Software Testing MCQ

software testing mcq

Software Testing (MCQs) questions with answers are very useful for freshers, interview, campus placement preparation, experienced professionals, teachers etc.

software testing mcq

1) Test Case Coverage can be measured by ____________________ in Software Testing.
a. Global data coverage
b. Statement Coverage
c. All of the listed options
d. User specified data coverage
e. Traceability

Ans : C

2) Functional testing that verifies the application functions in accordance with user-specified requirements is called __________________.
a. User Acceptance testing
b. Regression testing
c. Ease of Use
d. Correctness

Ans : A

3) Test technique to simulate system disaster to verify manual procedures are adequate is called __________.
a. Volume testing
b. Disaster testing
c. Stress
d. Security testing

Ans : B

4) When we talk about analysis performed by executing the program code, we are talking about ______________.
a. Force field analysis
b. Dynamic analysis
c. None of the listed options
d. Formal analysis

Ans : B

5) The following entrance criteria are prerequisites to test plan in Software Testing EXCEPT:
a. People Issues
b. Constraints
c. Test Objectives
d. KT document

Ans : D

6) Which of the following are the important elements of the control environment in Software Testing?
a. Both integrity & ethical values
b. Integrity
c. Integrity only
d. Ethical values

Ans : A

7) A white box testing technique that executes possible combinations of condition outcomes in each decision is _____________.
a. Condition Coverage
b. Decision/condition coverage
c. Decision coverage
d. Statement coverage

Ans : B

8) The testing technique that is used to verify multiple authorization procedures to perform properly is called ________________.
a. Error handling
b. Recovery
c. Security
d. Control

Ans : C

9) The process of verifying the consistency, completeness and correctness of software at each stage of the development lifecycle is ______________.
a. Lifecycle testing
b. Leadership
c. Management
d. All of the listed options

Ans : A

10) Which of the following is an Informal Analysis of the program source code yielding computer software ready for testing?
a. Functional Review
b. Code Inspection
c. Code Verification a
d. Code Walkthrough

Ans : D

11) Which among the following is a primary cause of delays in acknowledging a defect in Software Testing?
a. Inability to reproduce the defect
b. Defect caused by user error or misunderstanding
c. Defect is not valid
d. No one else has reported a defect like that

Ans : A

12) Which one of the following statement is true about defects in Software Testing?
a. All of the listed options
b. A single defect can cause millions of failures
c. A defect has greater impact even if it does not affect customer and the operation of the system
d. Defects cannot be found in the supporting documentation

Ans : B

13) Computer systems are interconnected into cycles of chains such that problems in one can cascade into and affect others. Identify this technological development from the following options, which impacts testing approach?
a. System Chains
b. Integration
c. Cascade effect
d. Domino effect

Ans : A

14) Walter Shewhart is known for his work on _______________.
a. Scatter Plot Diagrams
b. Run chart
c. Control chart
d. Histogram

Ans : C

15) Test objectives do not include which of the following in Software Testing? 
a. Supplemental deliverables, such as application documentation.
b. Enabling the tester and project managers to gauge testing progress and success.
c. Guide to the development of test cases, procedures, and test data.
d. Enhancing of communication both within and outside of the project team by helping to define the scope of the testing effort.

Ans : A

16) An operator verifies that all production jobs are run. This is ________________.
a. Production Planning
b. Disaster recovery
c. Quality Assurance
d. Quality Control

Ans : D

17) Which among the following is the most effective method to solve dispute regarding a defect in Software Testing?
a. Arbitration by software owner and arbitration by software development management
b. All of the listed options
c. Arbitration by software owner and arbitration by test manager
d. Arbitration by software development management

Ans : A

18) _________ is used to verify processing of a single transaction can be reconstructed and examine review trail to verify the appropriate information.
a. Audit trail
b. Review trail
c. Authorization
d. Correctness

Ans : A

19) High priority activity in any defect management program should be __________.
a. to prevent defects
b. All of the listed options
c. to improve the process
d. to identify the best prevention techniques and implement them

Ans : D

20) Which among the following is the correct sequence to test execution?
a. All of the listed options
b. Identify test cases and test cycles, assign test scripts, set up test environments, review test cases
c. Set up test environment, identify test case, review test result, assign test scripts
d. Set up test environments, identify test cases and test cycles, assign test scripts, review test results

Ans : D

21) Which among the following techniques is used to create test data?
a. Test beds
b. Production data
c. All of the listed options
d. Scripting

Ans : B

22) With thorough testing it is possible to remove defects from a program prior to delivery to customer. State True or False.

