0% found this document useful (0 votes)
234 views364 pages

SEPM All Que

The document is a sample exam for a Software Engineering and Project Management course. It contains 60 multiple choice questions related to software engineering topics like the software development life cycle, testing, UML, real-time systems, and user interface design. Exam instructions are provided, noting the exam duration, number of questions, marking scheme, and guidelines.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
234 views364 pages

SEPM All Que

The document is a sample exam for a Software Engineering and Project Management course. It contains 60 multiple choice questions related to software engineering topics like the software development life cycle, testing, UML, real-time systems, and user interface design. Exam instructions are provided, noting the exam duration, number of questions, marking scheme, and guidelines.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 364

12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?

testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Seat No -
Total number of questions : 60

11677 SOFTWARE ENGINNERING AND PROJECT MANAGEMENT


Time : 1hr
Max Marks : 50
N.B

1) All questions are Multiple Choice Questions having single correct option.

2) Attempt any 50 questions out of 60.

3) Use of calculator is allowed.

4) Each question carries 1 Mark.

5) Specially abled students are allowed 20 minutes extra for examination.

6) Do not use pencils to darken answer.

7) Use only black/blue ball point pen to darken the appropriate circle.

8) No change will be allowed once the answer is marked on OMR Sheet.

9) Rough work shall not be done on OMR sheet or on question paper.

10) Darken ONLY ONE CIRCLE for each answer.

Q.no 1. Which of the following is not a Software Development Life Cycle Phase?

A : Requirements Gathering

B : Test Closure

C : Coding

D : Testing

Q.no 2. The UML was designed for describing _________

A : object-oriented systems

B : architectural design

C : SRS

D : Both object-oriented systems and Architectural design

Q.no 3. Which of the following is not a part of a test design document?

A : Test Plan
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 1/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

B : Test Design Specification

C : Test Case Specification

D : Test Log

Q.no 4. What is TestNG ?

A : TestNextGeneration

B : TestNewGenerlization

C : TestNewGeneration

D : TestNextGenerations

Q.no 5. RMMM stands for

A : risk mitigation methodology and management

B : risk mitigation manupulation and management

C : risk mitigation monitoring and management

D : risk mitigation measurement and management

Q.no 6. Test cases are created in which phase?

A : Test Specification

B : Test Planning

C : Test Requirement

D : Test Configuration

Q.no 7. Which of the following is not part of the software reengineering process model?

A : reverse engineering

B : forward engineering

C : inventory analysis

D : prototyping

Q.no 8. Select the method which selects the option at the at the given index

A : selectByIndex()

B : selectIndex()
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 2/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : selectedByIndex()

D : selectByIndexes()

Q.no 9. Which one of the following phases accounts for the maximum effort during development
of a typical software?

A : Coding

B : Testing

C : Designing

D : Specification

Q.no 10. Before handing over the software to the client, which testing is to be done in-house?

A : Alpha

B : Betta

C : Gamma

D : Theta

Q.no 11. Choose the incorrect statement with respect to Non-Functional Requirement(NFR)

A : Product-oriented Approach – Focus on system (or software) quality

B : Process-oriented Approach – Focus on how NFRs can be used in the design process

C : Quantitative Approach – Find measurable scales for the functionality attributes

D : Qualitative Approach – Study various relationships between quality goals

Q.no 12. Select the tab that shows which command Selenium IDE is currently executing

A : Variable

B : Data

C : Information

D : Info

Q.no 13. Project risk factor is considered in which model?

A : Spiral model.

B : Waterfall model.

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 3/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : Prototyping model

D : Incremental Model.

Q.no 14. What incorporates data, architectural, interface, and procedural representations of the
software?

A : design model

B : user’s model

C : mental image

D : system image

Q.no 15. In case of Selenium IDE, the source view shows your script in

A : DHTML format

B : XML format

C : j2EE format

D : HTML format

Q.no 16. Software Design consists of _____________

A : Software Product Design

B : Software Engineering Design

C : Software Product & Engineering Design

D : Only Software testing

Q.no 17. Which of the following is the best type of module coupling?

A : Control Coupling

B : Stamp Coupling

C : Data Coupling

D : Content Coupling

Q.no 18. Which of the following is not a user interface design process?

A : User, task, and environment analysis and modeling

B : Interface design

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 4/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : Knowledgeable, frequent users

D : Interface validation

Q.no 19. First graphical user interface used commercially was introduced in

A : 1975

B : 1966

C : 1977

D : 1967

Q.no 20. Consider the following partial description of the IIT security software. “A camera at the
main gate should detect an incoming vehicle, and the gate should be opened for registered
vehicles.” Which one of the following types of requirements is this?

A : Functional requirement

B : Non-Functional requirement

C : Design requirement

D : Design constraint

Q.no 21. The Actions Commands

A : are commands that directly interact with page elements

B : are commands that allow you to store values to a variable

C : are commands that verify if a certain condition is met

D:0

Q.no 22. When users are involved in complex tasks, the demand on __________ can be significant

A : short-term memory

B : shortcuts

C : objects that appear on the screen

D : all of the mentioned

Q.no 23. In software development life cycle , who is the best person to catch a defect?

A : Software Tester

B : Customers

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 5/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : Designer

D : Business Analyst

Q.no 24. Java packages and Fortran subroutine are examples of__________

A : Functions

B : Modules

C : Classes

D : Sub procedures

Q.no 25. Select the browser which is supported by Selenium IDE

A : Google Chrome

B : Opera Mini

C : Mozilla Firefox

D : Internet Explorer

Q.no 26. Which of the following is not the integration strategy?

A : Big-bang

B : Bottom-up

C : Design based

D : Top-down

Q.no 27. Static analysis can be best described as:

A : The reviewing of test plans

B : The analysis of batch programs

C : The use of black box testing

D : The analysis of program code

Q.no 28. Which of the following is not real-time architectural patterns that are commonly used?

A : Asynchronous communication

B : Observe and React

C : Environmental Control
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 6/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

D : Process Pipeline

Q.no 29. E-Commerce software testing follows different approach than gaming software testing.
Which testing principle implies this?

A : Pareto principle

B : Testing is Context dependent

C : Testing shows presence of defects

D : Absence of errors-fallacy

Q.no 30. Which of the following uses Impact Analysis most?

A : Non-functional system testing

B : Component testing

C : User acceptance testing

D : Maintenance testing

Q.no 31. Three statements are given below regarding the User Interface Design: 1) Place the user
in Control. 2) Reduce user's memory load. 3) Make the interface consistent. These rules are
called as __________.

A : Governed Rule

B : Golden Rule

C : User Rule

D : Thumb Rule

Q.no 32. Software testing are most effective if applied immediately after

A : Requirement Specification

B : Design

C : Coding

D : Integration

Q.no 33. Systems that involve interaction with a shared database can be considered as.

A : software-based

B : transaction-based

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 7/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : server-based

D : client-based

Q.no 34. Which of the following is not a software testing generic characteristics?

A : Different testing techniques are appropriate at different points in time

B : Testing is conducted by the developer of the software or an independent test group

C : Testing and debugging are different activities, but debugging must be accommodated in any testing
strategy

D : None of the mentioned

Q.no 35. What is “V” Model?

A : Test Design Technique

B : Test Type

C : SDLC Model

D : Test Level

Q.no 36. Which is not a SQA activity?

A : Black box testing

B : White box testing

C : Integration testing

D : Unit testing

Q.no 37. Architectural styles is composed of which of the following?

A : A set of component types that perform some function at run-time

B : A topological layout of these components indicating their run-time inter relationships

C : Coupling among the client will lessen the effect of data center architecture

D : A set of semantic constraints

Q.no 38. Which of the following is not a module type

A : Object modules

B : Hardware modules

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 8/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : Functional modules

D : Process support modules

Q.no 39. ________is not a Software Test Life Cycle Phase?

A : Requirements Gathering

B : Test Planning

C : Test Closure

D : Test Design

Q.no 40. Which of the following is not a state of a defect in defect life cycle:

A : Verified

B : New

C : Critical

D : Deferred

Q.no 41. Which architectural style goal is to achieve Modifiability with Scalability?

A : Data Flow Architecture

B : Call and Return Architecture

C : Data Centered Architectures

D : Virtual Machine Architecture

Q.no 42. Which architectural style goal is to achieve Portability?

A : Data Flow Architecture

B : Call and Return Architecture

C : Data Centered Architectures

D : Virtual Machine Architecture

Q.no 43. What can static analysis NOT find?

A : Memory leaks

B : Unreachable (“dead”) code

C : The use of a variable before it has been defined


https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 9/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

D : Array bound violations

Q.no 44. What are the criteria to decide the testing efforts?1. Time and budget
2. Size of development team
3. Size of testers
4. Risk associated with project

A : a. 1, 3, 4

B : b. 1, 2, 3

C : c. 1, 4

D : d. 1, 3

Q.no 45. Test wares are handed over to maintenance team during which phase?

A : Test implementation and execution

B : Test closure activity

C : Evaluating exit criteria and reporting

D : Test analysis and design

Q.no 46. Which of the following risk is the failure of a purchased component to perform as
expected

A : Product risk

B : Business risk

C : Programming risk

D : Project risk

Q.no 47. The technique applied for usability testing is:

A : White box

B : Grey box

C : Black box

D : Combination of all

Q.no 48. Software tester focuses more on complex part of the software. Which of the following
testing principle implies this?

A : Testing shows presence of defects

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 10/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

B : Pesticide paradox

C : Testing is context dependent

D : Defect Clustering

Q.no 49. The modification of the software to match changes in the ever changing environment,
falls under which category of software maintenance?

A : Adaptive

B : Corrective

C : perfective

D : preventive

Q.no 50. Regression testing is a major part of which of the life cycle?

A : Waterfall model

B : V model

C : Iterative model

D : Agile model

Q.no 51. When a cost to remove defect is not high?

A : During requirement analysis

B : During designing

C : During coding

D : During testing

Q.no 52. What determines how information is stored in the repository, how data can be accessed
by tools and viewed by software engineers, how well data security and integrity can be
maintained, and how easily the existing model can be extended to accommodate new needs.

A : Data model

B : Meta model

C : Configuration model

D : Test model

Q.no 53. Risk mitigation is a risk ___________activity. Risk monitoring is a ___________ activity

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 11/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : Avoidance, Project tracking.

B : Increasing, Project tracking.

C : Project tracking, Avoidance.

D : Random, Tracking.

Q.no 54. Which is not a type of incremental testing approach?

A : Bottom up

B : Top down

C : Big-bang

D : Functional incrimination

Q.no 55. The __________ enables the software engineer to develop models of the information
domain and functional domain at the same time

A : Data flow diagram

B : State transition diagram

C : Control specification

D : Activity diagram

Q.no 56. The order in which test levels are performed is:

A : Unit, Integration, Acceptance, System

B : Unit, System, Integration, Acceptance

C : Unit, Integration, System, Acceptance

D : It depends on the nature of a project

Q.no 57. The main focus of ______ is to reduce defects and variations in the processes.

A : QA

B : QC

C : Six Sigma

D : tracking

Q.no 58. A product is re-engineered when

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 12/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : system crashes frequently

B : tools to support restructuring are disabled

C : hardware or software support becomes obsolete

D : subsystems of a larger system require few maintenance

Q.no 59. Which of the following is the component test standard?

A : BS7925-2

B : IEEE 829

C : BS7925-1

D : IEEE 610

Q.no 60. Which of the following is likely to benefit most from the use of test tools providing test
capture and replay facilities?

A : Integration testing

B : Regression testing

C : System testing

D : User acceptance testing

Q.no 1. Verification is the responsibility of

A : Developer

B : Designer

C : Tester

D : QA Team

Q.no 2. Which one of the following statements most accurately identifies the stakeholders in a
software development project?

A : A shareholder of the organization developing the software

B : Anyone who is interested in the software

C : Anyone who is a source of requirements for the software

D : Anyone who might be affected by the software

Q.no 3. What is the main technique for achieving portable software?

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 13/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : The main technique for achieving portable software is to isolate system dependency

B : The main technique for achieving portable software is to increase the overall performance

C : The main technique for achieving portable software is to have independent platform dependency

D : The main technique for achieving portable software is to have independent platform dependency
and to increase accuracy

Q.no 4. The operation phase of the waterfall model is a synonym for which one of the following
phases?

A : Coding and unit testing phase

B : Integration and system testing phase

C : Maintenance phase

D : Design phase

Q.no 5. Which is not the other name for structural testing?

A : Behavioral testing

B : Glass box testing

C : White box testing

D : None of the above

Q.no 6. The Selenium IDE is used

A : To create customized test results

B : To deploy your tests across multiple environments using Selenium Grid

C : To test with HTML Unit

D : To test a web application against Firefox only

Q.no 7. Select the command which is used to pause execution until the page is loaded completely

A : waitForPageToLoad

B : waitForElementPresent

C : waitForPage

D : waitForLoad

Q.no 8. What is architectural style?

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 14/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : Architectural style is a description of component types

B : It is a pattern of run-time control

C : Architectural style is a description of component types and a pattern of run-time control with a set
of constraints on architecture

D : It is a set of constraints on architecture

Q.no 9. The implementation phase of the waterfall model is a synonym for which one of the
following phases?

A : Coding and unit testing phase

B : Integration and system testing phase

C : Maintenance phase

D : Design phase

Q.no 10. Which of these does not represent object oriented design?

A : Programs are thought of collection of objects

B : It follows regular procedural decomposition in favor of class and object decomposition

C : Central model represents class diagrams that show the classes comprising a program and their
relationships to one another

D : Object-oriented methods incorporates Structural methods

Q.no 11. Exhaustive testing is

A : always possible

B : practically possible

C : impractical but possible

D : impractical and impossible

Q.no 12. Select the command that will not wait for the new page to load before moving on to the
next command

A : clickAndWait

B : typeAndWait

C : selectAndWait

D : selectAndType

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 15/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 13. which of the following is not a type of maintainence

A : Corrective maintainence

B : adaptive maintainence

C : perfective maintainence

D : predetermined maintainence

Q.no 14. Which of the following model put much more emphasis on testing?

A : waterfall model

B : agile model

C : spiral model

D : v-v model

Q.no 15. which of the following is not a component of risk

A : Quality risk

B : Performance risk

C : Cost risk

D : Support risk

Q.no 16. Which one of the following most accurately reflects agile software development?

A : Incremental development

B : Iterative development

C : Linear development

D : Both incremental and iterative development

Q.no 17. Which lines depict that architecture defines constraints on an implementation?

