1.
In software testing, what is the purpose of a "boundary value analysis"?
Correct Answer
C. To identify defects at the boundaries of input ranges
Explanation
Boundary value analysis is a testing technique that aims to find defects at the edges or boundaries of input domains, where errors are more likely to occur.
2.
Which of these is NOT an expected benefit of testers participating early in a development project?
Correct Answer
A. Testers can find all the defects before a system is released
Explanation
Testers participating early in a development project cannot guarantee finding all defects before a system is released. While their involvement can help identify ambiguous requirements specifications, recommend ways to make the system easier to test, and assist in planning and scheduling test resource needs, it is not possible for testers to find all defects before a system is released. Defects can still be discovered during the testing phase, even with early tester involvement.
3.
Mistakes made in design specifications often result in defects and rework in:
Correct Answer
B. Designs and code
Explanation
Mistakes made in design specifications often result in defects and rework in designs and code. This is because design specifications serve as the blueprint for creating the software or system, and any errors or misunderstandings in the design can lead to faulty implementation. These mistakes can manifest as defects or bugs in the final product, requiring rework to fix them. Therefore, it is crucial to ensure accurate and thorough design specifications to minimize the likelihood of defects and rework in the designs and code.
4.
In software testing we use the word “defect” in a very precise way. A defect is:
Correct Answer
A. A flaw in a component or system that can cause the component or system to fail to perform its required function
Explanation
A defect in software testing refers to a flaw in a component or system that has the potential to cause the component or system to fail in performing its intended function. This means that the defect can prevent the software from operating as expected or delivering the desired result. It is important to identify and fix defects during testing to ensure the quality and functionality of the software.
5.
Consider the code fragment given below.
Input a;
If(a>100) {
a=a-100;
if(a>50) {
a=a-50;
}
} else if (a<100) {
Print “ Invalid Input”;
}
Which answer choice would be correct if this program is executed for a=200, a=110, a=0, and a=50?
Correct Answer
A. 100% statement coverage has been achieved but 100% decision coverage has not been achieved.
Explanation
Statement coverage means that every executable statement in the code is run at least once.
Decision coverage (also known as branch coverage) means that each possible outcome of every decision (i.e., each "if" condition) is tested at least once, covering both true and false conditions.
For the given program, let's analyze the test cases:
a = 200:
The condition a > 100 is true.
The inner condition a > 50 is also true, so both the outer and inner statements are executed.
a = 110:
The condition a > 100 is true.
The inner condition a > 50 is false, so only the outer block is executed.
a = 0:
The condition a < 100 is true, so the "Invalid Input" is printed.
a = 50:
The condition a < 100 is true again, and the "Invalid Input" is printed.
This set of test cases covers all statements (both conditions and their bodies), so 100% statement coverage is achieved.
However, the decision coverage is incomplete because the else part of the first if (a > 100) condition (i.e., the a < 100 block) has not been covered with a value for a = exactly 100. Therefore, 100% decision coverage has not been achieved.
6.
Given the following reqirement.
Requirement ID:2.8
Requirement Description: Additional Entrance Fee
Detailed Description:
An additional fee of $3 is charged during the weekend, but
1) Visitors aged under 7 are not charged.
2) Visitors aged 7 to 13 inclusive get a 20% discount off the additional fee.
3) Visitors aged greater than 65 get a 50% discount off the additional fee.
Age should be an integer of 0 or above.
Weekend means Friday to Sunday inclusive.
Which of the following state is NOT Correct?
Correct Answer
C. Thursday is a valid input boundary value.
Explanation
The statement "Thursday is a valid input boundary value" is not correct because the requirement clearly states that the additional fee of $3 is only charged during the weekend, which is defined as Friday to Sunday inclusive. Therefore, Thursday is not a valid input boundary value as it falls outside of the defined weekend period.
7.
Which of the following application will be Most suitable for testing by Use Cases?
Correct Answer
C. A billing system used to calculate monthly charge based on large number of subscribers parameters.
Explanation
Use cases are a way to test the functionality and behavior of a system or application. In this case, testing the billing system used to calculate monthly charges based on a large number of subscriber parameters would be most suitable for testing by use cases. This is because use cases can help ensure that all possible scenarios and parameters are considered and tested accurately, which is crucial for a billing system that deals with a large number of subscribers and parameters.
8.
A Software Company decided to buy a commercial application for its accounting operations.As part of the Evaluation process,the company decided to assemble a team to test a .....................
Which team would be the most suitable for this project?
