

MCQOPTIONS
Saved Bookmarks
This section includes 262 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Fundamentals knowledge and support exam preparation. Choose a topic below to get started.
51. |
Risk exposure is given by which formula |
A. | It is the product of probability of occurrence of risk and its impact |
B. | It is the sum of probability of its occurrence and its impact |
C. | It is the standard deviation of the sum of it’s probability and it’s impact |
D. | None of the above |
Answer» B. It is the sum of probability of its occurrence and its impact | |
52. |
The major disadvantage of top-down approach is need for _________. |
A. | Critical module. |
B. | skeleton |
C. | Stub. |
D. | Project |
Answer» D. Project | |
53. |
The size of the graph matrix is |
A. | Number of edges in the flow Graph |
B. | Number of nodes in the flow Graph |
C. | Number of paths in the flow Graph |
D. | Number of independent paths in the flow Graph |
Answer» C. Number of paths in the flow Graph | |
54. |
Which of the following is a Key Characteristics of Walk Through? |
A. | Scenario, Dry Run, Peer Group |
B. | Pre Meeting Preparations |
C. | Formal Follow Up Process |
D. | Includes Metrics |
Answer» B. Pre Meeting Preparations | |
55. |
A regression test: |
A. | Will always be automated |
B. | Will help to ensure that unchanged areas have not been affected |
C. | Will help to ensure that changed areas have not been affected |
D. | Will run during acceptance testing |
Answer» C. Will help to ensure that changed areas have not been affected | |
56. |
Use case scenario is: |
A. | An input of a use case |
B. | An instance of a use case |
C. | An output of a use case |
D. | An information of a use case |
Answer» C. An output of a use case | |
57. |
Earlier a defect is found the cheaper it is to fix it.Is the above statement correct? |
A. | yes |
B. | no |
Answer» B. no | |
58. |
Risk should include: |
A. | Probability of occurrence of a problem |
B. | Impact of that problem |
C. | Test cases |
D. | (a) and (b) both |
Answer» E. | |
59. |
Management and Measurement, It will come under |
A. | cmm level 1 |
B. | cmm level 3 |
C. | cmm level 4 |
D. | cmm level 2 |
Answer» D. cmm level 2 | |
60. |
Which of the following is not a functional testing technique? |
A. | Boundary-Value Analysis |
B. | Decision Table |
C. | Regression Testing |
D. | None of the above |
Answer» D. None of the above | |
61. |
A failure is: |
A. | Found in the software; the result of an error. |
B. | Departure from specified behavior. |
C. | An incorrect step, process or data definition in a computer program. |
D. | A human action that produces an incorrect result. |
Answer» C. An incorrect step, process or data definition in a computer program. | |
62. |
A selection variable in a form: |
A. | Has one option |
B. | Has many options |
C. | Has no option |
D. | None of the above |
Answer» C. Has no option | |
63. |
Which of the following validation activities belong to low-level testing? |
A. | Unit testing |
B. | Integration testing |
C. | Performance testing |
D. | Both (a) and (b) |
Answer» B. Integration testing | |
64. |
For a function of ‘n’ variables, the robustness testing will yield how many cases |
A. | 6n+1 |
B. | 6n+2 |
C. | 6n+4 |
D. | None of above |
Answer» B. 6n+2 | |
65. |
Integration, It will come under |
A. | cmm level 1 |
B. | cmm level 3 |
C. | cmm level 2 |
D. | none |
Answer» C. cmm level 2 | |
66. |
A configuration management system would NOT normally provide: |
A. | linkage of customer requirements to version numbers. |
B. | the precise differences in versions of software component source code. |
C. | facilities to compare test results with expected results. |
D. | restricted access to the source code library |
Answer» D. restricted access to the source code library | |
67. |
In case of Large Systems |
A. | only few tests should be run |
B. | test cases written by good test engineers should be executed |
C. | only good test cases should be executed |
D. | testing should be on the basis of risk |
Answer» E. | |
68. |
Which of the following is NOT a standard related to testing? |
A. | ieee610 |
B. | ieee829 |
C. | bs7925-1 |
D. | bs7925-2 |
Answer» B. ieee829 | |
69. |
The best reason for using Independent software test teams is that |
A. | Software developers do not need to do any testing |
B. | A test team will test the software more thoroughly |
C. | Testers do not get involved with the project until testing begins |
D. | Arguments between developers and testers are reduced |
Answer» C. Testers do not get involved with the project until testing begins | |
70. |
Configuration Management Plan describes the Configuration Managementprocedures and structures to be used. |
A. | true |
B. | false |
Answer» B. false | |
71. |
In diagonal band prioritisation scheme |
A. | Severity equals probability |
B. | Severity is never equal to probability |
C. | Either (a) or (b) |
D. | Both (a) and (b) |
Answer» B. Severity is never equal to probability | |
72. |
Which of the following items would not come under Configuration Management? |
A. | operating systems |
B. | live data |
C. | test documentation |
D. | user requirement documents |
Answer» C. test documentation | |
73. |
The inputs for developing a test plan are taken from |
A. | project plan |
B. | business plan |
C. | support plan |
D. | none of the above |
Answer» B. business plan | |
74. |
A predicate expression associated with an event is known as |
A. | Transition |
B. | Class |
C. | Guard |
D. | None of the above |
Answer» B. Class | |
75. |
Independent Verification & Validation is |
A. | done by the developer |
B. | done by the test engineers |
C. | done by management |
D. | done by an entity outside the project’s sphere of influence |
Answer» E. | |
76. |
Which of the following is NOT true of incidents? |