A : An implementation exhibits an architecture if it conforms to the structural decisions described by


the architecture

B : The implementation need not be divided into prescribed components

C : An implementation exhibits an architecture if it conforms to the structural decisions described by


the architecture and the implementation must be divided into prescribed components

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 16/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

D : An implementation exhibits an architecture if it conforms to the structural decisions described by


the architecture whereas implementation need not be divided into prescribed components

Q.no 18. Select the command in SeleniumIDE used to open a web page using theURL

A : OpenRecord

B : Open

C : OpenText

D : OpenTable

Q.no 19. Unit testing is carried out during which phase of the waterfall model?

A : Implementation phase

B : Testing phase

C : Maintenance phase

D : Design phase

Q.no 20. Select the name which is not the type of locators

A : ID

B : Name

C : Password

D : Link Text

Q.no 21. Select the method which performs a context-click at the curent mouse location

A : click_Context()

B : context.Click()

C : contextClick()

D : context_Click()

Q.no 22. Which testing is performed with Planning and Documentation?

A : Ad-hoc testing

B : Monkey testing

C : Fuzz testing

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 17/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

D : End-to-End testing

Q.no 23. Consider the following requirement for a word processor software: " The software
should provide facility to import an existing image available as a jpeg file into the document
being created.". Which one of the following types of requirements is this?

A : Functional requirement

B : Non-functional requirement

C : Constraint on the implementation

D : Goal of implementation

Q.no 24. Test cases are designed during which of the following stages?

A : Test recording

B : Test configuration

C : Test planning

D : Test specification

Q.no 25. Select the language which is not supported by the Selenium RC

A : ASP

B : Java

C : C#

D : PHP

Q.no 26. Which of the following pattern is the basis of interaction management in many web-
based systems?

A : model-view-controller

B : repository pattern

C : architecture

D : different operating system

Q.no 27. ETL stands for

A : Data Extraction Transformation & Loading

B : Data Execution Transformation & Loading

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 18/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : Extraction Transformation & Loading

D : Execution Transformation & Loading

Q.no 28. What effect does achievement of quality attribute will have?

A : The achievement of quality attribute will always have a positive effect

B : The achievement of quality attribute will always have a negative effect

C : The achievement of quality attribute will have no effect

D : The achievement of quality attribute will have a positive as well as negative effect

Q.no 29. Which granularity level of testing checks the behavior of module cooperation?

A : Unit Testing

B : Integration Testing

C : Acceptance Testing

D : Regression Testing

Q.no 30. Beta Testing is done at:

A : Developer’s end

B : User’s end

C : User’s & Developer’s end

D : None of the mentioned

Q.no 31. Which of the following items would not come under Configuration Management?

A : Operating systems

B : Live data

C : Test documentation

D : User requirement documents

Q.no 32. ______provide the mechanisms for assembling SCIs into a version-specific
configuration.

A : Repository

B : versioning

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 19/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : modeling

D : assembling

Q.no 33. which of the following is not a software risk

A : product risk

B : project risk

C : business risk

D : management rsik

Q.no 34. Which of the following is NOT a reasonable test objective:

A : To find faults in the software

B : To give confidence in the software

C : To prove that the software has no faults

D : To find performance problems

Q.no 35. What combines procedures and tools to manage different versions of configuration
objects that are created during the software process?

A : Versioning

B : Audit trails

C : Change control

D : SCI

Q.no 36. What is the major improvement in SVN

A : it allows to rollback of commit

B : addition of atomic commits

C : supported everywhere

D : each file is processed independently

Q.no 37. Which of the following is not a Test Type?

A : Database Testing

B : Security Testing

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 20/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : Statement Testing

D : Functional Testing

Q.no 38. What describes how a set of interacting components can share data?

A : model-view-controller

B : repository pattern

C : architecture

D : different operating system

Q.no 39. which of the following is the highest level in the reverse engineering process

A : testing level

B : abstraction level

C : design level

D : maintainence level

Q.no 40. Who leads a formal review process?

A : Author

B : Moderator

C : Reviewer

D : Scribe

Q.no 41. In a simple risk table the risks are categorized into

A : PS, BU , CU

B : TU ,DE ,ST

C : BE ,CU ,ST

D : SU , TE ,CU ,PS

Q.no 42. What allows different projects to use the same source files at the same time?

A : Version Control

B : Access control

C : CM Process
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 21/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

D : Version Control and Access control

Q.no 43. The nature of Software Application can be characterized by their information

A : Determinacy

B : Content

C : Complexity

D : Both OPTION 2 and OPTION 3

Q.no 44. Which of the following truly describes Wrappers?

A : Encapsulation whereby some components is encased within an alternative abstraction

B : Translation between assumptions of an arbitrary component to some provides assumptions of some


other arbitrary components

C : cIncorporation of planning function that in effect results in runtime determination of the translation

D : Repair those cases you have detected by adapting the components

Q.no 45. Which architectural style goal is to achieve Integrability?

A : Data Flow Architecture

B : Call and Return Architecture

C : Data Centered Architectures

D : Virtual Machine Architecture

Q.no 46. Version control is not capable of doing

A : enables any version to be constructed using differences from past versions

B : a make facility that enables you to collect all relevant configuration objects and construct a specific
version of the software.

C : If the central database is corrupted, the entire history remains safe and secured

D : a project database repository that stores all relevant configuration objects

Q.no 47. Which of the following truly describes Bridges?

A : Encapsulation whereby some components is encased within an alternative abstraction

B : Translation between assumptions of an arbitrary component to some provides assumptions of some


other arbitrary components

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 22/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : Incorporation of planning function that in effect results in runtime determination of the translation

D : Repair those cases you have detected by adapting the components

Q.no 48. Which of the following is not a Software Configuration Management Activity?

A : Configuration item identification

B : Risk management

C : Release management

D : Branch management

Q.no 49. Which of the following statement is true?

A : Exhaustive testing is impossible but practicable

B : Exhaustive testing is possible but impracticable

C : Exhaustive testing is impossible and impracticable

D : Exhaustive testing is possible and practicable

Q.no 50. A set of tools coupled within a file management system that enables access to and
management of each software configuration item is known as

A : component element

B : process element

C : construction element

D : human elements

Q.no 51. The ability to identify which requirement generated any given work product is known
as

A : forward tracing

B : backward tracing

C : Dependency tracking

D : Change management

Q.no 52. Which model describes the static structure of the system using object classes and their
relationships?

A : Structural model

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 23/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

B : Dynamic model

C : Subsystem model

D : Sequence model

Q.no 53. which of the following impact of the risk drivers on risk components is also called as
disastrous impact

A : critical impact

B : catastrophic impact

C : marginal impact

D : Destructive impact

Q.no 54. What combines the outward manifestation of the computer-based system , coupled with
all supporting information that describe system syntax and semantics?

A : design model

B : user’s model

C : mental image

D : system image

Q.no 55. when SCM is a formal activity the software configuration audit is conducted by

A : testing specialists

B : development team

C : senior managers

D : quality assurance group

Q.no 56. which control helps to ensure that parallel changes, performed by two different people,
don’t overwrite one another.

A : version control

B : synchronization control

C : access control

D : configuration control

Q.no 57. What mechanism is used to apprise others of changes that are made?

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 24/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : Configuration management

B : Requirementss tracing

C : Reporting

D : Change control

Q.no 58. A chronological record of relevant details about the execution of tests is called as, a
_______

A : Test suite

B : Test procedure

C : Test data

D : Test log

Q.no 59. Which of the following type of maintenance takes the maximum chunk of the total
maintenance effort in a typical life cycle of a software product ?

A : Adaptive maintenance

B : Corrective maintenance

C : Preventive maintenance

D : Perfective maintenance

Q.no 60. A __________ executes the loop task first, then tests a condition and repeats the task
until the condition fails.

A : repeat until

B : condition

C : do while tests

D : if then-else

Q.no 1. When is the requirement specification activity carried out?

A : During requirements gathering activity

B : Before requirements analysis activity

C : Before requirements gathering activity

D : After requirements analysis activity

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 25/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 2. Which one of the following views is implicit in an SRS document?

A : Black box

B : White box

C : Grey box

D : Glass box

Q.no 3. What type of abstraction used in Software design

A : Control, data, environmental

B : Data, environmental, procedural

C : Control, data, procedural

D : Control, Environmental, procedural

Q.no 4. Which one of the following is not a standard software development process model?

A : Waterfall Model

B : Recursive Model

C : RAD Model

D : V Model

Q.no 5. A ________ view shows the system hardware and how software components are
distributed across the processors in the system.

A : physical

B : logical

C : process

D: all of the mentioned

Q.no 6. RE represents what

A : Risk expense

B : Related expense

C : Risk exposure

D : Risk evaluation

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 26/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 7. Which one of the following may be experienced by a software development team when it
adopts a systematic development process model in preference to a build-and-fix style of
development?

A : Increased documentation overhead

B : Increased development cost

C : Decreased maintainability

D : Increased development time

Q.no 8. The selenium can

A : access controls within the desktop

B : both web and desktop applications

C : only test web applications

D:0

Q.no 9. Acceptance testing is also known as

A : Grey box testing

B : White box testing

C : Alpha Testing

D : Beta testing

Q.no 10. In order to control cost, defects should ideally be detected in which phase:

A : Coding

B : Design

C : Implementation

D : Requirements Gathering

Q.no 11. Risk management is responsibility of the

A : Customer

B : Investor

C : Developer

D : Project team

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 27/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 12. The Selenium RC is used

A : To run your test against different browers on different opearting systems

B : To create test with little or no prior knowledge in programming

C : To test a web application against firefox only

D : To run a huge test suite, that can be executed on multiple machines

Q.no 13. Which of the following statements explains portability in non-functional requirements?

A : It is a degree to which software running on one platform can easily be converted to run on another
platform

B : It cannot be enhanced by using languages, OS’ and tools that are universally available and
standardized

C : The ability of the system to behave consistently in a user-acceptable manner when operating within
the environment for which the system was intended

D : None of the mentioned

Q.no 14. Select the operating system which is not supported by Selenium IDE

A : Unix

B : Linux

C : Windows

D : Solaries

Q.no 15. Which of the following is the best type of module coupling?

A : Control Coupling

B : Stamp Coupling

C : Data Coupling

D : Content Coupling

Q.no 16. Select the method which clears all selected entries in Web Driver Selenium

A : dselectAll()

B : deselect_Al()

C : dselect_Al()

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 28/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

D : deselectAll()

Q.no 17. Alpha testing is:

A : Post-release testing by end user representatives at the developer’s site

B : The first testing that is performed

C : Pre-release testing by end user representatives at their sites

D : Pre-release testing by end user representatives at the developer’s site

Q.no 18. Testing done without planning and Documentation is called

A : Unit testing

B : Regression testing

C : Adhoc testing

D : None of the mentioned

Q.no 19. A collection of actions and tasks that define an effective approach to change
management is known as

A : component element

B : process element

C : construction element

D : human elements

Q.no 20. A program with high cyclometic complexity is likely to be:

A : Large

B : Small

C : Difficult to write

D : Difficult to test

Q.no 21. What does “Every software system has an architecture” implies?

A : Architecture an exist independently of its description or specification

B : All the system to be stable should posses an architecture

C : System itself is a component

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 29/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

D : Component itself is a system and hence architecture

Q.no 22. What establishes the profile of end-users of the system?

A : design model

B : user’s model

C : mental image

D : system image

Q.no 23. Which of these are characteristics of a good design?

A : Exhibits strong coupling among between modules

B : Implements all requirements in the analysis model

C : Includes test cases for all components

D : Implements all requirements in the analysis model and provide a complete picture of the software

Q.no 24. System testing is a

A : Black box testing

B : Grey box testing

C : White box testing

D : Glass box

Q.no 25. The Selenium

A : provides professional computer support

B : tests reports are generated automatically

C : comes with a built in object repository

D : Cannot access elements outside of the web application under test

Q.no 26. Requirement Engineering is not concern with ____________.

A : Requirement Design

B : Requirement Elicitation

C : Requirement Analysis

D : Requirement Documentation
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 30/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 27. Maintenance testing is performed using which methodology?

A : Retesting

B : Sanity testing

C : Breadth test and depth test

D : Confirmation testing

Q.no 28. Bug status is set to postpone due to ________.

A : Priority of that bug may low.

B : Lack of time for the release.

C : The bug may not be the major effect in the software.

D : Data may be unavailable.

Q.no 29. The defect cluster change over time. Which of the following testing principle implies
this?

A : Testing shows presence of defects

B : Pesticide paradox

C : Testing is context dependent

D : Defect Clustering

Q.no 30. Architectural styles is composed of which of the following?

A : A set of component types that perform some function at run-time

B : A topological layout of these components indicating their run-time inter relationships

C : Coupling among the client will lessen the effect of data center architecture

D : A set of semantic constraints

Q.no 31. Which architectural style goal is to achieve Modifiability with Reuse?

A : Data Flow Architecture

B : Call and Return Architecture

C : Data Centered Architectures

D : Virtual Machine Architecture

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 31/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 32. Which of the following is not an issue to consider when reverse engineering?

A : directionality

B : connectivity

C : completeness

D : abstraction level

Q.no 33. What can static analysis NOT find?

A : Memory leaks

B : Unreachable (“dead”) code

C : The use of a variable before it has been defined

D : Array bound violations

Q.no 34. which of the following risk is a potential threat to every software project

A : generic risk

B : project risk

C : product risk

D : business risk

Q.no 35. Three statements are given below regarding the User Interface Design: 1) Place the user
in Control. 2) Reduce user's memory load. 3) Make the interface consistent. These rules are
called as __________.

A : Governed Rule

B : Golden Rule

C : User Rule

D : Thumb Rule

Q.no 36. Which of the following is/are commonly used architectural pattern(s)?

A : Model-View-Controller

B : Layered Architecture

C : Client–server

D : MVC, Layered Architecture and Client–server

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 32/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 37. What is Fault Masking?

A : Creating a test case which does not reveal a fault

B : Error condition hiding another error condition

C : Masking a fault by developer

D : Masking a fault by a tester

Q.no 38. Test wares are handed over to maintenance team during which phase?

A : Test implementation and execution

B : Test closure activity

C : Evaluating exit criteria and reporting

D : Test analysis and design

Q.no 39. Webapp configuration object can be managed in much the same way as conventional
software configuration objects except for

A : content items

B : graphic items

C : functional items

D : user items

Q.no 40. ________is not a Software Test Life Cycle Phase?

A : Requirements Gathering

B : Test Planning

C : Test Closure

D : Test Design

Q.no 41. Which of the following uses Impact Analysis most?

A : Non-functional system testing

B : Component testing

C : User acceptance testing

D : Maintenance testing

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 33/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 42. Systems that involve interaction with a shared database can be considered as.

A : software-based

B : transaction-based

C : server-based

D : client-based

Q.no 43. Which of the following testing method is normally used as acceptance test for a software
system?