Correct Answer
C. A team with a mix of software testers and experts from the accounting department.
Explanation
A team with a mix of software testers and experts from the accounting department would be the most suitable for this project because they would have both the technical knowledge to test the application effectively and the domain expertise to understand the specific requirements and challenges of accounting operations. This combination would ensure that all aspects of the application are thoroughly tested and any issues or bugs are identified and resolved accurately. It would also facilitate effective communication and collaboration between the software testers and the accounting experts, leading to a more efficient and successful evaluation process.
9.
Software defects arise because of:
Correct Answer
D. All of the above
Explanation
Software defects can arise due to various reasons. Mistakes in the software requirements or specification can lead to incorrect functionality or missing features. Poor coding practices can result in bugs and vulnerabilities in the code. Extremely tight schedules can cause developers to rush and overlook potential issues. Therefore, all of the mentioned factors can contribute to the occurrence of software defects.
10.
Which of the following is NOT a good reason to test software?
Correct Answer
B. Prove that the software is perfect
Explanation
Testing software is an essential process to identify faults and prevent errors. It helps to ensure that the software works as expected and meets the required specifications. However, it is not possible to prove that software is perfect through testing alone. Testing can only provide evidence of the software's functionality and identify any potential issues or faults. Therefore, proving the software is perfect is not a valid reason for testing.
11.
Consider the following excerpt from a defect report:
“To recreate the failure we used test file TST_01_16 .dat, which is available in the common shared folder”
Which incident report objective does this except satisfy?
Correct Answer
A. Provides developers with information to isolate the failure
Explanation
The excerpt from the defect report provides developers with information on how to recreate the failure by specifying the test file that was used. This information is crucial for developers to isolate the failure and understand the specific conditions under which it occurred. It helps them analyze the issue and identify the root cause more effectively. Therefore, this excerpt satisfies the objective of providing developers with information to isolate the failure.
12.
Exit Criteria may consist of
i. Thoroughness measures , such as coverage of code, functionality or risk
ii. Estimates of Defect density or reliability measures.
iii. Residual risk such as defects not fixed or lack of test coverage in certain areas
iv. Verifying the Test Environment.
Correct Answer
B. I,ii,iii is correct and iv is incorrect
Explanation
The correct answer is i,ii,iii is correct and iv is incorrect. This is because the exit criteria for a testing phase typically includes measures of thoroughness, such as code coverage, functionality coverage, and risk coverage. It also includes estimates of defect density or reliability measures to evaluate the quality of the software. Additionally, the exit criteria may consider residual risks, such as defects not fixed or lack of test coverage in certain areas. However, verifying the test environment is not typically included in the exit criteria.
13.
Which of the following are valid justifications for developers testing their own code during unit testing:
i. Their lack of independence is mitigated by independent testing during system and acceptance testing.
ii. A person with a good understanding of the code can find more defects more quickly using white-box techniques.
iii. Developers have a better understanding of the requirements than testers.
iv. Testers write unnecessary incident reports because they find minor differences between the way in which the system behaves and the way in which it is specified to work.
Select one:
Correct Answer
A. I and ii
Explanation
Developers testing their own code during unit testing is justified because their lack of independence is mitigated by independent testing during system and acceptance testing. Additionally, a person with a good understanding of the code can find more defects more quickly using white-box techniques.
14.
During system testing phase of a word processor, a tester finds that on opening a file from a particular set of files ,which are part of a critical workflow, the word processor crashes .which of the following is the next step the tester should prior to recording the deviation?
Correct Answer
D. Try to recreate the incident before reporting
Explanation
The next step the tester should take prior to recording the deviation is to try to recreate the incident before reporting it. This is important because it helps the tester gather more information about the issue, such as the specific steps or conditions that lead to the crash. By recreating the incident, the tester can provide more detailed and accurate information to the developers, which can help them identify and fix the problem more effectively.
15.
Test planning has which of the following major tasks?
i. Determining the scope and risks, and identifying the objectives of testing.
ii. Determining the test approach (techniques, test items, coverage, identifying and interfacing the teams involved in testing , testware)
iii. Reviewing the Test Basis (such as requirements, architecture, design, interface)
iv. Determining the exit criteria()
Correct Answer
A. I,ii,iv are true and iii is false
Explanation
The correct answer is i, ii, iv are true and iii is false. Test planning involves determining the scope and risks, identifying the objectives of testing, determining the test approach, and determining the exit criteria. Reviewing the Test Basis is not a major task in test planning.
16.
Which of the following processes is related to ensuring the integrity of the testware?
