1. | Which defect amplification model is used to illustrate the generation and detection of errors during the preliminary steps of a software engineering process? |
a. | Design |
b. | Detailed design |
c. | Coding |
d. | All mentioned above |
View Answer Report Discuss Too Difficult! Search Google |
Answer: (d).All mentioned above
|
2. | Which method is used for evaluating the expression that passes the function as an argument? |
a. | Strict evaluation |
b. | Recursion |
c. | Calculus |
d. | Pure functions |
View Answer Report Discuss Too Difficult! Search Google |
Answer: (a).Strict evaluation
|
3. | Organization can have in-house inspection, direct involvement of users and release of beta version are few of them and it also includes usability, compatibility, user acceptance etc. is called |
a. | Task analysis |
b. | GUI requirement gathering |
c. | GUI design & implementation |
d. | Testing |
View Answer Report Discuss Too Difficult! Search Google |
Answer: (d).Testing
|
4. | Which testing is the re-execution of some subset of tests that have already been conducted to ensure the changes that are not propagated? |
a. | Unit testing |
b. | Regression testing |
c. | Integration testing |
d. | Thread-based testing |
View Answer Report Discuss Too Difficult! Search Google |
Answer: (b).Regression testing
|
5. | Which one of these belongs to integration testing in the OO context? |
a. | Unit testing |
b. | Regression testing |
c. | Sandwich testing |
d. | Thread-based testing |
View Answer Report Discuss Too Difficult! Search Google |
Answer: (d).Thread-based testing
|
6. | During security testing the tester plays the role of the individual who desires to______ . |
a. | Penetrates the system |
b. | Penetrates the listener |
c. | Both a and b |
d. | None of the above |
View Answer Report Discuss Too Difficult! Search Google |
Answer: (a).Penetrates the system
|
7. | Which box specifies the behavior of a system or a part of a system? |
a. | State box |
b. | Clear box |
c. | Black box |
d. | None of the above |
View Answer Report Discuss Too Difficult! Search Google |
Answer: (c).Black box
|
8. | The longer a fault exists in software |
a. | the more tedious its removal becomes |
b. | the more costly it is to detect and correct |
c. | the less likely it is to be properly corrected |
d. | All of the mentioned |
View Answer Report Discuss Too Difficult! Search Google |
Answer: (d).All of the mentioned
|
9. | Which condition defines the circumstances for a particular operation is valid? |
a. | Postcondition |
b. | Precondition |
c. | Invariant |
d. | None of the above |
View Answer Report Discuss Too Difficult! Search Google |
Answer: (b).Precondition
|
10. | Which is not a SQA activity? |
a. | Black box testing |
b. | White box testing |
c. | Integration testing |
d. | Unit testing |
View Answer Report Discuss Too Difficult! Search Google |
Answer: (b).White box testing
|