Notifications

CIS4150 Final study set

0.0(0) Reviews
Duplicate
Report Flashcard set

Spaced Repetition

Scientifically backed study method

spaced repetition

Flashcards

Review terms and definitions

flashcards

Learn

Study with MC, T/F, and other questions

learn

Practice Test

Take a test on your terms and definitions

exam

Tags

Description

These are all the mutiple choice from the textbook

372 Terms
😃 Not studied yet (372)
Bug discovery is a _______ goal of software testing.
Short-term
Customer satisfaction and risk management are _______ goals of software testing
Long-term
Reduced maintenance is a _______ goal of software testing.
Post-implementation
Software testing produces ______.
Reliability, Quality, Customer Satisfaction
Testing is the process of ______ errors
Finding
Complete testing is ______
Impossible
The domain of possible inputs to the software is too ______ to test.
Large
The set of invalid inputs is too ______ to test.
Large
Race conditions are among the ______ tested.
Least
Every design error ______ be found.
Cannot
Fault is synonymous with the word __________.
Defect
The inability of a system or component to perform a required function according to its specifi cation is called as __________.
Failure
Testware includes __________.
test planning document, test data, test specifications
Symptom(s) associated with a failure that alerts the user to the occurrence of a failure is called __________.
Incident
Testing process starts as soon as the __________ for the system are prepared
Specifications
Testing strategy should start at the __________ module level and expand towards the whole program.
Smallest
Testing is a ______ process
Planned
Planning the whole testing process into a well-planned series of steps is called _________.
Test strategy
The test strategy matrix is prepared using the __________.
test factor and test phase
The process of evaluating a system or component to determine whether the products of a given development phase satisfy the conditions imposed at the start of that phase is called __________.
Verification
The process of evaluating a system or component during or at the end of the development process to determine whether it satisfies the specified requirements is called __________.
Validation
In the early stages of SDLC, testing comprises more __________ activities and towards the later stages, the emphasis is on the __________ activities.
verification, validation
Technique for assessing the structural characteristics of source code, design specifications, or any notational representation that conforms to well-defined syntactic rules is called __________.
Black-Box Testing
Every design feature and its corresponding code is checked logically with every possible path execution in __________.
White-box testing
Which of the following is true?
Testing starts as soon as the SRS is prepared
V&V diagram includes
Both verification and validation
Which test plan is made corresponding to requirement gathering?
Acceptance test plan
Which test plan is made corresponding to requirement specifications?
System test plan
Which test plan is made corresponding to HLD?
Function & Integration test plan
Which test plan is made corresponding to LLD?
Unit test plan
In the V model of testing, the scope of verification from top to bottom
Decreases
For the verification of requirements, you must check for
Correctness, Ambiguity, Completeness
For the verification of high-level design, you must check
Data design, Architectural design, User interface design
For verifying architectural design, which is true?
- Check that every functional requirement in the SRS has been take care of in this design. - Check whether all exceptions handling conditions have been taken care of. - Check the inter-dependence and interface between the modules.
For verifying data design, you must check
- Sizes of data structure - Overflow in a data structure
What is the relation between static and dynamic testing technique?
Independent
What is the proper sequence of various testing?
Unit testing, integration testing, function testing, system testing, acceptance testing
Black-box testing is a _______.
Dynamic testing
It has been observed that test cases, which are designed with boundary input values, have a _______ chance of finding errors.
High
How many test cases are there in BVC if there are 5 variables in a module?
21
How many test cases are there in robustness testing if there are 5 variables in a module?
31
How many test cases are there in worst-case testing if there are 4 variables in a module?
625
Each row of state table corresponds to _______.
State
Each column of state table corresponds to _______.
Input
Intersection of a row and a column specifies _______.
Transition and output
What are the components of a decision table?
Condition stub, Condition entry, Action stub
If there are k rules over n binary conditions, there are at least _______ test cases and at the most _______ test cases.
k, 2^n
Boundary value analysis and equivalence class partitioning methods do not consider _______.
Combinations of input conditions
White-box testing is _______ to black-box testing.
complementary
The effectiveness of path testing rapidly _______ as the size of software under test.
increases
A node with more than one arrow leaving it is called a _______
decision node
A node with more than one arrow entering it is called a _______
junction node
Areas bounded by edges and nodes are called _______
region
The length of a path is measured by the number of _______
links
An independent path is any path through the graph that introduces at least _______ new set of processing statements or new conditions.
1
The number of independent paths is given by _______.
V(G) = e - n + 2
According to Mill's Theorem, _______
V(G) = d + P
In data flow anomalies, dd is a _______
harmless bug
In data fl ow anomalies, du is a _______
normal case
In data fl ow anomalies, ku is a _______
serious bug
In single-character data anomalies, ~d is _______
normal situation
In single-character data anomalies, ~k is _______
potential bug
_______ is the strongest criterion for selecting test cases.
ADPU
In static testing, a bug is found at its _______ location.
Exact
Static testing can be applied for most of the _______ .
Verification activities
Formal peer evaluation of a software element whose objective is to verify that the software element satisfies its specifications and conforms to standards, is called _______ .
Inspections
The programmer or designer responsible for producing the program or document is known as _______ .
Author, Owner, Producer
The person who finds errors, omissions, and inconsistencies in programs and documents during an inspection is known as _______
Inspector
The inspection team points out any potential errors or problems found and records them in _______.
Log Form
'How much evaluation of an item has been done by the team' is called _______ .
None of the above
_______ is a more formal process.
Inspection
The efficiency of code coverage performed by dynamic testing _______ with the increase in size of the system
Decreases
Through the inspection process, the modules can be analysed based on _______.