Correct Answer
C. Configuration management.
Explanation
Configuration management is the process that ensures the integrity of the testware. It involves managing and controlling changes to the test environment, test data, and test tools. By implementing configuration management, organizations can maintain the consistency and reliability of the testware, ensuring that it remains accurate and up-to-date. This process helps to prevent issues such as using outdated or incorrect test assets, which could lead to unreliable test results. Therefore, configuration management is crucial for maintaining the integrity of the testware.
17.
Which of the following lists factors that contribute to PROJECT risks?
Correct Answer
C. Skill and staff shortages, Problems in defining the right requirements; contractual issues
Explanation
The correct answer is Skill and staff shortages, Problems in defining the right requirements; contractual issues. This answer lists three factors that contribute to project risks: skill and staff shortages, problems in defining the right requirements, and contractual issues. These factors can all lead to delays, inefficiencies, and potential failures in the project.
18.
The following open incident report provided?
Date:01.01.01
Description : When pressing the stop button the application status remain in “ Attention” instead of “Ready”.
Severity: High
Life cycle integration
Which of the following details are missing in the incident report?
i. Identification or configuration of the application.
ii.The name of the developer.
iii. Recommendations of the developer.
iv. The actions and conditions that came before the pressing of the button.
Correct Answer
C. I,iv
Explanation
The incident report is missing the identification or configuration of the application (i) and the actions and conditions that came before the pressing of the button (iv). The report does not mention the name of the developer (ii) or any recommendations from the developer (iii).
19.
Which of the following are triggers for maintenance testing?
1. The period of time since last regression testing a system
2. New operating system installations
3. Changes in corporate policies and government regulations
4. Converting a legacy system to a software package
5. Developing a new software application
Select one:
Correct Answer
C. 2, 3, and 4
Explanation
Triggers for maintenance testing include new operating system installations, changes in corporate policies and government regulations, and converting a legacy system to a software package. These events can potentially introduce new bugs or require modifications to the existing system, making it necessary to conduct maintenance testing to ensure the system continues to function correctly. Developing a new software application is not listed as a trigger for maintenance testing, so option 2, 3, and 4 is the correct answer.
20.
Regression testing means:
Correct Answer
A. Testing of a previously tested program to ensure that defects have not been introduced or uncovered due to program modifications
Explanation
Regression testing refers to the process of testing a program that has already been tested in order to ensure that no new defects have been introduced or uncovered as a result of program modifications. This type of testing is crucial to verify that the changes made to the program have not negatively impacted its functionality or introduced any new bugs. By retesting the program, developers can ensure that it still performs as expected and that any modifications have not caused any unintended consequences.
21.
An impact analysis after maintenance to an existing system evaluates:
Select one:
Correct Answer
C. How changes to a system might affect the unchanged areas of the system
Explanation
An impact analysis after maintenance to an existing system evaluates how changes made to a system might affect the unchanged areas of the system. This analysis helps identify potential risks and dependencies that may arise due to the changes, allowing for appropriate measures to be taken to mitigate any negative impacts on the unaffected areas. It helps ensure that the overall functionality and stability of the system are maintained after the maintenance activities.
22.
Risk is generally expressed in the two dimensions of:
Select one:
Correct Answer
A. Impact and likelihood
Explanation
Risk is generally expressed in the two dimensions of impact and likelihood. Impact refers to the potential consequences or harm that may occur if a risk event were to happen. Likelihood, on the other hand, refers to the probability or chance of the risk event occurring. By considering both the impact and likelihood of a risk, organizations can assess and prioritize risks, develop appropriate mitigation strategies, and make informed decisions to minimize potential losses.
23.
Which of the following is a product risk?
Select one:
Correct Answer
A. Poor system reliability
Explanation
Poor system reliability is a product risk because it refers to the potential for the system to not function properly or consistently. This can lead to issues such as crashes, errors, or data loss, which can negatively impact the user experience and the overall quality of the product. It can also result in customer dissatisfaction, loss of trust, and potential financial losses for the company. Therefore, poor system reliability poses a risk to the successful development and deployment of the product.
24.
Which of the following is a project risk?
Select one:
Correct Answer
B. Skill and/or staff shortage
Explanation
A skill and/or staff shortage can be considered a project risk because it can hinder the successful completion of a project. If a project requires specific skills or expertise that are not readily available within the team or organization, it can lead to delays, errors, or subpar performance. Additionally, a shortage of staff can result in an increased workload for the existing team members, which can negatively impact productivity and the ability to meet project deadlines. Therefore, a skill and/or staff shortage is a potential risk that needs to be addressed and mitigated during project planning and execution.
