Explore topic-wise MCQs in Computer Fundamentals.

This section includes 262 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Fundamentals knowledge and support exam preparation. Choose a topic below to get started.

51.

Risk exposure is given by which formula

A. It is the product of probability of occurrence of risk and its impact
B. It is the sum of probability of its occurrence and its impact
C. It is the standard deviation of the sum of it’s probability and it’s impact
D. None of the above
Answer» B. It is the sum of probability of its occurrence and its impact
52.

The major disadvantage of top-down approach is need for _________.

A. Critical module.
B. skeleton
C. Stub.
D. Project
Answer» D. Project
53.

The size of the graph matrix is

A. Number of edges in the flow Graph
B. Number of nodes in the flow Graph
C. Number of paths in the flow Graph
D. Number of independent paths in the flow Graph
Answer» C. Number of paths in the flow Graph
54.

Which of the following is a Key Characteristics of Walk Through?

A. Scenario, Dry Run, Peer Group
B. Pre Meeting Preparations
C. Formal Follow Up Process
D. Includes Metrics
Answer» B. Pre Meeting Preparations
55.

A regression test:

A. Will always be automated
B. Will help to ensure that unchanged areas have not been affected
C. Will help to ensure that changed areas have not been affected
D. Will run during acceptance testing
Answer» C. Will help to ensure that changed areas have not been affected
56.

Use case scenario is:

A. An input of a use case
B. An instance of a use case
C. An output of a use case
D. An information of a use case
Answer» C. An output of a use case
57.

Earlier a defect is found the cheaper it is to fix it.Is the above statement correct?

A. yes
B. no
Answer» B. no
58.

Risk should include:

A. Probability of occurrence of a problem
B. Impact of that problem
C. Test cases
D. (a) and (b) both
Answer» E.
59.

Management and Measurement, It will come under

A. cmm level 1
B. cmm level 3
C. cmm level 4
D. cmm level 2
Answer» D. cmm level 2
60.

Which of the following is not a functional testing technique?

A. Boundary-Value Analysis
B. Decision Table
C. Regression Testing
D. None of the above
Answer» D. None of the above
61.

A failure is:

A. Found in the software; the result of an error.
B. Departure from specified behavior.
C. An incorrect step, process or data definition in a computer program.
D. A human action that produces an incorrect result.
Answer» C. An incorrect step, process or data definition in a computer program.
62.

A selection variable in a form:

A. Has one option
B. Has many options
C. Has no option
D. None of the above
Answer» C. Has no option
63.

Which of the following validation activities belong to low-level testing?

A. Unit testing
B. Integration testing
C. Performance testing
D. Both (a) and (b)
Answer» B. Integration testing
64.

For a function of ‘n’ variables, the robustness testing will yield how many cases

A. 6n+1
B. 6n+2
C. 6n+4
D. None of above
Answer» B. 6n+2
65.

Integration, It will come under

A. cmm level 1
B. cmm level 3
C. cmm level 2
D. none
Answer» C. cmm level 2
66.

A configuration management system would NOT normally provide:

A. linkage of customer requirements to version numbers.
B. the precise differences in versions of software component source code.
C. facilities to compare test results with expected results.
D. restricted access to the source code library
Answer» D. restricted access to the source code library
67.

In case of Large Systems

A. only few tests should be run
B. test cases written by good test engineers should be executed
C. only good test cases should be executed
D. testing should be on the basis of risk
Answer» E.
68.

Which of the following is NOT a standard related to testing?

A. ieee610
B. ieee829
C. bs7925-1
D. bs7925-2
Answer» B. ieee829
69.

The best reason for using Independent software test teams is that

A. Software developers do not need to do any testing
B. A test team will test the software more thoroughly
C. Testers do not get involved with the project until testing begins
D. Arguments between developers and testers are reduced
Answer» C. Testers do not get involved with the project until testing begins
70.

Configuration Management Plan describes the Configuration Managementprocedures and structures to be used.

A. true
B. false
Answer» B. false
71.

In diagonal band prioritisation scheme

A. Severity equals probability
B. Severity is never equal to probability
C. Either (a) or (b)
D. Both (a) and (b)
Answer» B. Severity is never equal to probability
72.

Which of the following items would not come under Configuration Management?

A. operating systems
B. live data
C. test documentation
D. user requirement documents
Answer» C. test documentation
73.

The inputs for developing a test plan are taken from

A. project plan
B. business plan
C. support plan
D. none of the above
Answer» B. business plan
74.

A predicate expression associated with an event is known as

A. Transition
B. Class
C. Guard
D. None of the above
Answer» B. Class
75.

Independent Verification & Validation is

A. done by the developer
B. done by the test engineers
C. done by management
D. done by an entity outside the project’s sphere of influence
Answer» E.
76.