A. | incidents are raised when expected and actual results differ. |
B. | incidents may be raised against user requirements. |
C. | incidents require investigation and/or correction. |
D. | incident resolution is the responsibility of the author of the software under test. |
Answer» E. | |
77. |
Validation plan describes the approach ,resources and schedule used for systemvalidation |
A. | true |
B. | false |
Answer» B. false | |
78. |
Which of the following testing strategy is applicable at all three levels of testing |
A. | White box testing |
B. | Mutation testing |
C. | Regression testing |
D. | None of the above |
Answer» D. None of the above | |
79. |
In Life cycle approach to testing, test execution occurs _______ |
A. | During testing phase |
B. | During requirement phase |
C. | During coding phase |
D. | None of the above. |
Answer» E. | |
80. |
Types of quality tools are Problem Identification Tools and Problem Analysis Tools. |
A. | true |
B. | false |
Answer» B. false | |
81. |
Which quality deals with the maintaining the quality of the software product? |
A. | Quality assurance |
B. | Quality control |
C. | Quality Efficiency |
D. | None of the above |
Answer» C. Quality Efficiency | |
82. |
Quality plan describes the quality procedures and standards that will be used in aproject. |
A. | false |
B. | true |
Answer» C. | |
83. |
Inspections can find all the following except |
A. | variables not defined in the code |
B. | spelling and grammar faults in the documents |
C. | requirements that have been omitted from the design documents |
D. | how much of the code has been covered |
Answer» E. | |
84. |
A regression test |
A. | will always be automated |
B. | will help ensure unchanged areas of the software have not been affected |
C. | will help ensure changed areas of the software have not been affected |
D. | can only be run during user acceptance testing |
Answer» C. will help ensure changed areas of the software have not been affected | |
85. |
Regression testing process may include: |
A. | Fault Identification |
B. | Code Modification |
C. | Test cases selection |
D. | All of the above |
Answer» E. | |
86. |
A powerful technique to use any time a system presents a small input domain with a largenumber of permutations is known as |
A. | Regression testing |
B. | Object oriented testing |
C. | Orthogonal array testing |
D. | None of the above |
Answer» D. None of the above | |
87. |
Testing and subsequent debugging can account for __________ software developmenteffort. |
A. | 5-10% |
B. | 10-20% |
C. | 30-40% |
D. | 80-90% |
Answer» D. 80-90% | |
88. |
Which of the following is not a static testing technique |
A. | error guessing |
B. | walkthrough |
C. | data flow analysis |
D. | inspections |
Answer» B. walkthrough | |
89. |
Functional system testing is: |
A. | Testing that the system functions with other systems |
B. | Testing that the components that comprise the system function together |
C. | Testing the end to end functionality of the system as a whole |
D. | Testing the system performs functions within specified response times |
Answer» D. Testing the system performs functions within specified response times | |
90. |
Which of the following is a static test? |
A. | coverage analysis |
B. | code inspection |
C. | usability assessment |
D. | installation test |
Answer» C. usability assessment | |
91. |
How much testing is enough |
A. | this question is impossible to answer |
B. | the answer depends on the risks for your industry, contract and special requirements |
C. | the answer depends on the maturity of your developers |
D. | the answer should be standardized for the software development industry |
Answer» C. the answer depends on the maturity of your developers | |
92. |
which of the following is the component test standard? |
A. | ieee 610 |
B. | ieee 829 |
C. | bs7925-1 |
D. | bs7925-2 |
Answer» E. | |
93. |
What type of review requires formal entry and exit criteria, including metrics? |
A. | management review |
B. | inspection |
C. | walkthrough |
D. | post project review |
Answer» C. walkthrough | |
94. |
A useful tool to visualize, clarify, link, identify, and classify possible cause of aproblem. This is also called as “fishbone diagram” what is this? |
A. | pareto analysis |
B. | cause-and-effect diagram |
Answer» C. | |
95. |
Black-box testing attempts to find errors in which of the following categories |
A. | Incorrect or missing functions |
B. | Interface errors |
C. | Performance errors |
D. | All of the above |
Answer» E. | |
96. |
What is the relationship between testing and quality assurance? |
A. | QA is part of a complete testing process |
B. | Testing and QA are two terms for the same thing |
C. | Testing is part of a complete QA process |
D. | When Testing is over it becomes QA |
Answer» D. When Testing is over it becomes QA | |
97. |
Fault Masking is |
A. | creating a test case which does not reveal a fault |
B. | error condition hiding another error condition |
C. | masking a fault by developer |
D. | masking a fault by a tester |
Answer» C. masking a fault by developer | |
98. |
Every node is represented by |
A. | One row and one column in graph matrix |
B. | Two rows and two columns in graph matrix |
C. | One row and two columns in graph matrix |
D. | None of the above. |
Answer» B. Two rows and two columns in graph matrix | |
99. |
The goal of software testing is to |
A. | Debug the system |
B. | Validate that the system behaves as expected |
C. | Let the developer know the defects injected by him |
D. | Execute the program with the intent of finding errors |
Answer» E. | |
100. |
Which is not the way to organize a risk matrix? |
A. | Threshold by quadrant |
B. | Threshold by diagonal quadrant |
C. | Threshold by available test cases |
D. | Threshold based on high impact of the problem |
Answer» D. Threshold based on high impact of the problem | |