A : Regression testing

B : Integration testing

C : Unit testing

D : Functional testing

Q.no 44. Which of the following truly describes Mediators?

A : Encapsulation whereby some components is encased within an alternative abstraction

B : Translation between assumptions of an arbitrary component to some provides assumptions of some


other arbitrary components

C : Incorporation of planning function that in effect results in runtime determination of the translation

D : Repair those cases you have detected by adapting the components

Q.no 45. Software tester focuses more on complex part of the software. Which of the following
testing principle implies this?

A : Testing shows presence of defects

B : Pesticide paradox

C : Testing is context dependent

D : Defect Clustering

Q.no 46. Which architectural style goal is to achieve Modifiability with Scalability?

A : Data Flow Architecture

B : Call and Return Architecture

C : Data Centered Architectures

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 34/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

D : Virtual Machine Architecture

Q.no 47. RE is the overall risk exposure and is written as:

A:PxC

B:PxM

C:MxC

D:PxS

Q.no 48. A set of tools that automate the construction of software by ensuring that the proper set
of validated components have been assembled are known as

A : component element

B : process element

C : construction element

D : human elements

Q.no 49. After occurence of the risk ,the developement team members do some rapid actions to
overcome the problem called as

A : reactive risk mode

B : proactive risk mode

C : fire fighting mode

D : quick rectification mode

Q.no 50. What are the criteria to decide the testing efforts?1. Time and budget
2. Size of development team
3. Size of testers
4. Risk associated with project

A : a. 1, 3, 4

B : b. 1, 2, 3

C : c. 1, 4

D : d. 1, 3

Q.no 51. Which one of these belongs to integration testing in the OO context?

A : Unit testing

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 35/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

B : Regression testing

C : Sandwich testing

D : Thread-based testing

Q.no 52. Which of the following is not a design principle that allow the user to maintain control?

A : Provide for flexible interaction

B : Allow user interaction to be interrupt-able and undo-able

C : Show technical internals from the casual user

D : Design for direct interaction with objects that appear on the screen

Q.no 53. The __________ contains a state transition diagram that is a sequential specification of
behavior.

A : Data flow diagram

B : State transition diagram

C : Control specification

D : Activity diagram

Q.no 54. Which model shows the flow of object interactions?

A : Structural model

B : Dynamic model

C : Subsystem model

D : Sequence model

Q.no 55. When a cost to remove defect is not high?

A : During requirement analysis

B : During designing

C : During coding

D : During testing

Q.no 56. The __________ enables the software engineer to develop models of the information
domain and functional domain at the same time

A : Data flow diagram

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 36/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

B : State transition diagram

C : Control specification

D : Activity diagram

Q.no 57. Three factors that affect the consequences that are likely to happen if a risk does occur:

A : its nature,
its scope, and its intensity.

B : its nature,
its scope, and its timing.

C : its nature,
its scope, and its durability.

D : its nature,
its limit, and its timing.

Q.no 58. A product is re-engineered when

A : system crashes frequently

B : tools to support restructuring are disabled

C : hardware or software support becomes obsolete

D : subsystems of a larger system require few maintenance

Q.no 59. Which of the following is not needed to develop a system design from concept to detailed
object-oriented design?

A : Designing system architecture

B : Developing design models

C : Specifying interfaces

D : Developing a debugging system

Q.no 60. Risk mitigation is a risk ___________activity. Risk monitoring is a ___________ activity

A : Avoidance, Project tracking.

B : Increasing, Project tracking.

C : Project tracking, Avoidance.

D : Random, Tracking.

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 37/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 1. Which one of the following is not a step of requirement engineering?

A : elicitation

B : design

C : analysis

D : documentation

Q.no 2. Which one of the following is a requirement that fits in a developer’s module ?

A : Availability

B : Testability

C : Usability

D : Flexibility

Q.no 3. Agile model advocates which one of the following approaches?

A : In each increment, get something “quick and dirty” delivered and thereby save time

B : In each increment, get something simple released as quickly as possible

C : In each increment, get something of business-value delivered as quickly as possible, consistent with
the right level of quality

D : In each increment, get something delivered once it has been fully documented and the
documentation has been signed off as complete

Q.no 4. Which of the following is a static test?

A : Coverage analysis

B : Code inspection

C : Usability assessment

D : Installation test

Q.no 5. Which of the following is not a part of a test design document?

A : Test Plan

B : Test Design Specification

C : Test Case Specification

D : Test Log

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 38/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 6. Error guessing is a:

A : Test verification techniques

B : Test data management techniques

C : Test control management techniques

D : Test execution techniques

Q.no 7. The importance of software design can be summarized in a single word which is:

A : Efficiency

B : Accuracy

C : Quality

D : Complexity

Q.no 8. Coupling is a qualitative indication of the degree to which a module

A : can be written more compactly

B : focuses on just one thing

C : is able to complete its function in a timely manner

D : is connected to other modules and the outside world

Q.no 9. Which of the following model put much more emphasis on testing?

A : waterfall model

B : agile model

C : spiral model

D : v-v model

Q.no 10. select the variation which locates elements by the value of their "id" attribute in Web
Driver Selenium

A : By.id

B : By.idno

C : By.id_no

D : By.tag_id

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 39/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 11. In Design phase, which is the primary area of concern ?

A : Architecture

B : Data

C : Interface

D : All of the mentioned

Q.no 12. When users are involved in complex tasks, the demand on __________ can be significant

A : short-term memory

B : shortcuts

C : objects that appear on the screen

D : all of the mentioned

Q.no 13. Exhaustive testing is:

A : always possible

B : impractical but possible

C : practically possible

D : impractical and impossible

Q.no 14. Select the command which is used to compare the actual page title with an expected
value

A : verifyTitle

B : verifiedTitle

C : verifyTitles

D : verifiedTitles

Q.no 15. A software requirements specification (SRS) document should avoid discussing which
one of the following?

A : Functional requirements

B : Non-functional requirements

C : Design specification

D : Constraints on the implementation

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 40/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 16. Select the command which is used to print a string value of a variable in Selenium IDE

A : The 'display' command

B : The 'echo' command

C : The 'print' command

D : The 'printr' command

Q.no 17. Select the browser which is supported by Selenium IDE

A : Google Chrome

B : Opera Mini

C : Mozilla Firefox

D : Internet Explorer

Q.no 18. When testing principles are useful?

A : During testing

B : During execution

C : During review

D : Throughout life-cycle

Q.no 19. Which of the following are correct statements?

A : An architecture is foremost an abstraction of a system that suppresses details of the components


that do not affect how they are used

B : An architecture is not dependable on requirements

C : An architecture may or may not defines components

D : An architecture is foremost an abstraction of a system that suppresses details of the components


that always affect how they are used

Q.no 20. What is incorrect about structural design?

A : Structural design introduced notations and heuristics

B : Structural design emphasis on procedural decomposition

C : The advantage is data flow representation

D : It follows Structure chart

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 41/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 21. Which one of the following is not a requirements gathering technique

A : Task analysis

B : Scenario analysis

C : Form analysis

D : SRS document review

Q.no 22. Unit testing is done by:

A : Users

B : Developers

C : Customers

D : None of the mentioned

Q.no 23. RMMM stands for

A : risk mitigation methodology and management

B : risk mitigation manupulation and management

C : risk mitigation monitoring and management

D : risk mitigation measurement and management

Q.no 24. A software component

A : Implements some functionality

B : Has explicit dependencies through provides and required interfaces

C : Communicates through its interfaces only

D : All of the mentioned

Q.no 25. A software process model represents which one of the following?

A : The way in which software is developed

B : The way in which software processes data

C : The way in which software is used

D : The way in which software may fail

Q.no 26. Which of the following truly describes Bridges?


https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 42/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : Encapsulation whereby some components is encased within an alternative abstraction

B : Translation between assumptions of an arbitrary component to some provides assumptions of some


other arbitrary components

C : Incorporation of planning function that in effect results in runtime determination of the translation

D : Repair those cases you have detected by adapting the components

Q.no 27. Which of the following is not a state of a defect in defect life cycle:

A : Verified

B : New

C : Critical

D : Deferred

Q.no 28. Beta Testing is done at:

A : Developer’s end

B : User’s end

C : User’s & Developer’s end

D : None of the mentioned

Q.no 29. What describes how a set of interacting components can share data?

A : model-view-controller

B : repository pattern

C : architecture

D : different operating system

Q.no 30. Which of the following is not a Software Configuration Management Activity?

A : Configuration item identification

B : Risk management

C : Release management

D : Branch management

Q.no 31. Which of the following statement is true?

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 43/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : Exhaustive testing is impossible but practicable

B : Exhaustive testing is possible but impracticable

C : Exhaustive testing is impossible and impracticable

D : Exhaustive testing is possible and practicable

Q.no 32. The nature of Software Application can be characterized by their information

A : Determinacy

B : Content

C : Complexity

D : Both OPTION 2 and OPTION 3

Q.no 33. Which of the following is not real-time architectural patterns that are commonly used?

A : Asynchronous communication

B : Observe and React

C : Environmental Control

D : Process Pipeline

Q.no 34. E-Commerce software testing follows different approach than gaming software testing.
Which testing principle implies this?

A : Pareto principle

B : Testing is Context dependent

C : Testing shows presence of defects

D : Absence of errors-fallacy

Q.no 35. What effect does achievement of quality attribute will have?

A : The achievement of quality attribute will always have a positive effect

B : The achievement of quality attribute will always have a negative effect

C : The achievement of quality attribute will have no effect

D : The achievement of quality attribute will have a positive as well as negative effect

Q.no 36. The modification of the software to match changes in the ever changing environment,
falls under which category of software maintenance?

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 44/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : Adaptive

B : Corrective

C : perfective

D : preventive

Q.no 37. Which of the following is not a software testing generic characteristics?

A : Different testing techniques are appropriate at different points in time

B : Testing is conducted by the developer of the software or an independent test group

C : Testing and debugging are different activities, but debugging must be accommodated in any testing
strategy

D : None of the mentioned

Q.no 38. The technique applied for usability testing is:

A : White box

B : Grey box

C : Black box

D : Combination of all

Q.no 39. Static analysis can be best described as:

A : The reviewing of test plans

B : The analysis of batch programs

C : The use of black box testing

D : The analysis of program code

Q.no 40. which of the following is not a software risk

A : product risk

B : project risk

C : business risk

D : management rsik

Q.no 41. Which of the following truly describes Wrappers?

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 45/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : Encapsulation whereby some components is encased within an alternative abstraction

B : Translation between assumptions of an arbitrary component to some provides assumptions of some


other arbitrary components

C : cIncorporation of planning function that in effect results in runtime determination of the translation

D : Repair those cases you have detected by adapting the components

Q.no 42. Which granularity level of testing checks the behavior of module cooperation?

A : Unit Testing

B : Integration Testing

C : Acceptance Testing

D : Regression Testing

Q.no 43. Which architectural style goal is to achieve Integrability?

A : Data Flow Architecture

B : Call and Return Architecture

C : Data Centered Architectures

D : Virtual Machine Architecture

Q.no 44. ETL stands for

A : Data Extraction Transformation & Loading

B : Data Execution Transformation & Loading

C : Extraction Transformation & Loading

D : Execution Transformation & Loading

Q.no 45. ______provide the mechanisms for assembling SCIs into a version-specific
configuration.

A : Repository

B : versioning

C : modeling

D : assembling

Q.no 46. A software reengineeering process model consists of:

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 46/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : code restructuring

B : back engineering

C : document engineerinhg

D : implementation engineering

Q.no 47. Which of the following pattern is the basis of interaction management in many web-
based systems?

A : model-view-controller

B : repository pattern

C : architecture

D : different operating system

Q.no 48. Which of the following is not a Test Type?

A : Database Testing

B : Security Testing

C : Statement Testing

D : Functional Testing

Q.no 49. Which of the following is not a module type

A : Object modules

B : Hardware modules

C : Functional modules

D : Process support modules

Q.no 50. Which architectural style goal is to achieve Portability?

A : Data Flow Architecture

B : Call and Return Architecture

C : Data Centered Architectures

D : Virtual Machine Architecture

Q.no 51. Which of the following is likely to benefit most from the use of test tools providing test
capture and replay facilities?

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 47/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : Integration testing

B : Regression testing

C : System testing

D : User acceptance testing

Q.no 52. which control helps to ensure that parallel changes, performed by two different people,
don’t overwrite one another.

A : version control

B : synchronization control

C : access control

D : configuration control

Q.no 53. A _________ is a graphical representation that depicts information flow and the
transforms that are applied as data moves from input to output.

A : Data flow diagram

B : State transition diagram

C : Control specification

D : Activity diagram

Q.no 54. Which of the following is the component test standard?

A : BS7925-2

B : IEEE 829

C : BS7925-1

D : IEEE 610

Q.no 55. when SCM is a formal activity the software configuration audit is conducted by

A : testing specialists

B : development team

C : senior managers

D : quality assurance group

Q.no 56. Which is not a type of incremental testing approach?

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 48/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : Bottom up

B : Top down

C : Big-bang

D : Functional incrimination

Q.no 57. What determines how information is stored in the repository, how data can be accessed
by tools and viewed by software engineers, how well data security and integrity can be
maintained, and how easily the existing model can be extended to accommodate new needs.

A : Data model

B : Meta model

C : Configuration model

D : Test model

Q.no 58. The ability to identify which requirement generated any given work product is known
as

A : forward tracing

B : backward tracing

C : Dependency tracking

D : Change management

Q.no 59. A chronological record of relevant details about the execution of tests is called as, a
_______

A : Test suite

B : Test procedure

C : Test data

D : Test log

Q.no 60. which of the following impact of the risk drivers on risk components is also called as
disastrous impact

A : critical impact

B : catastrophic impact

C : marginal impact

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 49/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

D : Destructive impact

Q.no 1. When an expected result is not specified in test case template then ___________.

A : We cannot run the test.

B : It may be difficult to determine if the test has passed or failed.

C : It may be difficult to repeat the test.

D : We cannot automate the user inputs.

Q.no 2. Before handing over the software to the client, which testing is to be done in-house?

A : Alpha

B : Betta

C : Gamma

D : Theta

Q.no 3. Select the component which is not part of Selenium Suite

A : Selenium IDE

B : Selenium RC

C : SeleniumGrid

D : Selenium Web

Q.no 4. Which one is the basic input device in GUI

A : Mouse

B : keyboard

C : cpu

D : monitor

Q.no 5. The Web Driver is used

A : To execute tests on the HTML Unit browser

B : To design a test Using Selenese

C : To quickly create tests

D : To test a web application against Firefox only


https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 50/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 6. The Actions Commands

A : are commands that directly interact with page elements

B : are commands that allow you to store values to a variable

C : are commands that verify if a certain condition is met

D:0

Q.no 7. Test cases are designed during which of the following stages?

