tool for documenting the unique ... their status through to resolution. D. The most traditional means for analyzing a system or a program

Last Answer : A. A metric used to show the logic covered during a test session providing insight to the extent of testing.

Description : A document that specifies how many times and with what data the program must be run in order to thoroughly test it. a) addressing plan b) test plan c) validation plan d) verification plan

Last Answer : Answer: b Explanation: Test plan is the A document that specifies how many times and with what data the program must be run in order to thoroughly test it. It comes under testing

Description : Which of the following statement(s) is/are TRUE with regard to software testing? I. Regression testing technique ensures that the software product runs correctly after the changes during maintenance. II. Equivalence partitioning is a ... (1) only I (2) only II (3) both I and II (4) neither I nor II

Last Answer : (1) only I 

Description : Top down approach is used for (A) development. (B) identification of faults. (C) testing and validation. (D) reverse engineering.

Last Answer : (A) development.

Description : Which testing is an integration testing approach that is commonly used when “shrink-wrapped” software products are being developed? a) Regression Testing b) Integration testing c) Smoke testing d) Validation testing

Last Answer :  Ans : c

Description : Which one of the following statements, related to the requirements phase in Software Engineering, is incorrect ? (A) Requirement validation is one of the activities in the requirements phase. (B) ... . (D) Function points is one of the most commonly used size metric for requirements. 

Last Answer : (C) “Modelling-oriented approach” is one of the methods for specifying the functional specifications. 

Description : What is Digital Forensic? A. Process of using scientific knowledge in analysis and presentation of evidence in court B. The application of computer science and investigative procedures for a legal ... technology in the investigation and establishment of the facts or evidence in a court of law

Last Answer : B. The application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence after proper search authority, chain of custody, validation with mathematics, use of validated tools, repeatability, reporting, and possible expert presentation

Description : What is Digital Forensic? a. Process of using scientific knowledge in analysis and presentation of evidence in court b. The application of computer science and investigative procedures for a legal ... technology in the investigation and establishment of the facts or evidence in a court of law

Last Answer : b. The application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence after proper search authority, chain of custody, validation with mathematics, use of validated tools, repeatability, reporting, and possible expert presentation

Description : What is Digital Forensic? (A) Process of using scientific knowledge in analysis and presentation of evidence in court (B) The application of computer science and investigative procedures for a ... or technology in the investigation and establishment of the facts or evidence in a court of law

Last Answer : (B) The application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence after proper search authority, chain of custody, validation with mathematics, use of validated tools, repeatability, reporting, and possible expert presentation

Description : What is the evaluation function in greedy approach? A : Heuristic function B : Path cost from start node to current node C : Path cost from start node to current node + Heuristic cost D : Average of Path cost from start node to current node and Heuristic cost

Last Answer : A : Heuristic function

Description : What is the evaluation function in greedy approach? A : Heuristic function B : Path cost from start node to current node C : Path cost from start node to current node + Heuristic cost D : Average of Path cost from start node to current node and Heuristic cost

Last Answer : A : Heuristic function

Description : Select the proper reply as to the allowable form of the understanding with a client when an audit is being performed. a. While preferably written, it may be oral; but in all cases it should be ... or written. d. The understanding must be obtained in written form and included in the working papers.

Last Answer : While preferably written, it may be oral; but in all cases it should be documented in the working papers

Description : The term 'Evaluation' and 'Assessment' could be discriminated as follows Options: A) Assessment is limited to coverage achievement whereas evaluation is qualitative in character B) Evaluation is ... an attempt to measure the pupil as whole whereas evaluation is concerned with his achievement only

Last Answer : C) Evaluation involves the measurement as well as diagnosis of students’ attainments, whereas assessment is concerned with only scholastic attainments. 

Description : In the maintenance phase the product must be tested against  previous test cases. This is known as testing. (a) Unit (b) Integration (c)Regression (d) Module (e) Beta

Last Answer : (c)Regression

Description : An insulation resistance test is performed on a particular piece of electric equipment. In addition to the resistance reading, what information listed below should be entered in the electrical log? A. ... D. The complete nameplate data from the resistance test instrument used to obtain the reading.

Last Answer : Answer: B

Description : A test harness is a A. A high level document describing the principles, approach and major objectives of the organization regarding testing B. A distance set of test activities collected into a manageable phase ... conduct a test D. A set of several test cases for a component or system under test

Last Answer : C. A test environment comprised of stubs and drives needed to conduct a test

Description : A wholesaler sells printer cartridges. The minimum order quantity is 5. There is a 20% discount for orders of 100 or more printer cartridges. You have been asked to prepare test cases using various values for the number of printer cartridges ... A. 5, 6, 20 B. 4, 5, 80C. 4, 5, 99 D. 1, 20, 100

Last Answer : C. 0, 1,10,11, 50, 51, 75, 76,100,101

Description : Which of the following is false regarding the evaluation of computer programming languages? (A) Application oriented features (B) Efficiency and Readability (C) Software development (D) Hardware maintenance cost

Last Answer : (D) Hardware maintenance cost

Description : What happen During the operational Test (OT) effort the purpose of validation is to determine?

