Equivalence partitioning is a .................. method that divides the input domain of a program into classes of data from which test cases can be derived. (A) White-box testing (B) Black-box testing (C) Orthogonal array testing (D) Stress testing

1 Answer

Answer :

(B) Black-box testing

Related questions

Description : Which of the following statement(s) is/are TRUE with regard to software testing? I. Regression testing technique ensures that the software product runs correctly after the changes during maintenance. II. Equivalence partitioning is a ... (1) only I (2) only II (3) both I and II (4) neither I nor II

Last Answer : (1) only I 

Description : Which of the following is true about White and Black Box Testing Technique:- a) Equivalance partitioning, Decision Table and Control flow are White box Testing Techniques. b) Equivalence partitioning ... , State Transition , Use Case Testing and Decision Table are White Box Testing Techniques.

Last Answer : c) Equivalence partitioning , State Transition , Use Case Testing are black box Testing Techniques.

Description : Which of the following divides the input domain into classes containing data? a) Equivalent partitioning b) Environment partitioning c) Procedure division d) Compilation division

Last Answer : Ans : a

Description : _____ is a white-box testing technique first proposed by Tom McCabe. a) Equivalence Partitioning b) Basis Path Testing c.) Boundary Value Analysis d) None of the above.

Last Answer : Ans : b. 

Description : One technique of Black Box testing is Equivalence Partitioning. In a programstatement that accepts only one choice from among 10 possible choices,numbered 1 through 10, the middle partition would be from _____ to _____ a) 4 to 6 b) 0 to 10 c) 1 to 10 d) None of the above

Last Answer : c) 1 to 10

Description : One weakness of boundary value analysis and equivalence partitioning is (A) they are not effective. (B) they do not explore combinations of input circumstances. (C) they explore combinations of input circumstances (D) none of the above

Last Answer : (B) they do not explore combinations of input circumstances.

Description : Which technique can be used to achieve input and output coverage? It can be applied to human input, input via interfaces to a system, or interface parameters in integration testing. A. Error Guessing B. Boundary Value Analysis C. Decision Table testing D. Equivalence partitioning

Last Answer : D. Equivalence partitioning

Description : Which technique can be used to achieve input and output coverage? It can be applied to human input, input via interfaces to a system, or interface parameters in integration testing. a) Error Guessing b) Boundary Value Analysis c) Decision Table testing d) Equivalence partitioning

Last Answer : d) Equivalence partitioning

Description : Which one of the following statements is incorrect ? (A) Pareto analysis is a statistical method used for analyzing causes, and is one of the primary tools for quality management. (B) Reliability of ... (D) In white-box testing, the test cases are decided from the specifications or the requirements.

Last Answer : (D) In white-box testing, the test cases are decided from the specifications or the requirements.

Description : When testing a grade calculation system, a tester determines that all scores from 90 to 100 will yield a grade of A, but scores below 90 will not. This analysis is known as: A. Equivalence partitioning B. Boundary value analysis C. Decision table D. Hybrid analysis

Last Answer : A. Equivalence partitioning

Description : When testing a grade calculation system, a tester determines that all scores from 90 to 100 will yield a grade of A, but scores below 90 will not. This analysis is known as: A. Equivalence partitioning B. Boundary value analysis C. Decision table D. Hybrid analysis

Last Answer : B. Boundary value analysis

Description : Let L be the language generated by regular expression 0*10* and accepted by the deterministic finite automata M. Consider the relation RM defined by M. As all states are reachable from the start state, RM has ................ equivalence classes. (A) 2 (B) 4 (C) 5 (D) 6

Last Answer : (D) 6

Description : How many different equivalence relations with exactly three different equivalence classes are there on a set with five elements? (A) 10 (B) 15 (C) 25 (D) 30

Last Answer : (C) 25

Description : Explain Equivalence Class Partitioning and Boundary value analysis. Compare the two.