A : Test recording

B : Test configuration

C : Test planning

D : Test specification

Q.no 8. Validation is focused on

A : Product

B : Process

C : Design

D : Testing

Q.no 9. First graphical user interface used commercially was introduced in

A : 1975

B : 1966

C : 1977

D : 1967

Q.no 10. What is the main technique for achieving portable software?

A : The main technique for achieving portable software is to isolate system dependency

B : The main technique for achieving portable software is to increase the overall performance

C : The main technique for achieving portable software is to have independent platform dependency

D : The main technique for achieving portable software is to have independent platform dependency
and to increase accuracy

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 51/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 11. Which one of the following activities spans all stages of a software development life cycle

A : Coding

B : Testing

C : Project management

D : Design

Q.no 12. which of the following is not a component of risk

A : Quality risk

B : Performance risk

C : Cost risk

D : Support risk

Q.no 13. Consider the following requirement for a word processor software: " The software
should provide facility to import an existing image available as a jpeg file into the document
being created.". Which one of the following types of requirements is this?

A : Functional requirement

B : Non-functional requirement

C : Constraint on the implementation

D : Goal of implementation

Q.no 14. What is TestNG ?

A : TestNextGeneration

B : TestNewGenerlization

C : TestNewGeneration

D : TestNextGenerations

Q.no 15. What is Cyclomatic complexity?

A : Black box testing

B : White box testing

C : Yellow box testing

D : Green box testing

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 52/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 16. WMITS stands for

A : waste mitigation inspection tracking system

B : waste management inspection tracking system

C : waste manupulation inspection tracking system

D : waste measurement inspection tracking system

Q.no 17. Testing of software with actual data and in actual environment is known as?

A : Regression testing

B : Beta testing

C : Alpha testing

D : None of the above

Q.no 18. Which Selenium Component Supports all operating systems

A : Selenium Generator

B : Selenium IDE

C : Selenium WebDriver

D:0

Q.no 19. In software development life cycle , who is the best person to catch a defect?

A : Software Tester

B : Customers

C : Designer

D : Business Analyst

Q.no 20. Select the command in SeleniumIDE used to open a web page using theURL

A : OpenRecord

B : Open

C : OpenText

D : OpenTable

Q.no 21. Which one of the following most accurately reflects agile software development?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 53/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : Incremental development

B : Iterative development

C : Linear development

D : Both incremental and iterative development

Q.no 22. Which component of Selenium can create customized test results ?

A : Web Driver

B : Selenium RC

C : Selenium IDE

D : Selenium Grid

Q.no 23. Which Testing is performed first?

A : Black box testing

B : White box testing

C : Dynamic testing

D : Static testing

Q.no 24. Reactive risk management is sometimes described as:

A : Fire fighting mode

B : Solution mode

C : Uncertain mode

D : Perfect mode

Q.no 25. Cohesion is a qualitative indication of the degree to which a module

A : can be written more compactly

B : focuses on just one thing

C : is able to complete its function in a timely manner

D : is connected to other modules and the outside world

Q.no 26. Systems that involve interaction with a shared database can be considered as.

A : software-based
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 54/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

B : transaction-based

C : server-based

D : client-based

Q.no 27. What combines procedures and tools to manage different versions of configuration
objects that are created during the software process?

A : Versioning

B : Audit trails

C : Change control

D : SCI

Q.no 28. Which of the following testing method is normally used as acceptance test for a software
system?

A : Regression testing

B : Integration testing

C : Unit testing

D : Functional testing

Q.no 29. Webapp configuration object can be managed in much the same way as conventional
software configuration objects except for

A : content items

B : graphic items

C : functional items

D : user items

Q.no 30. Architectural styles is composed of which of the following?

A : A set of component types that perform some function at run-time

B : A topological layout of these components indicating their run-time inter relationships

C : Coupling among the client will lessen the effect of data center architecture

D : A set of semantic constraints

Q.no 31. Requirement Engineering is not concern with ____________.

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 55/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : Requirement Design

B : Requirement Elicitation

C : Requirement Analysis

D : Requirement Documentation

Q.no 32. Software testing are most effective if applied immediately after

A : Requirement Specification

B : Design

C : Coding

D : Integration

Q.no 33. Which is not a SQA activity?

A : Black box testing

B : White box testing

C : Integration testing

D : Unit testing

Q.no 34. Test wares are handed over to maintenance team during which phase?

A : Test implementation and execution

B : Test closure activity

C : Evaluating exit criteria and reporting

D : Test analysis and design

Q.no 35. In a simple risk table the risks are categorized into

A : PS, BU , CU

B : TU ,DE ,ST

C : BE ,CU ,ST

D : SU , TE ,CU ,PS

Q.no 36. Software tester focuses more on complex part of the software. Which of the following
testing principle implies this?

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 56/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : Testing shows presence of defects

B : Pesticide paradox

C : Testing is context dependent

D : Defect Clustering

Q.no 37. Which architectural style goal is to achieve Modifiability with Scalability?

A : Data Flow Architecture

B : Call and Return Architecture

C : Data Centered Architectures

D : Virtual Machine Architecture

Q.no 38. Which of the following risk is the failure of a purchased component to perform as
expected

A : Product risk

B : Business risk

C : Programming risk

D : Project risk

Q.no 39. Which of the following is not an issue to consider when reverse engineering?

A : directionality

B : connectivity

C : completeness

D : abstraction level

Q.no 40. Which of the following truly describes Mediators?

A : Encapsulation whereby some components is encased within an alternative abstraction

B : Translation between assumptions of an arbitrary component to some provides assumptions of some


other arbitrary components

C : Incorporation of planning function that in effect results in runtime determination of the translation

D : Repair those cases you have detected by adapting the components

Q.no 41. What is Fault Masking?

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 57/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : Creating a test case which does not reveal a fault

B : Error condition hiding another error condition

C : Masking a fault by developer

D : Masking a fault by a tester

Q.no 42. Who leads a formal review process?

A : Author

B : Moderator

C : Reviewer

D : Scribe

Q.no 43. which of the following is the highest level in the reverse engineering process

A : testing level

B : abstraction level

C : design level

D : maintainence level

Q.no 44. Version control is not capable of doing

A : enables any version to be constructed using differences from past versions

B : a make facility that enables you to collect all relevant configuration objects and construct a specific
version of the software.

C : If the central database is corrupted, the entire history remains safe and secured

D : a project database repository that stores all relevant configuration objects

Q.no 45. What can static analysis NOT find?

A : Memory leaks

B : Unreachable (“dead”) code

C : The use of a variable before it has been defined

D : Array bound violations

Q.no 46. Three statements are given below regarding the User Interface Design: 1) Place the user
in Control. 2) Reduce user's memory load. 3) Make the interface consistent. These rules are

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 58/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

called as __________.

A : Governed Rule

B : Golden Rule

C : User Rule

D : Thumb Rule

Q.no 47. Which of the following is not the integration strategy?

A : Big-bang

B : Bottom-up

C : Design based

D : Top-down

Q.no 48. Which of the following is NOT a reasonable test objective:

A : To find faults in the software

B : To give confidence in the software

C : To prove that the software has no faults

D : To find performance problems

Q.no 49. which of the following risk is a potential threat to every software project

A : generic risk

B : project risk

C : product risk

D : business risk

Q.no 50. Regression testing is a major part of which of the life cycle?

A : Waterfall model

B : V model

C : Iterative model

D : Agile model

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 59/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 51. What combines the outward manifestation of the computer-based system , coupled with
all supporting information that describe system syntax and semantics?

A : design model

B : user’s model

C : mental image

D : system image

Q.no 52. Which model shows the flow of object interactions?

A : Structural model

B : Dynamic model

C : Subsystem model

D : Sequence model

Q.no 53. The __________ enables the software engineer to develop models of the information
domain and functional domain at the same time

A : Data flow diagram

B : State transition diagram

C : Control specification

D : Activity diagram

Q.no 54. Risk mitigation is a risk ___________activity. Risk monitoring is a ___________ activity

A : Avoidance, Project tracking.

B : Increasing, Project tracking.

C : Project tracking, Avoidance.

D : Random, Tracking.

Q.no 55. The main focus of ______ is to reduce defects and variations in the processes.

A : QA

B : QC

C : Six Sigma

D : tracking

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 60/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 56. When a cost to remove defect is not high?

A : During requirement analysis

B : During designing

C : During coding

D : During testing

Q.no 57. Which of the following is not needed to develop a system design from concept to detailed
object-oriented design?

A : Designing system architecture

B : Developing design models

C : Specifying interfaces

D : Developing a debugging system

Q.no 58. Which of the following is not a design principle that allow the user to maintain control?

A : Provide for flexible interaction

B : Allow user interaction to be interrupt-able and undo-able

C : Show technical internals from the casual user

D : Design for direct interaction with objects that appear on the screen

Q.no 59. The order in which test levels are performed is:

A : Unit, Integration, Acceptance, System

B : Unit, System, Integration, Acceptance

C : Unit, Integration, System, Acceptance

D : It depends on the nature of a project

Q.no 60. The __________ contains a state transition diagram that is a sequential specification of
behavior.

A : Data flow diagram

B : State transition diagram

C : Control specification

D : Activity diagram

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 61/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 1. Reference architecture is a

A : reference model mapped onto software components

B : data flow with comments

C : data flow with pieces

D : reference model mapped onto software components & data flow with comments

Q.no 2. The operation phase of the waterfall model is a synonym for which one of the following
phases?

A : Coding and unit testing phase

B : Integration and system testing phase

C : Maintenance phase

D : Design phase

Q.no 3. which of the followingis not a configuration object

A : Design specification

B : Test specification

C : source code

D : configuration control

Q.no 4. In order to control cost, defects should ideally be detected in which phase:

A : Coding

B : Design

C : Implementation

D : Requirements Gathering

Q.no 5. What is architectural style?

A : Architectural style is a description of component types

B : It is a pattern of run-time control

C : Architectural style is a description of component types and a pattern of run-time control with a set
of constraints on architecture

D : It is a set of constraints on architecture

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 62/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 6. When a company plans to develop a generic product, who among the following is usually
the source of the requirements?

A : Development team members

B : Project manager

C : Marketing personnel

D : Personnel from finance department

Q.no 7. Select the command which retrieves the alert message and stores it in a variable that you
will specify

A : storeAlert

B : storedAlert

C : store_Alert

D : storesAlert

Q.no 8. Which of the following is not a design principle that allows the user to maintain control?

A : Provide for flexible interaction

B : Allow user interaction to be interrupt-able and undo-able

C : Show technical internals from the casual user

D : Design for direct interaction with objects that appear on the screen

Q.no 9. Consider the following partial description of the IIT security software. “A camera at the
main gate should detect an incoming vehicle, and the gate should be opened for registered
vehicles.” Which one of the following types of requirements is this?

A : Functional requirement

B : Non-Functional requirement

C : Design requirement

D : Design constraint

Q.no 10. Select the command which is used to print a string value of a variable in Selenium IDE

A : The 'display' command

B : The 'echo' command

C : The 'print' command

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 63/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

D : The 'printr' command

Q.no 11. Members of a Scrum team are not expected to answer which one of the following
questions during a daily Scrum meeting?

A : It is the fundamental process flow of Scrum

B : It is month-long iteration, during which incremental product functionality completed

C : During a Sprint, customer feedback is continually obtained and the Sprint backlog is accordingly
modified

D : Each day begins with a daily Scrum meeting

Q.no 12. The importance of software design can be summarized in a single word which is:

A : Efficiency

B : Accuracy

C : Quality

D : Complexity

Q.no 13. Which one of the following feedback paths is not present in an iterative waterfall
model?

A : Design phase to feasibility study phase

B : Implementation phase to design phase

C : Implementation phase to requirements specification phase

D : Design phase to requirements specification phase.

Q.no 14. Which of the following is not a part of a test design document?

A : Test Plan

B : Test Design Specification

C : Test Case Specification

D : Test Log

Q.no 15. Select the component which is not a type of assertion in Selenium IDE

A : Assert

B : Verify

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 64/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : WaitFor

D : Wait

Q.no 16. Which of the following is the best type of module coupling?

A : Control Coupling

B : Stamp Coupling

C : Data Coupling

D : Content Coupling

Q.no 17. Which of the following is not a Software Development Life Cycle Phase?

A : Requirements Gathering

B : Test Closure

C : Coding

D : Testing

Q.no 18. SCM stands for

A : Software Control Management

B : Software Configuration Management

C : Software Concept Management

D : Software Course Management

Q.no 19. Which of the following is not a user interface design process?

A : User, task, and environment analysis and modeling

B : Interface design

C : Knowledgeable, frequent users

D : Interface validation

Q.no 20. The expected results of the software is _________________.

A : Only important in system testing

B : Only used in component testing

C : Most useful when specified in advance


https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 65/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

D : Derived from the code.

Q.no 21. Software risk always involves two characteristics. What are those characteristics?

A : Uncertainity & loss

B : Certainity & Profit

C : Staff size and budget

D : Project Deadline and budget

Q.no 22. Verification is the responsibility of

A : Developer

B : Designer

C : Tester

D : QA Team

Q.no 23. Which of these truly defines Software design?

A : Software design is an activity subjected to constraints

B : Software Design specifies nature and composition of software product

C : Software Design satisfies client needs and desires

D : Software design is an activity subjected to constraints specifies nature and composition of software
product which satisfies client needs and desires

Q.no 24. Which of the following is not a white box technique?

A : State transition testing

B : Path testing

C : Statement testing

D : Data flow testing

Q.no 25. What can be used to test Flex/Flash aplication using Selenium

A : FlexUISelenium

B : FlexUI

C : UIFlexSelenium

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 66/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

D : SeleniumFlex

Q.no 26. Which architectural style goal is to achieve Integrability?

A : Data Flow Architecture

B : Call and Return Architecture

C : Data Centered Architectures

D : Virtual Machine Architecture

Q.no 27. Which granularity level of testing checks the behavior of module cooperation?

A : Unit Testing

B : Integration Testing

C : Acceptance Testing

D : Regression Testing

Q.no 28. Which of the following is not a module type

A : Object modules

B : Hardware modules

C : Functional modules

D : Process support modules

Q.no 29. A software reengineeering process model consists of:

A : code restructuring

B : back engineering

C : document engineerinhg

D : implementation engineering

Q.no 30. Which architectural style goal is to achieve Modifiability with Reuse?

A : Data Flow Architecture

B : Call and Return Architecture

C : Data Centered Architectures

D : Virtual Machine Architecture


https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 67/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 31. RE is the overall risk exposure and is written as:

A:PxC

B:PxM

C:MxC

D:PxS

Q.no 32. What allows different projects to use the same source files at the same time?