Error-types and Error-density
The inspection in which the inspectors never have to simultaneously meet is known as _______.
FTArm
Checking phase has been introduced in _______.
Gilb Inspection
Analysis phase between preparation and meeting has been introduced in _______.
Humphrey's Inspection
Collation Phase has been introduced in _______.
N-fold Inspection
_______ process gives the chance to utilize human resources
Phased Inspection
A series of steps or procedures whose purpose is to guide an inspector in acquiring a deep understanding of the inspected software is known as _______.
Reading Techniques
_______ is a reading technique.
Usage-based method and Task-based method
A review is similar to an inspection or walkthrough, except that the review team also includes _______.
Management
_______ is not an inspection variant.
None of the above
Software validation is achieved through a series of _______ tests that demonstrate conformity with requirements.
black-box
Before we validate the entire software, _______ must be validated first.
modules
Unit tests ensure that the software meets at least a _______ of functionality prior to integration and system testing.
baseline level
Two types of interface modules which must be simulated, if required, to test the module are _______.
stubs and drivers
Overhead of stubs and drivers may increase the _______ of the entire software system
time and cost
Integration of modules is according to the _______ of software.
design
Recovery is the ability of a system to _______ operations after the integrity of the application has been lost.
restart
A system that meticulously records transactions and system states periodically so that these are preserved in case of a failure is called a _______.
checkpoint
Security requirements should be associated with each _______ requirement.
functional
Measures intended to allow the receiver to determine that the information which it receives has not been altered in transit is known as _____
integrity
The process of determining that a requester is allowed to receive a service or perform an operation is called _______.
authorization
A measure intended to prevent the later denial that an action happened, or a communication took place is called _______.
non-repudiation
The type of system testing related to a system's presentation rather than its functionality is called _______.
usability testing
A system test should not be performed by _______.
programmers and designers
Acceptance testing must occur at the _______ of the development process.
end
Top-down integration testing requires _______ stubs.
nodes - 1
Bottom-up integration testing requires _______ drivers.
nodes - leaves
Total number of sessions in decomposition-based integration testing is _______.
nodes - leaves + edges
The total number of sessions in a pair-wise call graph-based integration testing is _______.
total edges in the graph
Total number of sessions in neighbourhood call graph-based integration testing is _______.
nodes - sink nodes
The nodes where the control is being transferred after calling the module, are called _______.
source nodes
The nodes from which the control is transferred are called _______.
sink nodes
When the control from one unit is transferred to another unit, then the programming language mechanism used to do this is known as
message
A call graph is a _______.
directed graph
1. A changed version that has not passed a regression test is called __________.
delta version
Regression testability is a function of __________.
design of the program and the test suite
Regression number is computed using information about the __________.
test suite coverage of the program
Changes made to correct a system after a failure has been observed is called __________
corrective maintenance
Changes made to achieve continuing compatibility with the target environment or other systems is called __________.
adaptive maintenance
Changes designed to improve or add capabilities is called __________.
perfective maintenance
Changes made to increase robustness, maintainability, portability, and other features is called __________
preventive maintenance
Which statement best characterizes the regression test selection?
Minimize the resources required to regression test a new version and Typically achieved by minimizing the number of test cases applied to the new version
Problem to select a subset T' of T with which P' will be tested is called __________.
regression test selection problem
The problem to identify portions of P' or its specification that requires additional testing is called __________.
coverage identification problem
The problem to execute test suites efficiently and checking test results for correctness is called __________.
test suite execution problem
The problem to update and store test information is called __________.
test suite maintenance problem
A test case t is modification-revealing for P and P' if __________.
it causes the outputs of P and P' to differ
A test case t is modification-traversing if __________.
it executes new or modifi ed code in P'
A test case t is fault-revealing if __________.
it detect a fault in P' if it causes P' to fail
Regression testing is helpful in __________
- detecting bugs - detecting undesirable side effects by changing the operating environment - integration testing
The key elements of test management are __________.
- test organization - test planning - test monitoring and assessment
__________ is at the top-level in the test group hierarchy
test manager
Verification plan includes __________.
function design plan
Validation plan includes __________.
- unit test plan - integration test plan
Master schedule in V&V planning __________
summarizes the V&V tasks and their relationship with the overall project
Test log is __________.
a record of the testing events that take place during test
Test incident report is __________.
a form of bug report
Test summary report is __________.
an evaluation report prepared when the testing is over
Test incident report is __________.
test result specification document
__________ integration testing is preferred while planning integration test.
sandwich
Test engineer is responsible for __________.
designing the test cases
Junior test engineer __________.
participates in test design and execution with experienced test engineers
Test leader is __________.
assigns testing tasks to test engineers who are working under him
Test manager __________.
- interacts with customer regarding quality issues - acquires all the testing resources including tools
Metrics give us information regarding the status of _______ in a software
attributes
________ activity does not require software measurement.
Development
Primitive metrics are those metrics that can be _______observed.
directly
Data functions are those functions in the project which relate to _______ data stored.
logical
VAF = (TDI × 0.01 ) + _______
0.065
VAF adjusts the UFP by _______ to determine the adjusted function point.
35%
AFP = UFP __ VAF
+
The function point metric is used effectively for measuring the _______ of a software system
size