Last Answer : Ans. Equivalence Class Partitioning: It is a technique in black box testing. It is designed to minimize the number of test cases by dividing tests in such a way that the system is expected to act the ... valid data equivalence class, then you can select test case values like: 1, 11, 100, 950 etc.

Description : SRS is also known as specification of (A) White box testing (B) Stress testing (C) Integrated testing (D) Black box testing

Last Answer : (D) Black box testing

Description : A fault simulation testing technique is (A) Mutation testing (B) Stress testing (C) Black box testing (D) White box testing

Last Answer : (A) Mutation testing

Description : If the given input array is sorted or nearly sorted, which of the following algorithm gives the best performance? a) Insertion sort b) Selection sort c) Quick sort d) Merge sort

Last Answer : a) Insertion sort

Description : __________ testing assumes that the path of logic in a unit or program is known. A. Black Box testing B. Performance Testing C. White Box testing D. Functional testing

Last Answer : C. White Box testing

Description : A testing which checks the internal logic of the program is A. Black box testing B. White box testing C. Both (A) and (B) D. None of the above

Last Answer : B. White box testing

Description : For a program of k variables, boundary value analysis yields .............. test cases. (A) 4k – 1 (B) 4k (C) 4k + 1 (D) 2k – 1

Last Answer : (C) 4k + 1

Description : All java classes are derived from A) java.lang.Class B) java.util.Name C) java.lang.Object D) java.awt.Window

Last Answer : D) java.awt.Window

Description : …………. Is the process of creating new classes, called derived classes from existing classes called base class. A) Inheritance B) Encapsulation C) Polymorphism D) Overloading

Last Answer : A) Inheritance

Description : .................. allows to create classes which are derived from other classes, so that they automatically include some of its "parent's" members, plus its own members. (A) Overloading (B) Inheritance (C) Polymorphism (D) Encapsulation 

Last Answer : (B) Inheritance

Description : Consider an experiment of tossing two fair dice, one black and one red. What is the probability that the number on the black die divides the number on red die ? (A) 22 / 36 (B) 12 / 36 (C) 14 / 36 (D) 6 / 36

Last Answer : (C) 14 / 36 

Description : Which testing methods are used by end-users who actually test software before they use it? A. Alpha & Beta Testing B. White Box Testing C. Black Box Testing D. Trial & Error Testing

Last Answer : A. Alpha & Beta Testing

Description : V- model uses -------- test models a) Component testing, integration testing, system testing and acceptance testing b) alpha testing, beta testing , acceptance testing and user testing c) black box testing, white box testing and gray box testing

Last Answer : a

Description : Evaluating testability of the requirements and system are a part of which phase:- a) Test Analysis and Design b) Test Planning and control c) Test Implementation and execution d) Evaluating ... text box which accepts alphabets in lower or upper case. Identify the invalid Equivalence class value.

Last Answer : a) Test Analysis and Design

Description : The testing that focuses on the variables is called (A) black box testing (B) white box testing (C) data variable testing (D) data flow testing

Last Answer : (A) black box testing

Description : f the temperature falls below 18 degrees, the heating is switched on. When the temperature reaches 21 degrees, the heating is switched off. What is the minimum set of test input values to cover all valid equivalence ... 17, 18, 20 and 21 degrees C. 18, 20 and 22 degrees D. 16 and 26 degrees

Last Answer : A. 15, 19 and 25 degrees

Description : Which of the following are facts about a top-down software testing approach? I. Top-down testing typically requires the tester to build method stubs. II. Top-down testing typically requires the tester to build test drivers. (1) only I (2) Only II (3) Both I and II (4) Neither I nor II

Last Answer : (1) only I

Description : Test Conditions are derived from :- a) Specifications b) Test Cases c) Test Data d) Test Design

Last Answer : a) Specifications

Description : In Unix operating system, special files are used to : (A) buffer data received in its input from where a process reads (B) provide a mechanism to map physical device to file names (C ... pointers associated with i-nodes (D) store information entered by a user application program or utility program

Last Answer : (B) provide a mechanism to map physical device to file names 

Description : Through a point in a loaded soil mass, there exists typical planes mutually orthogonal on which the stress is wholly normal and no shear stress acts, if is (A) 1 (B) 2 (C) 3 (D) 4

Last Answer : Answer: Option C

Description : Coverage based analysis is best described as: A. A metric used to show the logic covered during a test session providing insight to the extent of testing. B. A tool for documenting the unique ... their status through to resolution. D. The most traditional means for analyzing a system or a program

Last Answer : A. A metric used to show the logic covered during a test session providing insight to the extent of testing.