A : Version Control

B : Access control

C : CM Process

D : Version Control and Access control

Q.no 33. After occurence of the risk ,the developement team members do some rapid actions to
overcome the problem called as

A : reactive risk mode

B : proactive risk mode

C : fire fighting mode

D : quick rectification mode

Q.no 34. A set of tools that automate the construction of software by ensuring that the proper set
of validated components have been assembled are known as

A : component element

B : process element

C : construction element

D : human elements

Q.no 35. Which of the following is/are commonly used architectural pattern(s)?

A : Model-View-Controller

B : Layered Architecture

C : Client–server

D : MVC, Layered Architecture and Client–server

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 68/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 36. Which of the following is not a Software Configuration Management Activity?

A : Configuration item identification

B : Risk management

C : Release management

D : Branch management

Q.no 37. Static analysis can be best described as:

A : The reviewing of test plans

B : The analysis of batch programs

C : The use of black box testing

D : The analysis of program code

Q.no 38. Beta Testing is done at:

A : Developer’s end

B : User’s end

C : User’s & Developer’s end

D : None of the mentioned

Q.no 39. Which of the following truly describes Bridges?

A : Encapsulation whereby some components is encased within an alternative abstraction

B : Translation between assumptions of an arbitrary component to some provides assumptions of some


other arbitrary components

C : Incorporation of planning function that in effect results in runtime determination of the translation

D : Repair those cases you have detected by adapting the components

Q.no 40. ________is not a Software Test Life Cycle Phase?

A : Requirements Gathering

B : Test Planning

C : Test Closure

D : Test Design

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 69/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 41. ______provide the mechanisms for assembling SCIs into a version-specific
configuration.

A : Repository

B : versioning

C : modeling

D : assembling

Q.no 42. A set of tools coupled within a file management system that enables access to and
management of each software configuration item is known as

A : component element

B : process element

C : construction element

D : human elements

Q.no 43. The defect cluster change over time. Which of the following testing principle implies
this?

A : Testing shows presence of defects

B : Pesticide paradox

C : Testing is context dependent

D : Defect Clustering

Q.no 44. Which of the following truly describes Wrappers?

A : Encapsulation whereby some components is encased within an alternative abstraction

B : Translation between assumptions of an arbitrary component to some provides assumptions of some


other arbitrary components

C : cIncorporation of planning function that in effect results in runtime determination of the translation

D : Repair those cases you have detected by adapting the components

Q.no 45. ETL stands for

A : Data Extraction Transformation & Loading

B : Data Execution Transformation & Loading

C : Extraction Transformation & Loading

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 70/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

D : Execution Transformation & Loading

Q.no 46. Which of the following statement is true?

A : Exhaustive testing is impossible but practicable

B : Exhaustive testing is possible but impracticable

C : Exhaustive testing is impossible and impracticable

D : Exhaustive testing is possible and practicable

Q.no 47. What effect does achievement of quality attribute will have?

A : The achievement of quality attribute will always have a positive effect

B : The achievement of quality attribute will always have a negative effect

C : The achievement of quality attribute will have no effect

D : The achievement of quality attribute will have a positive as well as negative effect

Q.no 48. E-Commerce software testing follows different approach than gaming software testing.
Which testing principle implies this?

A : Pareto principle

B : Testing is Context dependent

C : Testing shows presence of defects

D : Absence of errors-fallacy

Q.no 49. What is the major improvement in SVN

A : it allows to rollback of commit

B : addition of atomic commits

C : supported everywhere

D : each file is processed independently

Q.no 50. Which of the following items would not come under Configuration Management?

A : Operating systems

B : Live data

C : Test documentation

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 71/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

D : User requirement documents

Q.no 51. which control helps to ensure that parallel changes, performed by two different people,
don’t overwrite one another.

A : version control

B : synchronization control

C : access control

D : configuration control

Q.no 52. when SCM is a formal activity the software configuration audit is conducted by

A : testing specialists

B : development team

C : senior managers

D : quality assurance group

Q.no 53. Which of the following type of maintenance takes the maximum chunk of the total
maintenance effort in a typical life cycle of a software product ?

A : Adaptive maintenance

B : Corrective maintenance

C : Preventive maintenance

D : Perfective maintenance

Q.no 54. Which one of these belongs to integration testing in the OO context?

A : Unit testing

B : Regression testing

C : Sandwich testing

D : Thread-based testing

Q.no 55. Which of the following is likely to benefit most from the use of test tools providing test
capture and replay facilities?

A : Integration testing

B : Regression testing

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 72/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : System testing

D : User acceptance testing

Q.no 56. A chronological record of relevant details about the execution of tests is called as, a
_______

A : Test suite

B : Test procedure

C : Test data

D : Test log

Q.no 57. Three factors that affect the consequences that are likely to happen if a risk does occur:

A : its nature,
its scope, and its intensity.

B : its nature,
its scope, and its timing.

C : its nature,
its scope, and its durability.

D : its nature,
its limit, and its timing.

Q.no 58. Which model describes the static structure of the system using object classes and their
relationships?

A : Structural model

B : Dynamic model

C : Subsystem model

D : Sequence model

Q.no 59. Which of the following is the component test standard?

A : BS7925-2

B : IEEE 829

C : BS7925-1

D : IEEE 610

Q.no 60. A _________ is a graphical representation that depicts information flow and the
transforms that are applied as data moves from input to output.
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 73/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : Data flow diagram

B : State transition diagram

C : Control specification

D : Activity diagram

Q.no 1. Who performs the Acceptance Testing?

A : Software Developer

B : End users

C : Testing team

D : Systems engineers

Q.no 2. The risks that are analyzed and managed should be derived from thorough study of

A : people,
product, process, and project.

B : people,
product, process, and management.

C : people,
product, process, and feedback.

D : people,
product, process, and environment.

Q.no 3. which of the following is not a component of risk

A : Quality risk

B : Performance risk

C : Cost risk

D : Support risk

Q.no 4. Which Selenium Component Supports all operating systems

A : Selenium Generator

B : Selenium IDE

C : Selenium WebDriver

D:0

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 74/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 5. Testing of software with actual data and in actual environment is known as?

A : Regression testing

B : Beta testing

C : Alpha testing

D : None of the above

Q.no 6. In which of the following type of testing, testing is done without planning and
documentation?

A : Unit testing

B : Retesting

C : Ad hoc testing

D : Regression testing

Q.no 7. RE represents what

A : Risk expense

B : Related expense

C : Risk exposure

D : Risk evaluation

Q.no 8. Which one of the following is not a requirements gathering technique

A : Task analysis

B : Scenario analysis

C : Form analysis

D : SRS document review

Q.no 9. Source code translation is a part of which re-engineering technique

A : Data re-engineering

B : Refactoring

C : Restructuring

D : Repairing

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 75/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 10. Verification is focused on

A : Product

B : Process

C : Design

D : Testing

Q.no 11. Software Design consists of _____________

A : Software Product Design

B : Software Engineering Design

C : Software Product & Engineering Design

D : Only Software testing

Q.no 12. Which one of the following is a requirement that fits in a developer’s module ?

A : Availability

B : Testability

C : Usability

D : Flexibility

Q.no 13. CTC stands for

A : condition-transaction-consequence

B : condition-transfer-consequence

C : condition-transition-consequence

D : condition-transmission-consequence

Q.no 14. which of the following is not a type of maintainence

A : Corrective maintainence

B : adaptive maintainence

C : perfective maintainence

D : predetermined maintainence

Q.no 15. The selenium can


https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 76/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : access controls within the desktop

B : both web and desktop applications

C : only test web applications

D:0

Q.no 16. Verification and Validation uses __________.

A : Internal and External resources respectively.

B : Internal resources only.

C : External resources only.

D : External and Internal resources respectively.

Q.no 17. Which is/are ways to deal with risk?

A : Mitigate,Contingency

B : Transfer

C : Mitigate,Contingency, Transfer, Ignore

D : Ignore

Q.no 18. Select the method which performs a context-click at the curent mouse location

A : click_Context()

B : context.Click()

C : contextClick()

D : context_Click()

Q.no 19. Which one of the following views is implicit in an SRS document?

A : Black box

B : White box

C : Grey box

D : Glass box

Q.no 20. When users are involved in complex tasks, the demand on __________ can be significant

A : short-term memory
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 77/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

B : shortcuts

C : objects that appear on the screen

D : all of the mentioned

Q.no 21. Consider a system where, a heat sensor detects an intrusion and alerts the security
company.” What kind of a requirement the system is providing?

A : Functional

B : Non-Functional

C : Known Requirement

D : None of the mentioned

Q.no 22. A program with high cyclometic complexity is likely to be:

A : Large

B : Small

C : Difficult to write

D : Difficult to test

Q.no 23. End result of Software Requirement Analysis is ________.

A : Functional and Behavioral

B : Architectural and Structural

C : Usability and Reliability

D : Algorithmic and Data Structure

Q.no 24. How many classification schemes have been developed for NFRs ?

A : Two

B : Three

C : Four

D : Five

Q.no 25. What is TestNG ?

A : TestNextGeneration

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 78/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

B : TestNewGenerlization

C : TestNewGeneration

D : TestNextGenerations

Q.no 26. Maintenance testing is performed using which methodology?

A : Retesting

B : Sanity testing

C : Breadth test and depth test

D : Confirmation testing

Q.no 27. Architectural styles is composed of which of the following?

A : A set of component types that perform some function at run-time

B : A topological layout of these components indicating their run-time inter relationships

C : Coupling among the client will lessen the effect of data center architecture

D : A set of semantic constraints

Q.no 28. Which architectural style goal is to achieve Modifiability with Scalability?

A : Data Flow Architecture

B : Call and Return Architecture

C : Data Centered Architectures

D : Virtual Machine Architecture

Q.no 29. Which of the following is not a Test Type?

A : Database Testing

B : Security Testing

C : Statement Testing

D : Functional Testing

Q.no 30. Which of the following testing method is normally used as acceptance test for a software
system?

A : Regression testing

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 79/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

B : Integration testing

C : Unit testing

D : Functional testing

Q.no 31. What can static analysis NOT find?

A : Memory leaks

B : Unreachable (“dead”) code

C : The use of a variable before it has been defined

D : Array bound violations

Q.no 32. which of the following is not a software risk

A : product risk

B : project risk

C : business risk

D : management rsik

Q.no 33. Regression testing is a major part of which of the life cycle?

A : Waterfall model

B : V model

C : Iterative model

D : Agile model

Q.no 34. Three statements are given below regarding the User Interface Design: 1) Place the user
in Control. 2) Reduce user's memory load. 3) Make the interface consistent. These rules are
called as __________.

A : Governed Rule

B : Golden Rule

C : User Rule

D : Thumb Rule

Q.no 35. What is Fault Masking?

A : Creating a test case which does not reveal a fault

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 80/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

B : Error condition hiding another error condition

C : Masking a fault by developer

D : Masking a fault by a tester

Q.no 36. What is “V” Model?

A : Test Design Technique

B : Test Type

C : SDLC Model

D : Test Level

Q.no 37. The modification of the software to match changes in the ever changing environment,
falls under which category of software maintenance?

A : Adaptive

B : Corrective

C : perfective

D : preventive

Q.no 38. Software testing are most effective if applied immediately after

A : Requirement Specification

B : Design

C : Coding

D : Integration

Q.no 39. Bug status is set to postpone due to ________.

A : Priority of that bug may low.

B : Lack of time for the release.

C : The bug may not be the major effect in the software.

D : Data may be unavailable.

Q.no 40. What are the criteria to decide the testing efforts?1. Time and budget
2. Size of development team
3. Size of testers
4. Risk associated with project

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 81/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : a. 1, 3, 4

B : b. 1, 2, 3

C : c. 1, 4

D : d. 1, 3

Q.no 41. Which architectural style goal is to achieve Portability?

A : Data Flow Architecture

B : Call and Return Architecture

C : Data Centered Architectures

D : Virtual Machine Architecture

Q.no 42. Who leads a formal review process?

A : Author

B : Moderator

C : Reviewer

D : Scribe

Q.no 43. Webapp configuration object can be managed in much the same way as conventional
software configuration objects except for

A : content items

B : graphic items

C : functional items

D : user items

Q.no 44. Systems that involve interaction with a shared database can be considered as.

A : software-based

B : transaction-based

C : server-based

D : client-based

Q.no 45. Which of the following uses Impact Analysis most?

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 82/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : Non-functional system testing

B : Component testing

C : User acceptance testing

D : Maintenance testing

Q.no 46. Which of the following is NOT a reasonable test objective:

A : To find faults in the software

B : To give confidence in the software

C : To prove that the software has no faults

D : To find performance problems

Q.no 47. Which is not a SQA activity?

A : Black box testing

B : White box testing

C : Integration testing

D : Unit testing

Q.no 48. Version control is not capable of doing

A : enables any version to be constructed using differences from past versions

B : a make facility that enables you to collect all relevant configuration objects and construct a specific
version of the software.

C : If the central database is corrupted, the entire history remains safe and secured

D : a project database repository that stores all relevant configuration objects

Q.no 49. which of the following is the highest level in the reverse engineering process

A : testing level

B : abstraction level

C : design level

D : maintainence level

Q.no 50. In a simple risk table the risks are categorized into

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 83/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : PS, BU , CU

B : TU ,DE ,ST

C : BE ,CU ,ST

D : SU , TE ,CU ,PS

Q.no 51. Which of the following is not needed to develop a system design from concept to detailed
object-oriented design?

A : Designing system architecture

B : Developing design models

C : Specifying interfaces

D : Developing a debugging system

Q.no 52. What determines how information is stored in the repository, how data can be accessed
by tools and viewed by software engineers, how well data security and integrity can be
maintained, and how easily the existing model can be extended to accommodate new needs.

A : Data model

B : Meta model

C : Configuration model

D : Test model

Q.no 53. What mechanism is used to apprise others of changes that are made?

A : Configuration management

B : Requirementss tracing

C : Reporting

D : Change control

Q.no 54. Which of the following is not a design principle that allow the user to maintain control?

A : Provide for flexible interaction

B : Allow user interaction to be interrupt-able and undo-able

C : Show technical internals from the casual user

D : Design for direct interaction with objects that appear on the screen

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 84/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 55. The order in which test levels are performed is:

A : Unit, Integration, Acceptance, System

B : Unit, System, Integration, Acceptance

C : Unit, Integration, System, Acceptance

D : It depends on the nature of a project

Q.no 56. Which is not a type of incremental testing approach?

A : Bottom up

B : Top down

C : Big-bang

D : Functional incrimination

Q.no 57. Which model shows the flow of object interactions?

