MCQOPTIONS
Saved Bookmarks
This section includes 128 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
The name of the testing which is done to make sure the existing features are not affected by new changes |
| A. | Recursive testing |
| B. | White Box testing |
| C. | Unit testing |
| D. | Regression testing |
| Answer» E. | |
| 2. |
Automation Testing should be done before starting Manual testing. Is the above statement correct? |
| A. | yes |
| B. | no |
| Answer» C. | |
| 3. |
Who are the persons involved in a Formal Review?i. Managerii. Moderatoriii. Scribe / Recorderiv. Assistant Manager |
| A. | i,ii,iii,iv are true |
| B. | i,ii,iii are true and iv is false. |
| C. | ii,iii,iv are true and i is false. |
| D. | i,iv are true and ii, iii are false. |
| Answer» D. i,iv are true and ii, iii are false. | |
| 4. |
Which of the following is likely to benefit most from the use of test tools providing test capture and replay facilities? |
| A. | integration testing |
| B. | regression testing |
| C. | system testing |
| D. | user acceptance testing |
| Answer» C. system testing | |
| 5. |
A useful tool to visualize, clarify, link, identify, and classify possible cause of a problem. This is also called as fishbone diagram what is this? |
| A. | pareto analysis |
| B. | cause-and-effect diagram |
| Answer» C. | |
| 6. |
A system maintaining its integrity while accepting a temporary halt in its operation is said to be in a state of |
| A. | Full Fault Tolerance |
| B. | Graceful Degradation |
| C. | Fail Soft |
| D. | Fail Safe |
| Answer» E. | |
| 7. |
Which of the following is not one of the five information domain characteristics of Function Point (FP) decomposition? |
| A. | External inputs |
| B. | External outputs |
| C. | External process |
| D. | Internal Inputs |
| Answer» D. Internal Inputs | |
| 8. |
_____________ categorizes class operations based on the generic function that each performs |
| A. | Category-based partitioning |
| B. | Attribute-based partitioning |
| C. | State-based partitioning |
| D. | None of the mentioned |
| Answer» B. Attribute-based partitioning | |
| 9. |
Which of the following risks are derived from the software or hardware technologies that are used to develop the system? |
| A. | Managerial risks |
| B. | Technology risks |
| C. | Estimation risks |
| D. | Organizational risks |
| Answer» C. Estimation risks | |
| 10. |
The object of ___________within an OO system is to design tests that have a high likelihood of uncovering plausible bugs. |
| A. | Fault-based testing |
| B. | Integration testing |
| C. | Use-based testing |
| D. | Scenario-based testing |
| Answer» B. Integration testing | |
| 11. |
- means under what test environment(Hardware, software set up. the application will run smoothly |
| A. | test bed |
| B. | checkpoint |
| C. | code walk through |
| D. | checklist |
| Answer» B. checkpoint | |
| 12. |
Stratification is a Technique used to analyze/divide a universe of data into homogeneous groups(stratA.. |
| A. | true |
| B. | false |
| Answer» B. false | |
| 13. |
A powerful technique to use any time a system presents a small input domain with a large number of permutations is known as |
| A. | Regression testing |
| B. | Object oriented testing |
| C. | Orthogonal array testing |
| D. | None of the above |
| Answer» D. None of the above | |
| 14. |
A Person who documents all the issues, problems and open points that were identified during a formal review. |
| A. | Moderator. |
| B. | Scribe |
| C. | Author |
| D. | Manager |
| Answer» C. Author | |
| 15. |
Which of the following issues must be addressed if a successful software testing strategy is to be implemented? |
| A. | Use effective formal technical reviews as a filter prior to testing |
| B. | Develop a testing plan that emphasizes rapid cycle testing. |
| C. | State testing objectives explicitly |
| D. | All of the mentioned |
| Answer» E. | |
| 16. |
The cyclomatic complexity metric provides the designer with information regarding the number of |
| A. | Cycles in the program |
| B. | Errors in the program |
| C. | Independent logic paths in the program |
| D. | Statements in the program |
| Answer» E. | |
| 17. |
Testing and subsequent debugging can account for __________ software development effort. |
| A. | 5-10% |
| B. | 10-20% |
| C. | 30-40% |
| D. | 80-90% |
| Answer» D. 80-90% | |
| 18. |
Which testing integrates the set of classes required to respond to one input or event for the system? |
| A. | cluster testing |
| B. | thread-based testing |
| C. | use-based testing |
| D. | none of the mentioned |
| Answer» C. use-based testing | |
| 19. |
Configuration Management Plan describes the Configuration Management procedures and structures to be used. |
| A. | true |
| B. | false |
| Answer» B. false | |
| 20. |
The process that deals with the technical and management issues of software development called as? |
| A. | delivery process |
| B. | testing process |
| C. | software process |
| Answer» D. | |
| 21. |
What is the normal order of activities in which traditional software testing is organized?a. Integration testingb. System testingc. Unit testingd. Validation testing |
| A. | a, d, c, b |
| B. | b, d, a, c |
| C. | c, a, d, b |
| D. | d, b, c, a |
| Answer» D. d, b, c, a | |
| 22. |
Requirements Specification, Planning, Test case Design, Execution, Bug Reporting & Maintenance This Life Cycle comes Under |
| A. | sdlc |
| B. | stlc |
| C. | sqlc |
| D. | blc |
| Answer» C. sqlc | |
| 23. |
Requirement and Analysis, Design, Development or Coding, Testing and Maintenance is called as Software Development Life Cycle (SDLC) |