Ans : FALSE

23) When does Test Design begin in SDLC?
a. Testing Phase
b. Low Level Design Phase
c. High Level Design Phase
d. Requirements Phase

Ans : D

24) The test schedule section does not include which of the following in Software Testing?
a. The types of tests that must be conducted.
b. Initial estimates for each activity.
c. Major test activities.
d. Sequence of tests.
e. Dependence on other project activities

Ans : A

25) Pareto voting is used in conjunction with _____________.
a. Statistical process control
b. Vital Few
c. 80-20
d. Cause and effect (Fishbone)

Ans : D

26) The result expected from entering the action is _____________.
a. Think time
b. Arrival rate
c. Sequence
d. Expected Result

Ans : D

27) The concept of defensive code involves ____________________.
a. adding throw() and catch()
b. None of the listed options
c. adding code to a program so that two parts of program must fail before a major
d. adding a syntax checker in middle of code

Ans : C

28) Which among the following is the most effective method for validating successful integration in Software Testing?
a. Test server components
b. Test client components
c. Test network
d. All of the listed options
e. Integrate client, server, network

Ans : D

29) Which of the following validates that multiple parts of the system interact according to the system design?
a. Unit Testing
b. User Acceptance Testing
c. Integration Testing
d. System Testing

Ans : C

30) A document that describes an input, action or event and an expected response to determine if a feature of an application is working correctly is called as ______________.
a. Flowchart
b. All of the listed options
c. Test case
d. Entrance criteria

Ans : C

31) ALE estimation stands for _____________.
a. Annual Loss estimation
b. Annual loss expectation
c. Actual loss expectation
d. Actual Loss estimation

Ans : B

32) Which technique is used in test case designing in Software Testing?
a. Boundary Value Analysis
b. Cause Effect Diagram
c. Equivalence Class Partitioning
d. All of the listed options

Ans : D

33) Testing defect correction includes ____________.
a. regression testing
b. All of the listed options
c. verification
d. validation

Ans : B

34) Which one of the following is the most appropriate definition of Assessment?
a. Assessment is the thoughtful analysis of testing results, and then taking corrective action on the identified weaknesses
b. Assessment is taking useful actions on the identified strengths
c. Assessment is the process of taking actions on the identified weaknesses
d. Assessment is the summarization of testing results, and then taking preventive action on the identified weaknesses

Ans : A

35) Compatibility testing for products involves all the following EXCEPT:
a. Certified and Supported client environments
b. High and low level sanity testing
c. Functional and non-functional compatibility
d. Client and Server side compatibility

Ans : B

36) Performing risk analysis during test planning include all EXCEPT:
a. Evaluate risks
b. Form the risk analysis team
c. Select testing priorities
d. Identify risks

Ans : A

37) Which among the following techniques is NOT used for negative testing?
a. Error Guessing
b. Equivalence Partitioning
c. State Transition
d. Boundary Value Analysis

Ans : C

38) Which one of the following statement is incorrect?
a. Policies defines the areas in which processes will be developed
b. Policies are required in all the areas
c. Policies set directions
d. Policies are developed by senior managers

Ans : B

39) Verification methods include in Software Testing EXCEPT:
a. Test Execution
b. Static analyzers
c. Review
d. Walkthroughs

Ans : A

40) Risk analysis is a process which includes evaluating the following EXCEPT:
a. Risk
b. threat
c. control
d. Complexity

Ans : D

Did we left something?

Comment down below and share your knowledge with others too , Thanks.

Or Please give your valuable feedback to us...

Feedback

Author: Saad Mansuri

Leave a Reply

Your e-mail address will not be published. Required fields are marked *