Software Testing Questions

Q:

Which of the following is a form of functional testing?

A) Security testing B) Performance testing
C) Boundary value analysis D) Usability testing
 
Answer & Explanation Answer: D) Usability testing

Explanation:

Functional testing is a type of testing that is done against the requirements of the business application. 

Which_of_the_following_is_a_form_of_functional_testing1552046654.png image

Examples of functional testing are Smoke testing, Sanity testing, Regression testing, Usability testing.

Report Error

View Answer Report Error Discuss

11 9504
Q:

Impact analysis helps to decide

A) How many more test cases need to written. B) How much regression testing should be done.
C) Different Tools to perform Regression Testing D) Exit Criteria
 
Answer & Explanation Answer: B) How much regression testing should be done.

Explanation:

Impact Analysis is used in software testing to define all the risks associated with any kind of changes in a product being tested.

Impact Analysis is nothing but analyzing the impact of changes in the deployed product or application. It gives the information about the areas of the system that may be affected due to the change in the particular section or features of the application.

 

Why Impact Analysis is done :


1. It is done to understand the possible outcome of implementing the change. Inducing too much functionality into a product can reduce the overall performance of the product.

2. To identify all the files, documents and models that might have to be modified if team decides to implement the change in product

3. To estimate the effort needed behind implementing the change

4. To identify the task required to implement the change

5. It will list the dependencies on a specific element

 

The impact is analyzed on Requirements, Design & Architecture, impact on Test and impact on schedule.

Report Error

View Answer Report Error Discuss

0 7545
Q:

Of the following tree structure, which is, efficient considering space and time complexities?

A) Incomplete Binary Tree B) Complete Binary Tree
C) Full Binary Tree D) None
 
Answer & Explanation Answer: B) Complete Binary Tree

Explanation:

Full binary tree loses its nature when operations of insertions and deletions are done. For incomplete binary trees, extra storage is required and overhead of NULL node checking takes place. So complete binary tree is the better one since the property of complete binary tree is maintained even after operations like additions and deletions are done on it.

Report Error

View Answer Report Error Discuss

Filed Under: Software Testing

6 6745
Q:

What is the type of the algorithm used in solving the 8 Queens problem ?

A) Dynamic Programming B) BackTracking
C) Branch and Bound D) None
 
Answer & Explanation Answer: B) BackTracking

Explanation:

BackTracking is used for solving N-Queens problem

Report Error

View Answer Report Error Discuss

Filed Under: Software Testing

1 5379
Q:

Describe how to perform Risk Analysis during software testing.

Answer

While a test plan is being created, risks involved in testing the product are to be taken into consideration along with possibility of their occurrence and the damage they may cause along with solutions; if any. Detailed study of this is called as Risk Analysis.


Some of the risks could be:


New Hardware 


New Technology 


New Automation Tool 


Sequence of code delivery 


Availability of application test resources 


Identify and describe the risk magnitude indicators: High, Medium and Low


High magnitude means the effect of the risk would be very high and non-tolerable. Company may face severe loss and its reputation is at risk. Must be tested.


Medium: tolerable but not desirable. Company may suffer financially but there is limited liability or loss of reputation. Should be tested.


Low: tolerable. Little or no external exposure. Little or no financial loss. Company’s reputation unaffected. Might be tested.


Three perspectives of Risk Assessment: Effect, Cause and Likelihood.


To assess risk by Effect, identify a condition, event or action and try to determine its impact.


To asses risk by Cause is opposite of by Effect. Begin by stating an undesirable event or condition and identify the set of events that could have permitted the condition to exist.


To asses risk by Likelihood is to determine the probability that a requirement will not be satisfied.

Report Error

View answer Workspace Report Error Discuss

Subject: Software Testing

0 4114
Q:

White Box Techniques are also called as

A) Design Based Testing B) Experience Based Technique
C) Structural Testing D) Error Guessing Technique
 
Answer & Explanation Answer: C) Structural Testing

Explanation:

Structural Testing is the other name for White Box Techniques.

Report Error

View Answer Report Error Discuss

0 3897
Q:

What are the common problems with software automation?

Answer

The biggest concern is the cost incurred for test automation. Also, often s/w test automation requires skilled personnel and authentic test automation tools. Purchasing license of such tools is a costly affair.


Also the time required for test automation is more. Automation often requires recording the sequence of operations you need to perform in order to execute a particular test case and comparing the final o/p with the expected o/p. Functions/macros need also be written sometimes for some test cases. All this could be a time consuming job. 

Report Error

View answer Workspace Report Error Discuss

Subject: Software Testing

3 3458
Q:

Configuration management is not concerned with

A) maintaining versions of software B) controlling documentation changes
C) controlling changes to the source code D) choice of hardware configuration for an application
 
Answer & Explanation Answer: D) choice of hardware configuration for an application

Explanation:

Configuration management is not concerned with the choice of the hardware configuration for an application.

 

Configuration management is concerned with the development of procedures and standards for cost-effective managing and controlling charges in an evolving s/w system.

It includes

1)software versions maintenance

2)controlling changes in documentation

3)controlling changes to the source code

4) management activities

Report Error

View Answer Report Error Discuss

1 2981