91. Black box testing is also called
(a) Data flow testing
(b) Loop testing
(c) Behavioral testing
(d) Graph based testing
(b) Loop testing
(c) Behavioral testing
(d) Graph based testing
Answer: (c)
92. The Wireless Application Protocol (WAP) is:
(a) A product of W3C -World Wide Web Consortium
(b) A data link layer of the OSI model
(c) Aims to ensure Interoperability among service providers
(d) Incurs high overheads of protocol stack
(a) A product of W3C -World Wide Web Consortium
(b) A data link layer of the OSI model
(c) Aims to ensure Interoperability among service providers
(d) Incurs high overheads of protocol stack
Answer: (c)
93. The XML DOM object is
(a) Entity
(b) Entity Reference
(c) Comment Reference
(d) Comment Data
(a) Entity
(b) Entity Reference
(c) Comment Reference
(d) Comment Data
Answer: (b)
94. Which one of the following characteristics is satisfied by websites without the attached database?
(a) The ability to generate data via SQL
(b) The inability to use a browser to display WebPages
(c) Static information using HTML or JavaScript
(d) The need to use TCP/IP as the network protocol
(a) The ability to generate data via SQL
(b) The inability to use a browser to display WebPages
(c) Static information using HTML or JavaScript
(d) The need to use TCP/IP as the network protocol
Answer: (c)
95. Each computer connected to the Internet is assigned a unique compound number which is:
(a) An 8-bit number
(b) A 32-bit number but is expressed as four single byte values, each in the range of 0 to 255
(c) A 64-bit number but is expressed as eight single byte values, each in the range of 0 to 65536
(d) A 16-bit number and is expressed as a four single byte values, each one in the range of 0 to 128.
(a) An 8-bit number
(b) A 32-bit number but is expressed as four single byte values, each in the range of 0 to 255
(c) A 64-bit number but is expressed as eight single byte values, each in the range of 0 to 65536
(d) A 16-bit number and is expressed as a four single byte values, each one in the range of 0 to 128.
Answer: (b)
96. Which of the following is the appropriate format for graphics that are to be embedded within an Internet document?
(a) BMP
(b) TIFF
(c) GIF
(d) HTML
(a) BMP
(b) TIFF
(c) GIF
(d) HTML
Answer: (c)
97. Consider the following test processes:
1. Acceptance testing
2. System testing
3. Verification
4. Unit testing
5. Integration testing
1. Acceptance testing
2. System testing
3. Verification
4. Unit testing
5. Integration testing
What is the correct order of conducting, these tests?
(a) 3, 4, 5, 2 and 1
(b) 4, 3, 5, 2 and 1
(c) 3, 2, 5, 4 and 1
(d) 4, 2, 5, 3 and 1
(a) 3, 4, 5, 2 and 1
(b) 4, 3, 5, 2 and 1
(c) 3, 2, 5, 4 and 1
(d) 4, 2, 5, 3 and 1
Answer: (a)
98. Consider the following statements:
1. Condition coverage is Black-Box testing
2. Boundary analysis is Black-Box testing
3. Decision coverage is White-Box testing
4. Data Equivalence partitioning is Black-Box testing
1. Condition coverage is Black-Box testing
2. Boundary analysis is Black-Box testing
3. Decision coverage is White-Box testing
4. Data Equivalence partitioning is Black-Box testing
Which of the above statements are correct?
(a) 2, 3 and 4
(b) 1, 2 and 4
(c) 1, 2 and 3
(d) 1, 3 and 4
(a) 2, 3 and 4
(b) 1, 2 and 4
(c) 1, 2 and 3
(d) 1, 3 and 4
Answer: (a)
99. Consider the following statements regarding maintenance testing:
1. It need not be done for emergency bug fixes
2. It is a testing to show how easy it will be to maintain the system
3. Additional new tests may be required apart from re-test and regression test
4. It needs careful risk and impact analysis as its scope is difficult
1. It need not be done for emergency bug fixes
2. It is a testing to show how easy it will be to maintain the system
3. Additional new tests may be required apart from re-test and regression test
4. It needs careful risk and impact analysis as its scope is difficult
Which of the above statements are correct?
(a) 1 and 2
(b) 3 and 4
(c) 2 and 3
(d) 1 and 4
(a) 1 and 2
(b) 3 and 4
(c) 2 and 3
(d) 1 and 4
Answer: (b)
100. Consider the following test methods:
1. Code walkthrough
2. Integration testing
3. Design reviews
4. Requirement reviews
5. User acceptance testing
1. Code walkthrough
2. Integration testing
3. Design reviews
4. Requirement reviews
5. User acceptance testing
Which of the above tests are Verification (Vr) and Validation (Vd)?
(a) 1(Vd), 2(Vd)), 3(Vd), 4(Vr), and 5(Vr)
(b) 1(Vr), 2(Vd)), 3(Vd), 4(Vr), and 5(Vr)
(c) 1(Vd), 2(Vd)), 3(Vr), 4(Vd), and 5(Vd)
(d) 1(Vr), 2(Vd), 3(Vr), 4(Vr), and 5(Vd)
(a) 1(Vd), 2(Vd)), 3(Vd), 4(Vr), and 5(Vr)
(b) 1(Vr), 2(Vd)), 3(Vd), 4(Vr), and 5(Vr)
(c) 1(Vd), 2(Vd)), 3(Vr), 4(Vd), and 5(Vd)
(d) 1(Vr), 2(Vd), 3(Vr), 4(Vr), and 5(Vd)
Answer: (d)
0 Comments
Post a Comment