Last Answer : Need answer

Description : Test summary report A. Functional testing is mostly B. Validation techniques C. Verification techniques D. Both of the above E. None of the above

Last Answer : B. Validation techniques

Description : Which is the process of gathering evidence supporting inferences based test scores? a. Validation b. Validity c. Reliability d. Prediction

Last Answer : a. Validation

Description : What is Digital Forensic? A. Process of using scientific knowledge in analysis and presentation of evidence in court B. The application of computer science and investigative procedures for a legal ... technology in the investigation and establishment of the facts or evidence in a court of law

Last Answer : B. The application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence after proper search authority, chain of custody, validation with mathematics, use of validated tools, repeatability, reporting, and possible expert presentation

Description : What is the evaluation function in A* approach? a) Heuristic function b) Path cost from start node to current node c) Path cost from start node to current node + Heuristic cost d) Average of Path cost from start node to current node and Heuristic cost

Last Answer : c) Path cost from start node to current node + Heuristic cost

Description : What is the evaluation function in greedy approach? a) Heuristic function b) Path cost from start node to current node c) Path cost from start node to current node + Heuristic cost d) Average of Path cost from start node to current node and Heuristic cost

Last Answer : a) Heuristic function

Description :  The step of research workshop is Options: A) The presentation and explanation of the topic B) The practice of following an approach C) Follow-up and evaluation of a topic D) All of the above

Last Answer : D) All of the above

Description : In which of the following mode, the BBPOU receives all the bill payment requests for that particular biller without any validation? A. Online Mode B. Offline Mode (A) C. Offline Mode (B) D. All of the Above E. None of the Above

Last Answer : C. Offline Mode (B) Explanation: In Offline Mode (B) receives all the bill payment requests for that particular biller without any validation.

Description : If looking for patio deck designs, who would you look to for the perfect look?

Last Answer : To find ideas to start building your deck you could first try www.deckplans.com. They have a wide selection of free deck plans along with great tips and ideas on how to build your deck.

Description : Which field property helps in setting data validation in a table? -Technology

Last Answer : (d) Validation Rule property specifies a condition that must be met before the data is accepted into the database.

Description : Which of the following is an application of NN (Neural Network)? a) Sales forecasting b) Data validation c) Risk management d) All of the mentioned

Last Answer : d) All of the mentioned

Description : Which of the following is an application of NN (Neural Network)? a) Sales forecasting b) Data validation c) Risk management d) All of the mentioned

Last Answer : d) All of the mentioned

Description : Motor name plate data includes '°°C rise'. This indicates the _____________. A. actual running temperature of the winding from no load to full load B. permissible temperature rise ... above normal full load operating temperature D. maximum allowable temperature rise for continuous no load service

Last Answer : Answer: B

Description : Identify the correct statement A) IBM PCs used RISC CPU designs B) Macintosh used CISC CPU design C) IBM used CISC CPU design D) None of above is true

Last Answer : Answer : C

Description : A person who designs the programs in a software package is called : a) User b) Software Manager c) System Developer d) System Programmer

Last Answer : Answer: d Explanation: The programs included in a system software package are called system programs. The programmers who design them and prepare them are called system programmers

Description : I am looking for affordable full coverage dental insurance in my area.?

Last Answer : I can help you get up to 60% off. individual dental plans You can easily search dentists by area and see the full fee schedule at http://www.dentalhealthdeals.com

Description : Kevin tells his wife, Karen, that his last sales call of the day at DuPont was a disaster. He explains that he never really figured out what the purchasing agent was looking ... listening skills B)overcoming objections. C)prospect evaluation. D)product demonstrations. E)closing the sales encounter

Last Answer : E)closing the sales encounter

Description : State weather the following statement is true or false for Multipurpose Internet Mail Extensions 1).The general syntax for MIME header fields is not the same as that for RFC 2822. 2).MIME header field names are never ... false C. 1. false, 2. false, 3. false D. 1.false, 2. true, 3. true

Last Answer : A. 1. True, 2. true, 3. true

Description : What can a protagonists approach to conflict show about the cultural values behind a work of literature?

Last Answer : Joe Mama Stooopiddd

Description : The basic approach to Earned Value is to A. Sum up the Work Package Earned Values to calculate the Earned Value of the Control  Account and ultimately the Project  B. Multiply the percent complete by ... that package  C. Estimate a percent complete for each WBS Work Package  D. All of the above

Last Answer : D. All of the above

Description : A set of principles to guide and assist researchers in deciding which goals are most important and in reconciling conflicting values when conducting research is called ____. a. Research ethics b. Deontological approach c. Utilitarianism d. None of the above

Last Answer : a. Research ethics

Description : Test Conditions are derived from :- a) Specifications b) Test Cases c) Test Data d) Test Design

Last Answer : a) Specifications

Description : Test design mainly emphasizes all the following except A. Data planning B. Test procedures planning C. Mapping the data and test cases D. Data synchronization

Last Answer : D. Data synchronization

Description : Equivalence partitioning is a .................. method that divides the input domain of a program into classes of data from which test cases can be derived. (A) White-box testing (B) Black-box testing (C) Orthogonal array testing (D) Stress testing

Last Answer : (B) Black-box testing

Description : In the statistical approach data is collected and used to test what?

Last Answer : To test a prediction based on one of two hypotheses.

Description : Do you get any validation from Fluther?

Last Answer : That I’m not the only insane fucker out there.

Description : How can I achieve validation testing in Automation for Fields?

Last Answer : if the validation popup is generated using JavaScript as an HTML element below the filed, you should be able to inspect it. If it is rendered on the browser, there is no way ... and post screenshot of your app and inspection window.For more information Subscribe to our page - Softwaretestingboard

Last Answer : a) Declaration of donation (ijab) by the donor. (B) Accepting (receiving) donations from the recipient or on his behalf (c) Granting possession of the property donated by the donor to the recipient. If the recipient dies before the donation is accepted, the donation will be canceled.

Description : Write the order of precedence for validation of a column in a table ?

Last Answer : I. done using Database triggers. ii. done using Integarity Constraints.?