A : Structural model

B : Dynamic model

C : Subsystem model

D : Sequence model

Q.no 58. which of the following impact of the risk drivers on risk components is also called as
disastrous impact

A : critical impact

B : catastrophic impact

C : marginal impact

D : Destructive impact

Q.no 59. A __________ executes the loop task first, then tests a condition and repeats the task
until the condition fails.

A : repeat until

B : condition

C : do while tests

D : if then-else

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 85/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 60. A product is re-engineered when

A : system crashes frequently

B : tools to support restructuring are disabled

C : hardware or software support becomes obsolete

D : subsystems of a larger system require few maintenance

Q.no 1. Select the command in SeleniumIDE used to open a web page using theURL

A : OpenRecord

B : Open

C : OpenText

D : OpenTable

Q.no 2. Project risk factor is considered in which model?

A : Spiral model.

B : Waterfall model.

C : Prototyping model

D : Incremental Model.

Q.no 3. Which of the following is golden rule for interface design?

A : Place the user in control

B : Reduce the user’s memory load

C : Make the interface consistent

D : All of the mentioned

Q.no 4. A software process model represents which one of the following?

A : The way in which software is developed

B : The way in which software processes data

C : The way in which software is used

D : The way in which software may fail

Q.no 5. Agile model advocates which one of the following approaches?


https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 86/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : In each increment, get something “quick and dirty” delivered and thereby save time

B : In each increment, get something simple released as quickly as possible

C : In each increment, get something of business-value delivered as quickly as possible, consistent with
the right level of quality

D : In each increment, get something delivered once it has been fully documented and the
documentation has been signed off as complete

Q.no 6. Testing done without planning and Documentation is called

A : Unit testing

B : Regression testing

C : Adhoc testing

D : None of the mentioned

Q.no 7. SCM stands for

A : Software Control Management

B : Software Configuration Management

C : Software Concept Management

D : Software Course Management

Q.no 8. Which one of the following is a functional requirement ?

A : Maintainability

B : Portability

C : Robustness

D : None of the mentioned

Q.no 9. In case of Selenium IDE, the source view shows your script in

A : DHTML format

B : XML format

C : j2EE format

D : HTML format

Q.no 10. The importance of software design can be summarized in a single word which is:

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 87/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : Efficiency

B : Accuracy

C : Quality

D : Complexity

Q.no 11. Which of the following model put much more emphasis on testing?

A : waterfall model

B : agile model

C : spiral model

D : v-v model

Q.no 12. Out of the following which is not a wait comand

A : waitForTitle

B : waitForTextPresent

C : waitForActive

D : waitForAlert

Q.no 13. Which of the following is not a part of a test design document?

A : Test Plan

B : Test Design Specification

C : Test Case Specification

D : Test Log

Q.no 14. What incorporates data, architectural, interface, and procedural representations of the
software?

A : design model

B : user’s model

C : mental image

D : system image

Q.no 15. Select the language which is supported by the Selenium Web driver

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 88/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : Perl

B : Sql

C : ASP

D : Cobol

Q.no 16. Selenium IDE stands for

A : Selenium Initialization Development Environment

B : Selenium Interrelated Development Environment

C : Selenium Integrated Development Environment

D : Selenium Information Development Environment

Q.no 17. What are the benefits for component based product lines?

A : Being able to take faster advantage of new product and new technology

B : Increase in time to market market

C : Higher employee productivity

D : A disciplined approach to specify as many assumptions about a components interface as is feasible

Q.no 18. Select the method which selects the option at the at the given index

A : selectByIndex()

B : selectIndex()

C : selectedByIndex()

D : selectByIndexes()

Q.no 19. Select the command which is used to print a string value of a variable in Selenium IDE

A : The 'display' command

B : The 'echo' command

C : The 'print' command

D : The 'printr' command

Q.no 20. Select the command which is used to check the presence of a certain element

A : verifyTable
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 89/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

B : verifyTitlePresent

C : verifyTextPresent

D : verifyElementPresent

Q.no 21. The operation phase of the waterfall model is a synonym for which one of the
following phases?

A : Coding and unit testing phase

B : Integration and system testing phase

C : Maintenance phase

D : Design phase

Q.no 22. The implementation phase of the waterfall model is a synonym for which one of the
following phases?

A : Coding and unit testing phase

B : Integration and system testing phase

C : Maintenance phase

D : Design phase

Q.no 23. Which one of the following feedback paths is not present in an iterative waterfall
model?

A : Design phase to feasibility study phase

B : Implementation phase to design phase

C : Implementation phase to requirements specification phase

D : Design phase to requirements specification phase.

Q.no 24. Select the language which is not supported by the Selenium RC

A : ASP

B : Java

C : C#

D : PHP

Q.no 25. Consider the following partial description of the IIT security software. “A camera at the
main gate should detect an incoming vehicle, and the gate should be opened for registered

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 90/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

vehicles.” Which one of the following types of requirements is this?

A : Functional requirement

B : Non-Functional requirement

C : Design requirement

D : Design constraint

Q.no 26. E-Commerce software testing follows different approach than gaming software testing.
Which testing principle implies this?

A : Pareto principle

B : Testing is Context dependent

C : Testing shows presence of defects

D : Absence of errors-fallacy

Q.no 27. Which of the following is not a Software Configuration Management Activity?

A : Configuration item identification

B : Risk management

C : Release management

D : Branch management

Q.no 28. The nature of Software Application can be characterized by their information

A : Determinacy

B : Content

C : Complexity

D : Both OPTION 2 and OPTION 3

Q.no 29. Which of the following risk is the failure of a purchased component to perform as
expected

A : Product risk

B : Business risk

C : Programming risk

D : Project risk

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 91/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 30. What effect does achievement of quality attribute will have?

A : The achievement of quality attribute will always have a positive effect

B : The achievement of quality attribute will always have a negative effect

C : The achievement of quality attribute will have no effect

D : The achievement of quality attribute will have a positive as well as negative effect

Q.no 31. A set of tools that automate the construction of software by ensuring that the proper set
of validated components have been assembled are known as

A : component element

B : process element

C : construction element

D : human elements

Q.no 32. What allows different projects to use the same source files at the same time?

A : Version Control

B : Access control

C : CM Process

D : Version Control and Access control

Q.no 33. After occurence of the risk ,the developement team members do some rapid actions to
overcome the problem called as

A : reactive risk mode

B : proactive risk mode

C : fire fighting mode

D : quick rectification mode

Q.no 34. Beta Testing is done at:

A : Developer’s end

B : User’s end

C : User’s & Developer’s end

D : None of the mentioned

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 92/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 35. Which of the following is not the integration strategy?

A : Big-bang

B : Bottom-up

C : Design based

D : Top-down

Q.no 36. RE is the overall risk exposure and is written as:

A:PxC

B:PxM

C:MxC

D:PxS

Q.no 37. Which of the following pattern is the basis of interaction management in many web-
based systems?

A : model-view-controller

B : repository pattern

C : architecture

D : different operating system

Q.no 38. ETL stands for

A : Data Extraction Transformation & Loading

B : Data Execution Transformation & Loading

C : Extraction Transformation & Loading

D : Execution Transformation & Loading

Q.no 39. Requirement Engineering is not concern with ____________.

A : Requirement Design

B : Requirement Elicitation

C : Requirement Analysis

D : Requirement Documentation

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 93/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 40. Which of the following is not a software testing generic characteristics?

A : Different testing techniques are appropriate at different points in time

B : Testing is conducted by the developer of the software or an independent test group

C : Testing and debugging are different activities, but debugging must be accommodated in any testing
strategy

D : None of the mentioned

Q.no 41. which of the following risk is a potential threat to every software project

A : generic risk

B : project risk

C : product risk

D : business risk

Q.no 42. A software reengineeering process model consists of:

A : code restructuring

B : back engineering

C : document engineerinhg

D : implementation engineering

Q.no 43. Which of the following truly describes Bridges?

A : Encapsulation whereby some components is encased within an alternative abstraction

B : Translation between assumptions of an arbitrary component to some provides assumptions of some


other arbitrary components

C : Incorporation of planning function that in effect results in runtime determination of the translation

D : Repair those cases you have detected by adapting the components

Q.no 44. A set of tools coupled within a file management system that enables access to and
management of each software configuration item is known as

A : component element

B : process element

C : construction element

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 94/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

D : human elements

Q.no 45. The technique applied for usability testing is:

A : White box

B : Grey box

C : Black box

D : Combination of all

Q.no 46. Which of the following items would not come under Configuration Management?

A : Operating systems

B : Live data

C : Test documentation

D : User requirement documents

Q.no 47. Which of the following statement is true?

A : Exhaustive testing is impossible but practicable

B : Exhaustive testing is possible but impracticable

C : Exhaustive testing is impossible and impracticable

D : Exhaustive testing is possible and practicable

Q.no 48. Which of the following is not an issue to consider when reverse engineering?

A : directionality

B : connectivity

C : completeness

D : abstraction level

Q.no 49. What combines procedures and tools to manage different versions of configuration
objects that are created during the software process?

A : Versioning

B : Audit trails

C : Change control

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 95/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

D : SCI

Q.no 50. Which granularity level of testing checks the behavior of module cooperation?

A : Unit Testing

B : Integration Testing

C : Acceptance Testing

D : Regression Testing

Q.no 51. A chronological record of relevant details about the execution of tests is called as, a
_______

A : Test suite

B : Test procedure

C : Test data

D : Test log

Q.no 52. The __________ enables the software engineer to develop models of the information
domain and functional domain at the same time

A : Data flow diagram

B : State transition diagram

C : Control specification

D : Activity diagram

Q.no 53. The main focus of ______ is to reduce defects and variations in the processes.

A : QA

B : QC

C : Six Sigma

D : tracking

Q.no 54. when SCM is a formal activity the software configuration audit is conducted by

A : testing specialists

B : development team

C : senior managers

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 96/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

D : quality assurance group

Q.no 55. Which of the following type of maintenance takes the maximum chunk of the total
maintenance effort in a typical life cycle of a software product ?

A : Adaptive maintenance

B : Corrective maintenance

C : Preventive maintenance

D : Perfective maintenance

Q.no 56. What combines the outward manifestation of the computer-based system , coupled with
all supporting information that describe system syntax and semantics?

A : design model

B : user’s model

C : mental image

D : system image

Q.no 57. A _________ is a graphical representation that depicts information flow and the
transforms that are applied as data moves from input to output.

A : Data flow diagram

B : State transition diagram

C : Control specification

D : Activity diagram

Q.no 58. Which of the following is likely to benefit most from the use of test tools providing test
capture and replay facilities?

A : Integration testing

B : Regression testing

C : System testing

D : User acceptance testing

Q.no 59. Which of the following is the component test standard?

A : BS7925-2

B : IEEE 829

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 97/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : BS7925-1

D : IEEE 610

Q.no 60. The __________ contains a state transition diagram that is a sequential specification of
behavior.

A : Data flow diagram

B : State transition diagram

C : Control specification

D : Activity diagram

Q.no 1. The UML was designed for describing _________

A : object-oriented systems

B : architectural design

C : SRS

D : Both object-oriented systems and Architectural design

Q.no 2. Why do you think iteration is important for design?

A : To frequently reanalyze the problem

B : To generate and improve solutions only once for better output

C : To compare and analyze the complexity of algorithm/ program

D : Due to language supports iterations

Q.no 3. Which one of the following is not a standard software development process model?

A : Waterfall Model

B : Recursive Model

C : RAD Model

D : V Model

Q.no 4. In software development life cycle , who is the best person to catch a defect?

A : Software Tester

B : Customers

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 98/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : Designer

D : Business Analyst

Q.no 5. Unit testing is carried out during which phase of the waterfall model?

A : Implementation phase

B : Testing phase

C : Maintenance phase

D : Design phase

Q.no 6. Select the component which is not a type of assertion in Selenium IDE

A : Assert

B : Verify

C : WaitFor

D : Wait

Q.no 7. select the variation which locates elements by the value of their "id" attribute in Web
Driver Selenium

A : By.id

B : By.idno

C : By.id_no

D : By.tag_id

Q.no 8. What is the main technique for achieving portable software?

A : The main technique for achieving portable software is to isolate system dependency

B : The main technique for achieving portable software is to increase the overall performance

C : The main technique for achieving portable software is to have independent platform dependency

D : The main technique for achieving portable software is to have independent platform dependency
and to increase accuracy

Q.no 9. What is incorrect about structural design?

A : Structural design introduced notations and heuristics

B : Structural design emphasis on procedural decomposition

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 99/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : The advantage is data flow representation

D : It follows Structure chart

Q.no 10. Which one of the following most accurately reflects agile software development?

A : Incremental development

B : Iterative development

C : Linear development

D : Both incremental and iterative development

Q.no 11. Source code translation is a part of which re-engineering technique

A : Data re-engineering

B : Refactoring

C : Restructuring

D : Repairing

Q.no 12. Test cases are created in which phase?

A : Test Specification

B : Test Planning

C : Test Requirement

D : Test Configuration

Q.no 13. What establishes the profile of end-users of the system?

A : design model

B : user’s model

C : mental image

D : system image

Q.no 14. Which of the following is not a user interface design process?

A : User, task, and environment analysis and modeling

B : Interface design

C : Knowledgeable, frequent users


https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 100/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

D : Interface validation

Q.no 15. Select the command which is used to pause execution until the page is loaded completely

A : waitForPageToLoad

B : waitForElementPresent

C : waitForPage

D : waitForLoad

Q.no 16. When is the requirement specification activity carried out?

A : During requirements gathering activity

B : Before requirements analysis activity

C : Before requirements gathering activity

D : After requirements analysis activity

Q.no 17. System testing is a

A : Black box testing

B : Grey box testing

C : White box testing

D : Glass box

Q.no 18. Before handing over the software to the client, which testing is to be done in-house?

A : Alpha

B : Betta

C : Gamma

D : Theta

Q.no 19. which of the following is not a component of risk

A : Quality risk

B : Performance risk

C : Cost risk

D : Support risk
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 101/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 20. Select the browser which is supported by Selenium IDE

A : Google Chrome

B : Opera Mini

C : Mozilla Firefox

D : Internet Explorer

Q.no 21. Consider the following partial requirement for a software: “A web browser should be
used as the front end.” It can be considered to be which one of the following types of
requirements?

A : Functional requirement

B : Non-functional requirement

C : Design constraint

D : External interface

Q.no 22. When users are involved in complex tasks, the demand on __________ can be significant

A : short-term memory

B : shortcuts

C : objects that appear on the screen

D : all of the mentioned

Q.no 23. Method which selects the option which displays the text matching the parameter passed
to it

A : selectVisibleText()

B : selectByVisibleText()

C : select_VisibleText()

D : select_ByVisibleText()

Q.no 24. In which of the following type of testing, testing is done without planning and
documentation?