Which of the following is NOT true of incidents?

A. incidents are raised when expected and actual results differ.
B. incidents may be raised against user requirements.
C. incidents require investigation and/or correction.
D. incident resolution is the responsibility of the author of the software under test.
Answer» E.
77.

Validation plan describes the approach ,resources and schedule used for systemvalidation

A. true
B. false
Answer» B. false
78.

Which of the following testing strategy is applicable at all three levels of testing

A. White box testing
B. Mutation testing
C. Regression testing
D. None of the above
Answer» D. None of the above
79.

In Life cycle approach to testing, test execution occurs _______

A. During testing phase
B. During requirement phase
C. During coding phase
D. None of the above.
Answer» E.
80.

Types of quality tools are Problem Identification Tools and Problem Analysis Tools.

A. true
B. false
Answer» B. false
81.

Which quality deals with the maintaining the quality of the software product?

A. Quality assurance
B. Quality control
C. Quality Efficiency
D. None of the above
Answer» C. Quality Efficiency
82.

Quality plan describes the quality procedures and standards that will be used in aproject.

A. false
B. true
Answer» C.
83.

Inspections can find all the following except

A. variables not defined in the code
B. spelling and grammar faults in the documents
C. requirements that have been omitted from the design documents
D. how much of the code has been covered
Answer» E.
84.

A regression test

A. will always be automated
B. will help ensure unchanged areas of the software have not been affected
C. will help ensure changed areas of the software have not been affected
D. can only be run during user acceptance testing
Answer» C. will help ensure changed areas of the software have not been affected
85.

Regression testing process may include:

A. Fault Identification
B. Code Modification
C. Test cases selection
D. All of the above
Answer» E.
86.

A powerful technique to use any time a system presents a small input domain with a largenumber of permutations is known as

A. Regression testing
B. Object oriented testing
C. Orthogonal array testing
D. None of the above
Answer» D. None of the above
87.

Testing and subsequent debugging can account for __________ software developmenteffort.

A. 5-10%
B. 10-20%
C. 30-40%
D. 80-90%
Answer» D. 80-90%
88.

Which of the following is not a static testing technique

A. error guessing
B. walkthrough
C. data flow analysis
D. inspections
Answer» B. walkthrough
89.

Functional system testing is:

A. Testing that the system functions with other systems
B. Testing that the components that comprise the system function together
C. Testing the end to end functionality of the system as a whole
D. Testing the system performs functions within specified response times
Answer» D. Testing the system performs functions within specified response times
90.

Which of the following is a static test?

A. coverage analysis
B. code inspection
C. usability assessment
D. installation test
Answer» C. usability assessment
91.

How much testing is enough

A. this question is impossible to answer
B. the answer depends on the risks for your industry, contract and special requirements
C. the answer depends on the maturity of your developers
D. the answer should be standardized for the software development industry
Answer» C. the answer depends on the maturity of your developers
92.

which of the following is the component test standard?

A. ieee 610
B. ieee 829
C. bs7925-1
D. bs7925-2
Answer» E.
93.

What type of review requires formal entry and exit criteria, including metrics?

A. management review
B. inspection
C. walkthrough
D. post project review
Answer» C. walkthrough
94.

A useful tool to visualize, clarify, link, identify, and classify possible cause of aproblem. This is also called as “fishbone diagram” what is this?

A. pareto analysis
B. cause-and-effect diagram
Answer» C.
95.

Black-box testing attempts to find errors in which of the following categories

A. Incorrect or missing functions
B. Interface errors
C. Performance errors
D. All of the above
Answer» E.
96.

What is the relationship between testing and quality assurance?

A. QA is part of a complete testing process
B. Testing and QA are two terms for the same thing
C. Testing is part of a complete QA process
D. When Testing is over it becomes QA
Answer» D. When Testing is over it becomes QA
97.

Fault Masking is

A. creating a test case which does not reveal a fault
B. error condition hiding another error condition
C. masking a fault by developer
D. masking a fault by a tester
Answer» C. masking a fault by developer
98.

Every node is represented by

A. One row and one column in graph matrix
B. Two rows and two columns in graph matrix
C. One row and two columns in graph matrix
D. None of the above.
Answer» B. Two rows and two columns in graph matrix
99.

The goal of software testing is to

A. Debug the system
B. Validate that the system behaves as expected
C. Let the developer know the defects injected by him
D. Execute the program with the intent of finding errors
Answer» E.
100.

Which is not the way to organize a risk matrix?

A. Threshold by quadrant
B. Threshold by diagonal quadrant
C. Threshold by available test cases
D. Threshold based on high impact of the problem
Answer» D. Threshold based on high impact of the problem