| A. | true |
| B. | false |
| Answer» B. false | |
| 24. |
Which Software Development Life cycle model will require to start Testing Activities when starting development activities itself |
| A. | water falls model |
| B. | spiral model |
| C. | v-model |
| D. | linear model |
| Answer» D. linear model | |
| 25. |
Which of the following is not White box testing? |
| A. | structural testing |
| B. | code-based testing |
| C. | glass box testing. |
| D. | closed box testing |
| Answer» E. | |
| 26. |
System Testing is ---- |
| A. | black box testing |
| B. | white box testing |
| C. | smoke testing |
| D. | both a) and b) |
| Answer» B. white box testing | |
| 27. |
Which is required skill of a Tester? |
| A. | good programmer |
| B. | reliable |
| C. | attention to details |
| D. | being diplomatic |
| Answer» B. reliable | |
| 28. |
Sandwich/hybrid strategy is--- |
| A. | top down |
| B. | bottom up |
| C. | combination of top down & bottom up |
| D. | none of the above |
| Answer» D. none of the above | |
| 29. |
Following is not a Software Test Life Cycle Phase. |
| A. | requirements gathering |
| B. | test planning |
| C. | test closure |
| D. | test design |
| Answer» B. test planning | |
| 30. |
Following is not a technique of black box. |
| A. | equivalence portioning |
| B. | boundary value analysis |
| C. | cause effect graphing |
| D. | statement coverage |
| Answer» E. | |
| 31. |
Which of the following is not a level in testing? |
| A. | system testing |
| B. | black box testing. |
| C. | integration testing |
| D. | functional testing |
| Answer» E. | |
| 32. |
Smoke Testing is ……..approach |
| A. | integration testing |
| B. | unit testing |
| C. | stress testing |
| D. | none of the above. |
| Answer» B. unit testing | |
| 33. |
What is the main goal of software testing? |
| A. | testing |
| B. | bug prevention |
| C. | study |
| D. | execution |
| Answer» C. study | |
| 34. |
In which level testing is performed |
| A. | unit,acceptance,integration,system |
| B. | unit,integration,system, acceptance |
| C. | unit,system,integration,acceptance |
| D. | it is on the nature of software project. |
| Answer» E. | |
| 35. |
It is one principal of testing is that Exhausting Testing is….. |
| A. | impractical but possible |
| B. | possible |
| C. | impractical and impossible |
| D. | impossible |
| Answer» D. impossible | |
| 36. |
Unit testing is carried out by: |
| A. | system user |
| B. | client |
| C. | customers |
| D. | developers |
| Answer» E. | |
| 37. |
The formula of cyclometric complexity |
| A. | n-e+2 |
| B. | e-n-2 |
| C. | n-2-e |
| D. | n-e+3 |
| Answer» B. e-n-2 | |
| 38. |
In software testing Verification is ….. |
| A. | are we building the product right? |
| B. | to checks what we are developing is the right product. |
| C. | are we building the right product? |
| D. | none of the above. |
| Answer» B. to checks what we are developing is the right product. | |
| 39. |
……………testing checks performance of system |
| A. | white box testing |
| B. | black box testing |
| C. | performance testing |
| D. | smoke testing |
| Answer» D. smoke testing | |
| 40. |
Cyclomatic complexity is carried out in…. |
| A. | black box testing |
| B. | load testing |
| C. | white box testing |
| D. | green box testing |
| Answer» D. green box testing | |
| 41. |
LoadRunner create load by running …… |
| A. | load creator |
| B. | virtual users |
| C. | load user |
| D. | none of the above |
| Answer» C. load user | |
| 42. |
In static testing--------- |
| A. | code is not executed |
| B. | code executed twice |
| C. | code executed repeatedly |
| D. | none of the above. |
| Answer» B. code executed twice | |
| 43. |
Boundary value analysis is the technique comes under…… |
| A. | white box testing |
| B. | black box testing |
| C. | gray box testing |
| D. | none of the above. |
| Answer» C. gray box testing | |
| 44. |
______________ builds upon Vulnerability Assessment by adding manual verification to confirm exposure. |
| A. | security audit |
| B. | security assessment |
| C. | vulnerability assessment |
| D. | penetration test |
| Answer» C. vulnerability assessment | |
| 45. |
________________ simulates an attack by a malicious party. |
| A. | security audit |
| B. | vulnerability scan |
| C. | vulnerability assessment |
| D. | penetration test |
| Answer» E. | |
| 46. |
_________ is driven by an Audit or a Risk function to look at a specific control or compliance issue. |
| A. | security audit |
| B. | vulnerability scan |
| C. | vulnerability assessment |
| D. | penetration test |
| Answer» B. vulnerability scan | |
| 47. |
_____________looks for known security issues by using automated tools to match conditions with known vulnerabilities. |
| A. | discovery |
| B. | vulnerability scan |
| C. | security assessment |
| D. | penetration test |
| Answer» C. security assessment | |
| 48. |
_______________ of information refers to protecting information from being modified by unauthorized parties. |
| A. | confidentiality |
| B. | authentication |
| C. | authorization |
| D. | integrity |
| Answer» E. | |
| 49. |
The review process for a particular review begins with a _____________ by the author to the moderator in formal review. |
| A. | request for review |
| B. | requirement analysis |
| C. | notice for review |
| D. | goal design |
| Answer» B. requirement analysis | |
| 50. |
Reporting Discrepancies as incidents is a part of which phase :- |
| A. | test analysis and design |
| B. | test implementation and execution |
| C. | test closure activities |
| D. | evaluating exit criteria and reporting |
| Answer» C. test closure activities | |