A : Unit testing

B : Retesting

C : Ad hoc testing

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 102/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

D : Regression testing

Q.no 25. Which of the following statements explains portability in non-functional requirements?

A : It is a degree to which software running on one platform can easily be converted to run on another
platform

B : It cannot be enhanced by using languages, OS’ and tools that are universally available and
standardized

C : The ability of the system to behave consistently in a user-acceptable manner when operating within
the environment for which the system was intended

D : None of the mentioned

Q.no 26. What is “V” Model?

A : Test Design Technique

B : Test Type

C : SDLC Model

D : Test Level

Q.no 27. Maintenance testing is performed using which methodology?

A : Retesting

B : Sanity testing

C : Breadth test and depth test

D : Confirmation testing

Q.no 28. Systems that involve interaction with a shared database can be considered as.

A : software-based

B : transaction-based

C : server-based

D : client-based

Q.no 29. Bug status is set to postpone due to ________.

A : Priority of that bug may low.

B : Lack of time for the release.

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 103/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : The bug may not be the major effect in the software.

D : Data may be unavailable.

Q.no 30. Which architectural style goal is to achieve Modifiability with Reuse?

A : Data Flow Architecture

B : Call and Return Architecture

C : Data Centered Architectures

D : Virtual Machine Architecture

Q.no 31. Which of the following is not a Test Type?

A : Database Testing

B : Security Testing

C : Statement Testing

D : Functional Testing

Q.no 32. Software testing are most effective if applied immediately after

A : Requirement Specification

B : Design

C : Coding

D : Integration

Q.no 33. Webapp configuration object can be managed in much the same way as conventional
software configuration objects except for

A : content items

B : graphic items

C : functional items

D : user items

Q.no 34. What are the criteria to decide the testing efforts?1. Time and budget
2. Size of development team
3. Size of testers
4. Risk associated with project

A : a. 1, 3, 4

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 104/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

B : b. 1, 2, 3

C : c. 1, 4

D : d. 1, 3

Q.no 35. Which of the following uses Impact Analysis most?

A : Non-functional system testing

B : Component testing

C : User acceptance testing

D : Maintenance testing

Q.no 36. Which of the following truly describes Mediators?

A : Encapsulation whereby some components is encased within an alternative abstraction

B : Translation between assumptions of an arbitrary component to some provides assumptions of some


other arbitrary components

C : Incorporation of planning function that in effect results in runtime determination of the translation

D : Repair those cases you have detected by adapting the components

Q.no 37. The defect cluster change over time. Which of the following testing principle implies
this?

A : Testing shows presence of defects

B : Pesticide paradox

C : Testing is context dependent

D : Defect Clustering

Q.no 38. Which architectural style goal is to achieve Integrability?

A : Data Flow Architecture

B : Call and Return Architecture

C : Data Centered Architectures

D : Virtual Machine Architecture

Q.no 39. What describes how a set of interacting components can share data?

A : model-view-controller

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 105/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

B : repository pattern

C : architecture

D : different operating system

Q.no 40. Which of the following is not real-time architectural patterns that are commonly used?

A : Asynchronous communication

B : Observe and React

C : Environmental Control

D : Process Pipeline

Q.no 41. Static analysis can be best described as:

A : The reviewing of test plans

B : The analysis of batch programs

C : The use of black box testing

D : The analysis of program code

Q.no 42. What is Fault Masking?

A : Creating a test case which does not reveal a fault

B : Error condition hiding another error condition

C : Masking a fault by developer

D : Masking a fault by a tester

Q.no 43. ______provide the mechanisms for assembling SCIs into a version-specific
configuration.

A : Repository

B : versioning

C : modeling

D : assembling

Q.no 44. Which is not a SQA activity?

A : Black box testing

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 106/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

B : White box testing

C : Integration testing

D : Unit testing

Q.no 45. Which of the following is not a state of a defect in defect life cycle:

A : Verified

B : New

C : Critical

D : Deferred

Q.no 46. Which of the following truly describes Wrappers?

A : Encapsulation whereby some components is encased within an alternative abstraction

B : Translation between assumptions of an arbitrary component to some provides assumptions of some


other arbitrary components

C : cIncorporation of planning function that in effect results in runtime determination of the translation

D : Repair those cases you have detected by adapting the components

Q.no 47. Which of the following is NOT a reasonable test objective:

A : To find faults in the software

B : To give confidence in the software

C : To prove that the software has no faults

D : To find performance problems

Q.no 48. Which of the following is not a module type

A : Object modules

B : Hardware modules

C : Functional modules

D : Process support modules

Q.no 49. Three statements are given below regarding the User Interface Design: 1) Place the user
in Control. 2) Reduce user's memory load. 3) Make the interface consistent. These rules are
called as __________.

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 107/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : Governed Rule

B : Golden Rule

C : User Rule

D : Thumb Rule

Q.no 50. Which of the following is/are commonly used architectural pattern(s)?

A : Model-View-Controller

B : Layered Architecture

C : Client–server

D : MVC, Layered Architecture and Client–server

Q.no 51. Which model describes the static structure of the system using object classes and their
relationships?

A : Structural model

B : Dynamic model

C : Subsystem model

D : Sequence model

Q.no 52. which control helps to ensure that parallel changes, performed by two different people,
don’t overwrite one another.

A : version control

B : synchronization control

C : access control

D : configuration control

Q.no 53. What determines how information is stored in the repository, how data can be accessed
by tools and viewed by software engineers, how well data security and integrity can be
maintained, and how easily the existing model can be extended to accommodate new needs.

A : Data model

B : Meta model

C : Configuration model

D : Test model

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 108/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 54. When a cost to remove defect is not high?

A : During requirement analysis

B : During designing

C : During coding

D : During testing

Q.no 55. The ability to identify which requirement generated any given work product is known
as

A : forward tracing

B : backward tracing

C : Dependency tracking

D : Change management

Q.no 56. Which of the following is not a design principle that allow the user to maintain control?

A : Provide for flexible interaction

B : Allow user interaction to be interrupt-able and undo-able

C : Show technical internals from the casual user

D : Design for direct interaction with objects that appear on the screen

Q.no 57. Which is not a type of incremental testing approach?

A : Bottom up

B : Top down

C : Big-bang

D : Functional incrimination

Q.no 58. Three factors that affect the consequences that are likely to happen if a risk does occur:

A : its nature,
its scope, and its intensity.

B : its nature,
its scope, and its timing.

C : its nature,
its scope, and its durability.

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 109/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

D : its nature,
its limit, and its timing.

Q.no 59. A __________ executes the loop task first, then tests a condition and repeats the task
until the condition fails.

A : repeat until

B : condition

C : do while tests

D : if then-else

Q.no 60. Which one of these belongs to integration testing in the OO context?

A : Unit testing

B : Regression testing

C : Sandwich testing

D : Thread-based testing

Q.no 1. A program with high cyclometic complexity is likely to be:

A : Large

B : Small

C : Difficult to write

D : Difficult to test

Q.no 2. End result of Software Requirement Analysis is ________.

A : Functional and Behavioral

B : Architectural and Structural

C : Usability and Reliability

D : Algorithmic and Data Structure

Q.no 3. Consider the following requirement for a word processor software: " The software
should provide facility to import an existing image available as a jpeg file into the document
being created.". Which one of the following types of requirements is this?

A : Functional requirement

B : Non-functional requirement

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 110/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : Constraint on the implementation

D : Goal of implementation

Q.no 4. Which of these truly defines Software design?

A : Software design is an activity subjected to constraints

B : Software Design specifies nature and composition of software product

C : Software Design satisfies client needs and desires

D : Software design is an activity subjected to constraints specifies nature and composition of software
product which satisfies client needs and desires

Q.no 5. The Selenium

A : provides professional computer support

B : tests reports are generated automatically

C : comes with a built in object repository

D : Cannot access elements outside of the web application under test

Q.no 6. Which one of the following views is implicit in an SRS document?

A : Black box

B : White box

C : Grey box

D : Glass box

Q.no 7. Unit testing is done by:

A : Users

B : Developers

C : Customers

D : None of the mentioned

Q.no 8. What does “Every software system has an architecture” implies?

A : Architecture an exist independently of its description or specification

B : All the system to be stable should posses an architecture

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 111/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : System itself is a component

D : Component itself is a system and hence architecture

Q.no 9. Which of the following are correct statements?

A : An architecture is foremost an abstraction of a system that suppresses details of the components


that do not affect how they are used

B : An architecture is not dependable on requirements

C : An architecture may or may not defines components

D : An architecture is foremost an abstraction of a system that suppresses details of the components


that always affect how they are used

Q.no 10. The Actions Commands

A : are commands that directly interact with page elements

B : are commands that allow you to store values to a variable

C : are commands that verify if a certain condition is met

D:0

Q.no 11. Which design model is equivallent to set of detailed drawing for each room of a building

A : Architectural Design

B : Component level design

C : Data design

D : Interface design

Q.no 12. Acceptance testing is also known as

A : Grey box testing

B : White box testing

C : Alpha Testing

D : Beta testing

Q.no 13. What is architectural style?

A : Architectural style is a description of component types

B : It is a pattern of run-time control

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 112/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : Architectural style is a description of component types and a pattern of run-time control with a set
of constraints on architecture

D : It is a set of constraints on architecture

Q.no 14. Who performs the Acceptance Testing?

A : Software Developer

B : End users

C : Testing team

D : Systems engineers

Q.no 15. Which one of the following is not a step of requirement engineering?

A : elicitation

B : design

C : analysis

D : documentation

Q.no 16. Which lines depict that architecture defines constraints on an implementation?

A : An implementation exhibits an architecture if it conforms to the structural decisions described by


the architecture

B : The implementation need not be divided into prescribed components

C : An implementation exhibits an architecture if it conforms to the structural decisions described by


the architecture and the implementation must be divided into prescribed components

D : An implementation exhibits an architecture if it conforms to the structural decisions described by


the architecture whereas implementation need not be divided into prescribed components

Q.no 17. Coupling is a qualitative indication of the degree to which a module

A : can be written more compactly

B : focuses on just one thing

C : is able to complete its function in a timely manner

D : is connected to other modules and the outside world

Q.no 18. Which Testing is performed first?

A : Black box testing

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 113/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

B : White box testing

C : Dynamic testing

D : Static testing

Q.no 19. Which component of Selenium can create customized test results ?

A : Web Driver

B : Selenium RC

C : Selenium IDE

D : Selenium Grid

Q.no 20. In Design phase, which is the primary area of concern ?

A : Architecture

B : Data

C : Interface

D : All of the mentioned

Q.no 21. Select the operating system which is not supported by Selenium IDE

A : Unix

B : Linux

C : Windows

D : Solaries

Q.no 22. Select the tab which gives feedback and other useful information when executing tests

A : Information

B : Feddback

C : Reference

D : Element

Q.no 23. Which command can be used to enter values onto text boxes ?

A : sendsKey()

B : sendKey()
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 114/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : sendKeys

D : sendKeys()

Q.no 24. Software risk always involves two characteristics. What are those characteristics?

A : Uncertainity & loss

B : Certainity & Profit

C : Staff size and budget

D : Project Deadline and budget

Q.no 25. Project risk factor is considered in which model?

A : Spiral model.

B : Waterfall model.

C : Prototyping model

D : Incremental Model.

Q.no 26. What combines procedures and tools to manage different versions of configuration
objects that are created during the software process?

A : Versioning

B : Audit trails

C : Change control

D : SCI

Q.no 27. Who leads a formal review process?

A : Author

B : Moderator

C : Reviewer

D : Scribe

Q.no 28. Test wares are handed over to maintenance team during which phase?

A : Test implementation and execution

B : Test closure activity

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 115/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : Evaluating exit criteria and reporting

D : Test analysis and design

Q.no 29. Which architectural style goal is to achieve Portability?

A : Data Flow Architecture

B : Call and Return Architecture

C : Data Centered Architectures

D : Virtual Machine Architecture

Q.no 30. which of the following is the highest level in the reverse engineering process

A : testing level

B : abstraction level

C : design level

D : maintainence level

Q.no 31. The nature of Software Application can be characterized by their information

A : Determinacy

B : Content

C : Complexity

D : Both OPTION 2 and OPTION 3

Q.no 32. What is the major improvement in SVN

A : it allows to rollback of commit

B : addition of atomic commits

C : supported everywhere

D : each file is processed independently

Q.no 33. Which of the following truly describes Bridges?

A : Encapsulation whereby some components is encased within an alternative abstraction

B : Translation between assumptions of an arbitrary component to some provides assumptions of some


other arbitrary components

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 116/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : Incorporation of planning function that in effect results in runtime determination of the translation

D : Repair those cases you have detected by adapting the components

Q.no 34. A set of tools that automate the construction of software by ensuring that the proper set
of validated components have been assembled are known as

A : component element

B : process element

C : construction element

D : human elements

Q.no 35. Architectural styles is composed of which of the following?

A : A set of component types that perform some function at run-time

B : A topological layout of these components indicating their run-time inter relationships

C : Coupling among the client will lessen the effect of data center architecture

D : A set of semantic constraints

Q.no 36. A software reengineeering process model consists of:

A : code restructuring

B : back engineering

C : document engineerinhg

D : implementation engineering

Q.no 37. Which of the following statement is true?

A : Exhaustive testing is impossible but practicable

B : Exhaustive testing is possible but impracticable

C : Exhaustive testing is impossible and impracticable

D : Exhaustive testing is possible and practicable

Q.no 38. Regression testing is a major part of which of the life cycle?

A : Waterfall model

B : V model

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 117/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : Iterative model

D : Agile model

Q.no 39. ________is not a Software Test Life Cycle Phase?

A : Requirements Gathering

B : Test Planning

C : Test Closure

D : Test Design

Q.no 40. Which of the following testing method is normally used as acceptance test for a software
system?

A : Regression testing

B : Integration testing

C : Unit testing

D : Functional testing

Q.no 41. Which of the following items would not come under Configuration Management?

A : Operating systems

B : Live data

C : Test documentation

D : User requirement documents

Q.no 42. which of the following risk is a potential threat to every software project

A : generic risk

B : project risk

C : product risk

D : business risk

Q.no 43. Version control is not capable of doing

A : enables any version to be constructed using differences from past versions

B : a make facility that enables you to collect all relevant configuration objects and construct a specific
version of the software.

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 118/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : If the central database is corrupted, the entire history remains safe and secured

D : a project database repository that stores all relevant configuration objects

Q.no 44. A set of tools coupled within a file management system that enables access to and
management of each software configuration item is known as

A : component element

B : process element

C : construction element

D : human elements

Q.no 45. RE is the overall risk exposure and is written as:

A:PxC

B:PxM

C:MxC

D:PxS

Q.no 46. Beta Testing is done at:

A : Developer’s end

B : User’s end

C : User’s & Developer’s end

D : None of the mentioned

Q.no 47. Which of the following is not a Software Configuration Management Activity?