25.
Which of the following is NOT a part of the risk management process?
Select one:
Correct Answer
C. Comparing identified risks to actual occurrences
Explanation
Comparing identified risks to actual occurrences is not a part of the risk management process. Risk management involves identifying potential risks, assessing their likelihood and impact, prioritizing them based on their severity, and implementing strategies to control and mitigate those risks. Comparing identified risks to actual occurrences falls under the monitoring and evaluation phase of risk management, where the effectiveness of risk mitigation measures is assessed and adjustments are made if necessary.
26.
The test basis is:
Select one:
Correct Answer
C. All documents and sources from which the requirements of a system can be inferred
Explanation
The test basis refers to all the documents and sources from which the requirements of a system can be inferred. This includes any written or formal requirements document, as well as the set of all test cases, test procedures, input data, and expected results. The test basis provides the foundation for the testing process, as it outlines what needs to be tested and what the expected outcomes should be. It ensures that the testing is aligned with the system requirements and helps to identify any gaps or inconsistencies in the requirements documentation.
27.
You have to specify test cases based on equivalence partitioning and boundary value analysis for an internet shop selling baby shoes. The shop provides a selection of shoes based on the following input parameters.
There are 4 different sizes, depending on the age of the baby. The system selects the appropriate size based on the following criteria:
1. 0 < age <= 4 months: size 1
2. 4 < age <= 8 months: size 2
3. 8 < age <= 15 months: size 3
4.15 < age <= 24 months: size 4
The gender of the baby: boy or girl
Which of the following statements is true?
Select one:
Correct Answer
A. The total number of combinations of valid equivalence classes of age and gender is 8
28.
ST is a software Testing organization which utilizes a testing knowledge basis. Access to ST knowledge base can be either full or limited. Access level is determined based on ST certification and testing experience as follows:
1. If ST certified, with less than 5 years testing experience - allow limited access
2. If ST certified, 5 - 10 years of testing experience - allow full access
3. If not ST certified with 5 - 10 years of testing experience - allow limited access
What would be the results for :
A - ST certified, 12 years of testing experience
B - Not ST certified, 7 years of testing experience
C - Not ST certified, 3 years of testing experience
Select one:
Correct Answer
A. A-unknown B-limited access C-unknown
Explanation
Based on the given criteria, the results would be as follows:
A - ST certified, 12 years of testing experience: The question does not provide a specific rule for this scenario, so it is unknown what the access level would be.
B - Not ST certified, 7 years of testing experience: According to the second rule, if the person is not ST certified but has 5-10 years of testing experience, they would have limited access.
C - Not ST certified, 3 years of testing experience: The question does not provide a specific rule for this scenario, so it is unknown what the access level would be.
29.
Test implementation and execution do NOT include the following task:
Select one:
Correct Answer
B. Analyzing the test basis
Explanation
Analyzing the test basis is not a task included in test implementation and execution. Test implementation and execution involve activities such as exploring the system based on the tester's experience, logging test results in chronological order, and creating test data. Analyzing the test basis refers to the process of understanding the requirements, specifications, and documentation related to the system under test. This task is typically performed during test planning and preparation stages, rather than during test implementation and execution.
30.
A test plan should include all of the following EXCEPT
Select one:
Correct Answer
C. Results from performing a set of test cases
Explanation
A test plan is a document that outlines the objectives, scope, approach, and resources required for testing a software application. It should include criteria for when to stop testing, test design techniques to employ, risks and contingencies. However, it should not include results from performing a set of test cases as this information is typically recorded in a separate test execution report.
31.
Among other tasks during test closure, testers:
Select one:
Correct Answer
A. Gather together and save all the key artifacts from the testing project
Explanation
During test closure, testers gather and save all the key artifacts from the testing project. This is important as it allows for future reference and analysis. These artifacts may include test plans, test cases, test data, test scripts, defect reports, and any other relevant documentation. Saving these artifacts ensures that the testing process can be reviewed, audited, and improved upon in future projects. It also helps in maintaining a record of the testing activities and outcomes, which can be useful for legal or compliance purposes.
32.
Exit criteria for stopping testing should be initially established
Select one:
Correct Answer
A. During test planning activities
Explanation
During test planning activities, the exit criteria for stopping testing should be established. This is because test planning involves defining the objectives, scope, and approach of the testing process. By establishing the exit criteria during this phase, the testing team can determine when to stop testing based on predefined conditions such as achieving a certain level of test coverage, meeting specific quality goals, or completing a certain number of test cycles. This helps ensure that testing is conducted efficiently and effectively, and that the system is thoroughly tested before it is released into operational use.