Description : Array is A) Primary data type B) Pointer data type C) Heterogeneous data type D) Homogenous data type

Last Answer : D) Homogenous data type

Description : What type of data is: a=[(1,1),(2,4),(3,9)]? a) Array of tuples b) List of tuples c) Tuples of lists d) Invalid type

Last Answer : b) List of tuples

Description : ………..defines the structure of a relation which consists of a fixed set of attribute-domain pairs. A) Instance B) Schema c) Program D) Super Key

Last Answer : B) Schema

Description : A triangulation of a polygon is a set of T chords that divide the polygon into disjoint triangles. Every triangulation of n-vertex convex polygon has ................ chords and divides the polygon into ............... triangles. (A) n-2, n-1 (B) n-3, n-2 (C) n-1, n (D) n-2, n-2

Last Answer : (B) n-3, n-2

Description : We use the output of the requirement analysis, the requirement specification as the input for writing :- a) User Acceptance Test Cases b) Integration Level Test Cases c) Unit Level Test Cases d) Program specifications

Last Answer : a) User Acceptance Test Cases

Description : Which of the following, in C++, is inherited in a derived class from base class ? (A) constructor (B) destructor (C) data members (D) virtual methods

Last Answer : (C) data members

Description : What Is Black Box Testing And White Box Testing?

Last Answer : Black box testing is an external perspective of the object that is to be tested to obtain test cases. These tests may be functional or non functional. The valid and invalid inputs are tested ... chosen by the tester to exercise paths through the code to determine the outputs that are appropriate.

Description : . A security audit performed on the internal network of an organization by the network administration is also known as ___________. A. Grey-box testing B. Black-box testing C. White-box testing D. Active testing

Last Answer : C. White-box testing

Description : A security audit performed on the internal network of an organization by the network administration is also known as ___________. a. Grey-box testing b. Black-box testing c. White-box testing d. Active testing E. Passive testing

Last Answer : c. White-box testing

Description : A security audit performed on the internal network of an organization by the network administration is also known as ___________. A. Grey-box testing B. Black-box testing C. White-box testing D. Active testing E. Passive testing

Last Answer : C. White-box testing

Description : A security audit performed on the internal network of an organization by the network administration is also known as ___________. ∙ A. Grey-box testing ∙ B. Black-box testing ∙ C. White-box testing ∙ D. Active testing ∙ E. Passive testing

Last Answer : C. White-box testing

Description : Behavioral testing is a) White box testing b) Black box testing c) Grey box testing d) None of the mentioned

Last Answer : Ans : b

Description : The testing in which code is checked a) Black box testing b) White box testing c) Red box testing d) Green box testing

Last Answer :  Ans :b

Description : Boundary value analysis belong to? a) White Box Testing b) Black Box Testing c) White Box & Black Box Testing d) None of the mentioned

Last Answer : Ans: b

Description : Explain the concept of black box testing and white box testing.

Last Answer : Black Box Testing: * It is a way of software testing in which the internal structure or the program or the code is hidden and nothing is known about it. * It also known as ... implementation. * White-box testing is time-consuming, bigger programming applications take the time to test fully.

Description : The relation "divides" on a set of positive integers is .................. (A) Symmetric and transitive (B) Anti symmetric and transitive (C) Symmetric only (D) Transitive only

Last Answer : (B) Anti symmetric and transitive Explanation: The ‘divide’ operation is antisymmetric because if a divides b does not necessarily implies that b divides a. If a divides b and b divides c then a divides c. So, it is transitive as well.