Practice questions Flashcards
The best time to influence the quality of a system design is in the __________.
Planning Phase
Analysis Phase
Design Phase
Testing Phase
Planning Phase
IEEE stands for:
Information Engineering Endeavoring to Excel
Institute of Electrical and Electronics Engineers
Institute of Education for E-commerce Entrepreneurs
Individual Excellence in Engineering Enterprises
Institute of Electrical and Electronics Engineers
Which type of document might be reviewed at a Review/Inspection session?
Employee performance review
Test Plan
Project Status Report
Defect Tracking Form
Test Plan
Quality control and quality assurance are different names for the same activity.
True
False
False. Quality Control monitors and audits an assessment process for the product. Quality Assurance activities are a planned system of review procedures that are conducted by personnel not directly involved in the development process.
Cause and effect diagrams can be used to view attempts to solving quality issues that have not worked in the past.
True
False
True
Which of the following is not a job responsibility of a software tester?
Identifying test cases
Preparing test data
Executing tests
Writing the functional specifications
Writing the functional specifications
The test strategy that is informal and non structured is:
Equivalence partitioning
Validation strategy
White box testing
Ad hoc testing
Ad hoc testing
The test strategy that involves understanding the program logic is:
Equivalence partitioning
White box testing
Black box testing
Boundary strategy
White box testing
Data defects can occur when accessing the programs data log files.
True
False
False
Once the requirement document is approved, the Tester can begin creating a Requirements Matrix to track the requirements throughout the SDLC.
True
False
True
Ad Hoc testing is a formal and structured testing method.
True
False
False
The programs send bad data to devices, ignore error codes coming back, and try to use devices that are busy or aren’t there. This is a:
Calculation error Functional error Hardware error System error User Interface error
Hardware error
Errors that are cosmetic in nature are usually assigned a ______ severity level.
Fatal (Severity)
Low (Severity)
Serious (Severity)
Low (Severity)
If a system is not functioning as documented and the data are not corrupted, what priority and measure are assigned?
Priority 1: Critical
Priority 2: High
Priority 3: Medium
Priority 4: Low
Priority 3: Medium
A testing process that is conducted to test new features after regression testing of previous features.
Operational testing
Progressive testing
Recovery testing
Regression testing
Progressive testing
Which of the following are major test documents? (choose the best answer)
a) Test plan
b) Test case
c) Test design
d) Test procedure
e) Defect report
a and b
a, c, and d
a, c, d, and e
all of the above
all of the above
The requirements document identifies all system components and requirements to be tested, as well as detailed approaches to be followed, so that the testing of components and requirements is effective.
True
False
False.
The document that does this is the strategy plan.
The test case log is used to keep track of the status of each test case.
True
False
True
What test document contains all the information about a specific test case, including requirements and the modules to be tested?
Test plan Test case specification Test design specification Test procedure Defect report
Test case specification
A test case specification document is used to keep track of each test run.
True
False
False
A test plan is prepared for management by the project leader, which explains all project control variances relative to the testing effort. It also summarizes test case logs and coverage statistics for key programs.
True
False
False.
That would be a testing status report.
Memory leak checker tools are used to create runtime performance profiles at the module, library and function level.
True
False
False.
Runtime performance analyzers are used for that. Memory leak checker tools are used during application runtime to find memory leaks, array overruns and illegal pointer operations.
Configuration management tools support activities related to managing the environment, including configuration management, change control, library control, documentation control.
True
False
True
The key process area at CMM Level 4 - Managed focus on establishing a quantitative understanding of both the software process and the software work products being built.
True
False
True
Non-functional system testing is a testing process that tests system requirements that do not relate to functionality.
True
False
True
A set of behavioral and performance requirements which, in aggregate, determine the functional properties of a software system.
Functional requirement
Functional specifications
Functional test cases
Functional specifications
Business process-based testing is used in system testing and acceptance testing.
True
False
True