33.
When reporting defects, testers should:
Select one:
Correct Answer
A. Describe the defect and its effects in neutral, factual terms to avoid criticizing the developer personally
Explanation
When reporting defects, it is important for testers to describe the defect and its effects in neutral, factual terms to avoid criticizing the developer personally. This approach promotes a constructive and professional environment where the focus is on resolving the issue rather than blaming individuals. By providing objective information, testers can effectively communicate the problem to the developers without causing unnecessary conflicts or misunderstandings.
34.
Select the statement that best describes the common differences between tester and developer mindsets:
Select one:
Correct Answer
A. Developers tend to test what they did, and testers tend to test against requirements
Explanation
This statement best describes the common differences between tester and developer mindsets. Developers typically focus on testing their own work to ensure it functions correctly, while testers focus on testing against the requirements to ensure the software meets the desired specifications. This highlights the different perspectives and objectives of developers and testers in the software development process.
35.
Consider the code fragment given below.
Input a;
If(a>100)
{
a=a-100;
if(a>50)
{
a=a-50;
}
}
else if (a<100)
{
Print “ Invalid Input”;
}
Which answer choice would be correct if this program is executed for a=200, a=110, a=0,and a=50?
Correct Answer
C. 100% statement coverage and 100% branch coverage have been achieved
Explanation
The code fragment provided includes all the statements and branches in the code. Therefore, 100% statement coverage and 100% branch coverage have been achieved. This means that every statement in the code has been executed at least once, and every possible branch (if and else if conditions) has been taken.
36.
The testing approach with the least independence is:
Select one:
Correct Answer
D. Having the developer write tests for his own code
Explanation
The testing approach with the least independence is having the developer write tests for his own code. This is because the developer may have biases and may not be able to objectively test their own code. There is a higher chance of overlooking errors or not testing all possible scenarios. Having another developer on the same team write the tests or having a tester on an independent team write the tests provides more independence and helps in identifying issues that the developer may have missed. Having the users write the tests may not be feasible or practical in all cases, but it can provide valuable insights from a user's perspective.
37.
Which of the following are correct tasks during ‘Test analysis and design’?
I. Designing and prioritizing test cases
II.Identifying any required infrastructure and tools
III.Reviewing the test basis.
IV. Creating test data and preparing test harmness
V. Writing automated test scripts.
Correct Answer
B. I,II,III,IV
Explanation
During the 'Test analysis and design' phase, the correct tasks include designing and prioritizing test cases, identifying any required infrastructure and tools, reviewing the test basis, and creating test data and preparing test harness. These tasks are essential for ensuring that the testing process is well-planned and efficient. Additionally, writing automated test scripts can also be a part of this phase as it helps in automating the testing process and improving test coverage. Therefore, the correct answer is I, II, III, IV.
38.
The Pesticide Paradox means:
Correct Answer
D. Every method you use to find bugs leaves other bugs against which those tests are ineffective
Explanation
The Pesticide Paradox means that every method used to find bugs will inevitably leave behind other bugs that are not detected by those tests. This is because as bugs are fixed, new bugs are introduced or existing bugs are overlooked. Therefore, no matter how thorough or comprehensive the bug-finding methods are, there will always be bugs that remain undetected and are not effectively targeted by the tests.
39.
In If a test suite is executed and anomalies (unexpected results) are found, it could mean:
1.No further investigation is needed
2 The test cases were poorly designed
3 Software defects are in the system
4 The tests were executed improperly
Correct Answer
C. 2, 3, and 4 are true; 1 is false
Explanation
If anomalies (unexpected results) are found during the execution of a test suite, it suggests that there are software defects in the system (option 3). This means that there are issues or bugs in the software being tested. Additionally, it also indicates that the test cases were poorly designed (option 2), as they failed to identify these anomalies. Lastly, it suggests that the tests were executed improperly (option 4), meaning that there may have been mistakes or errors in the way the tests were conducted. However, no further investigation is needed (option 1) because the anomalies already indicate the presence of software defects. Therefore, options 2, 3, and 4 are true, while option 1 is false.
40.
In software testing, what is the primary purpose of boundary value analysis?
Correct Answer
C. To test the behavior of the software at or near its limits
Explanation
Boundary value analysis is a software testing technique used to assess the software's behavior at or near its boundary values or limits. This is important because errors often occur at the edges of input ranges or limits. It helps in identifying potential issues related to boundary conditions, which can lead to more effective testing.