A : Configuration item identification

B : Risk management

C : Release management

D : Branch management

Q.no 48. which of the following is not a software risk

A : product risk

B : project risk

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 119/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : business risk

D : management rsik

Q.no 49. In a simple risk table the risks are categorized into

A : PS, BU , CU

B : TU ,DE ,ST

C : BE ,CU ,ST

D : SU , TE ,CU ,PS

Q.no 50. Which of the following is not the integration strategy?

A : Big-bang

B : Bottom-up

C : Design based

D : Top-down

Q.no 51. The __________ enables the software engineer to develop models of the information
domain and functional domain at the same time

A : Data flow diagram

B : State transition diagram

C : Control specification

D : Activity diagram

Q.no 52. Risk mitigation is a risk ___________activity. Risk monitoring is a ___________ activity

A : Avoidance, Project tracking.

B : Increasing, Project tracking.

C : Project tracking, Avoidance.

D : Random, Tracking.

Q.no 53. Which of the following type of maintenance takes the maximum chunk of the total
maintenance effort in a typical life cycle of a software product ?

A : Adaptive maintenance

B : Corrective maintenance

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 120/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : Preventive maintenance

D : Perfective maintenance

Q.no 54. Which of the following is not needed to develop a system design from concept to detailed
object-oriented design?

A : Designing system architecture

B : Developing design models

C : Specifying interfaces

D : Developing a debugging system

Q.no 55. which of the following impact of the risk drivers on risk components is also called as
disastrous impact

A : critical impact

B : catastrophic impact

C : marginal impact

D : Destructive impact

Q.no 56. A _________ is a graphical representation that depicts information flow and the
transforms that are applied as data moves from input to output.

A : Data flow diagram

B : State transition diagram

C : Control specification

D : Activity diagram

Q.no 57. Which of the following is the component test standard?

A : BS7925-2

B : IEEE 829

C : BS7925-1

D : IEEE 610

Q.no 58. The __________ contains a state transition diagram that is a sequential specification of
behavior.

A : Data flow diagram

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 121/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

B : State transition diagram

C : Control specification

D : Activity diagram

Q.no 59. when SCM is a formal activity the software configuration audit is conducted by

A : testing specialists

B : development team

C : senior managers

D : quality assurance group

Q.no 60. A chronological record of relevant details about the execution of tests is called as, a
_______

A : Test suite

B : Test procedure

C : Test data

D : Test log

Q.no 1. What is incorrect about structural design?

A : Structural design introduced notations and heuristics

B : Structural design emphasis on procedural decomposition

C : The advantage is data flow representation

D : It follows Structure chart

Q.no 2. Error guessing is a:

A : Test verification techniques

B : Test data management techniques

C : Test control management techniques

D : Test execution techniques

Q.no 3. When testing principles are useful?

A : During testing

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 122/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

B : During execution

C : During review

D : Throughout life-cycle

Q.no 4. First graphical user interface used commercially was introduced in

A : 1975

B : 1966

C : 1977

D : 1967

Q.no 5. Unit testing is carried out during which phase of the waterfall model?

A : Implementation phase

B : Testing phase

C : Maintenance phase

D : Design phase

Q.no 6. Which one of the following is a functional requirement ?

A : Maintainability

B : Portability

C : Robustness

D : None of the mentioned

Q.no 7. White-box testing can be started:

A : After installation

B : After SRS creation

C : After programming

D : After designing

Q.no 8. Which design model is equivallent to the detailed drawing of accesspoints and external
utilities of a building

A : Architectural Design

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 123/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

B : Component level design

C : Data design

D : Interface design

Q.no 9. Select the method which clears all selected entries in Web Driver Selenium

A : dselectAll()

B : deselect_Al()

C : dselect_Al()

D : deselectAll()

Q.no 10. RE represents what

A : Risk expense

B : Related expense

C : Risk exposure

D : Risk evaluation

Q.no 11. Which one of the following problems in the gathered requirements is not the focus of the
requirements analysis task?

A : Inconsistency

B : Ambiguity

C : Incompleteness

D : Unstructuredness

Q.no 12. What is TestNG ?

A : TestNextGeneration

B : TestNewGenerlization

C : TestNewGeneration

D : TestNextGenerations

Q.no 13. When users are involved in complex tasks, the demand on __________ can be significant

A : short-term memory

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 124/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

B : shortcuts

C : objects that appear on the screen

D : all of the mentioned

Q.no 14. Select the tab that shows which command Selenium IDE is currently executing

A : Variable

B : Data

C : Information

D : Info

Q.no 15. Which Selenium Component Supports all operating systems

A : Selenium Generator

B : Selenium IDE

C : Selenium WebDriver

D:0

Q.no 16. Design phase will usually be.

A : Top down

B : Bottom up

C : Randon

D : iterative

Q.no 17. Alpha testing is:

A : Post-release testing by end user representatives at the developer’s site

B : The first testing that is performed

C : Pre-release testing by end user representatives at their sites

D : Pre-release testing by end user representatives at the developer’s site

Q.no 18. Cohesion is a qualitative indication of the degree to which a module

A : can be written more compactly

B : focuses on just one thing


https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 125/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : is able to complete its function in a timely manner

D : is connected to other modules and the outside world

Q.no 19. Which one of the following may be experienced by a software development team when it
adopts a systematic development process model in preference to a build-and-fix style of
development?

A : Increased documentation overhead

B : Increased development cost

C : Decreased maintainability

D : Increased development time

Q.no 20. The risks that are analyzed and managed should be derived from thorough study of

A : people,
product, process, and project.

B : people,
product, process, and management.

C : people,
product, process, and feedback.

D : people,
product, process, and environment.

Q.no 21. Select the command which is used to pause execution until the page is loaded completely

A : waitForPageToLoad

B : waitForElementPresent

C : waitForPage

D : waitForLoad

Q.no 22. which of the followingis not a configuration object

A : Design specification

B : Test specification

C : source code

D : configuration control

Q.no 23. Selenium IDE stands for

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 126/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : Selenium Initialization Development Environment

B : Selenium Interrelated Development Environment

C : Selenium Integrated Development Environment

D : Selenium Information Development Environment

Q.no 24. Which is not the other name for structural testing?

A : Behavioral testing

B : Glass box testing

C : White box testing

D : None of the above

Q.no 25. In order to control cost, defects should ideally be detected in which phase:

A : Coding

B : Design

C : Implementation

D : Requirements Gathering

Q.no 26. The technique applied for usability testing is:

A : White box

B : Grey box

C : Black box

D : Combination of all

Q.no 27. ______provide the mechanisms for assembling SCIs into a version-specific
configuration.

A : Repository

B : versioning

C : modeling

D : assembling

Q.no 28. Which architectural style goal is to achieve Modifiability with Scalability?

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 127/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : Data Flow Architecture

B : Call and Return Architecture

C : Data Centered Architectures

D : Virtual Machine Architecture

Q.no 29. What allows different projects to use the same source files at the same time?

A : Version Control

B : Access control

C : CM Process

D : Version Control and Access control

Q.no 30. Which of the following is not a software testing generic characteristics?

A : Different testing techniques are appropriate at different points in time

B : Testing is conducted by the developer of the software or an independent test group

C : Testing and debugging are different activities, but debugging must be accommodated in any testing
strategy

D : None of the mentioned

Q.no 31. Static analysis can be best described as:

A : The reviewing of test plans

B : The analysis of batch programs

C : The use of black box testing

D : The analysis of program code

Q.no 32. Which of the following truly describes Wrappers?

A : Encapsulation whereby some components is encased within an alternative abstraction

B : Translation between assumptions of an arbitrary component to some provides assumptions of some


other arbitrary components

C : cIncorporation of planning function that in effect results in runtime determination of the translation

D : Repair those cases you have detected by adapting the components

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 128/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 33. The modification of the software to match changes in the ever changing environment,
falls under which category of software maintenance?

A : Adaptive

B : Corrective

C : perfective

D : preventive

Q.no 34. After occurence of the risk ,the developement team members do some rapid actions to
overcome the problem called as

A : reactive risk mode

B : proactive risk mode

C : fire fighting mode

D : quick rectification mode

Q.no 35. What are the criteria to decide the testing efforts?1. Time and budget
2. Size of development team
3. Size of testers
4. Risk associated with project

A : a. 1, 3, 4

B : b. 1, 2, 3

C : c. 1, 4

D : d. 1, 3

Q.no 36. Software tester focuses more on complex part of the software. Which of the following
testing principle implies this?

A : Testing shows presence of defects

B : Pesticide paradox

C : Testing is context dependent

D : Defect Clustering

Q.no 37. Maintenance testing is performed using which methodology?

A : Retesting

B : Sanity testing

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 129/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : Breadth test and depth test

D : Confirmation testing

Q.no 38. E-Commerce software testing follows different approach than gaming software testing.
Which testing principle implies this?

A : Pareto principle

B : Testing is Context dependent

C : Testing shows presence of defects

D : Absence of errors-fallacy

Q.no 39. Bug status is set to postpone due to ________.

A : Priority of that bug may low.

B : Lack of time for the release.

C : The bug may not be the major effect in the software.

D : Data may be unavailable.

Q.no 40. Systems that involve interaction with a shared database can be considered as.

A : software-based

B : transaction-based

C : server-based

D : client-based

Q.no 41. Software testing are most effective if applied immediately after

A : Requirement Specification

B : Design

C : Coding

D : Integration

Q.no 42. Which of the following is not an issue to consider when reverse engineering?

A : directionality

B : connectivity

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 130/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : completeness

D : abstraction level

Q.no 43. Which of the following truly describes Mediators?

A : Encapsulation whereby some components is encased within an alternative abstraction

B : Translation between assumptions of an arbitrary component to some provides assumptions of some


other arbitrary components

C : Incorporation of planning function that in effect results in runtime determination of the translation

D : Repair those cases you have detected by adapting the components

Q.no 44. Which of the following is not a Test Type?

A : Database Testing

B : Security Testing

C : Statement Testing

D : Functional Testing

Q.no 45. Which of the following is not a module type

A : Object modules

B : Hardware modules

C : Functional modules

D : Process support modules

Q.no 46. Which of the following is/are commonly used architectural pattern(s)?

A : Model-View-Controller

B : Layered Architecture

C : Client–server

D : MVC, Layered Architecture and Client–server

Q.no 47. Which is not a SQA activity?

A : Black box testing

B : White box testing

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 131/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : Integration testing

D : Unit testing

Q.no 48. What can static analysis NOT find?

A : Memory leaks

B : Unreachable (“dead”) code

C : The use of a variable before it has been defined

D : Array bound violations

Q.no 49. Which of the following is not real-time architectural patterns that are commonly used?

A : Asynchronous communication

B : Observe and React

C : Environmental Control

D : Process Pipeline

Q.no 50. ETL stands for

A : Data Extraction Transformation & Loading

B : Data Execution Transformation & Loading

C : Extraction Transformation & Loading

D : Execution Transformation & Loading

Q.no 51. Which model describes the static structure of the system using object classes and their
relationships?

A : Structural model

B : Dynamic model

C : Subsystem model

D : Sequence model

Q.no 52. What combines the outward manifestation of the computer-based system , coupled with
all supporting information that describe system syntax and semantics?

A : design model

B : user’s model

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 132/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : mental image

D : system image

Q.no 53. When a cost to remove defect is not high?

A : During requirement analysis

B : During designing

C : During coding

D : During testing

Q.no 54. What determines how information is stored in the repository, how data can be accessed
by tools and viewed by software engineers, how well data security and integrity can be
maintained, and how easily the existing model can be extended to accommodate new needs.

A : Data model

B : Meta model

C : Configuration model

D : Test model

Q.no 55. The main focus of ______ is to reduce defects and variations in the processes.

A : QA

B : QC

C : Six Sigma

D : tracking

Q.no 56. The ability to identify which requirement generated any given work product is known
as

A : forward tracing

B : backward tracing

C : Dependency tracking

D : Change management

Q.no 57. Which is not a type of incremental testing approach?

A : Bottom up

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 133/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

B : Top down

C : Big-bang

D : Functional incrimination

Q.no 58. The order in which test levels are performed is:

A : Unit, Integration, Acceptance, System

B : Unit, System, Integration, Acceptance

C : Unit, Integration, System, Acceptance

D : It depends on the nature of a project

Q.no 59. Which of the following is likely to benefit most from the use of test tools providing test
capture and replay facilities?

A : Integration testing

B : Regression testing

C : System testing

D : User acceptance testing

Q.no 60. A product is re-engineered when

A : system crashes frequently

B : tools to support restructuring are disabled

C : hardware or software support becomes obsolete

D : subsystems of a larger system require few maintenance

Q.no 1. Test cases are designed during which of the following stages?

A : Test recording

B : Test configuration

C : Test planning

D : Test specification

Q.no 2. Software Design consists of _____________

A : Software Product Design

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 134/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

B : Software Engineering Design

C : Software Product & Engineering Design

D : Only Software testing

Q.no 3. Which one of the following phases accounts for the maximum effort during development
of a typical software?

A : Coding

B : Testing

C : Designing

D : Specification

Q.no 4. When a company plans to develop a generic product, who among the following is usually
the source of the requirements?

A : Development team members

B : Project manager

C : Marketing personnel

D : Personnel from finance department

Q.no 5. Which of these are characteristics of a good design?

A : Exhibits strong coupling among between modules

B : Implements all requirements in the analysis model

C : Includes test cases for all components

D : Implements all requirements in the analysis model and provide a complete picture of the software

Q.no 6. Select the tab which gives feedback and other useful information when executing tests

A : Information

B : Feddback

C : Reference

D : Element

Q.no 7. Verification is the responsibility of

A : Developer

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 135/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

B : Designer

C : Tester

D : QA Team

Q.no 8. Who performs the Acceptance Testing?

A : Software Developer

B : End users

C : Testing team

D : Systems engineers

Q.no 9. Exhaustive testing is:

A : always possible

B : impractical but possible

C : practically possible

D : impractical and impossible

Q.no 10. Java packages and Fortran subroutine are examples of__________

A : Functions

B : Modules

C : Classes

D : Sub procedures

Q.no 11. Consider the following partial requirement for a software: “A web browser should be
used as the front end.” It can be considered to be which one of the following types of
requirements?

A : Functional requirement

B : Non-functional requirement

C : Design constraint

D : External interface

Q.no 12. Select the name which is not the type of locators

A : ID

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 136/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

B : Name

C : Password

D : Link Text

Q.no 13. Which of the following is not a design principle that allows the user to maintain control?

A : Provide for flexible interaction

B : Allow user interaction to be interrupt-able and undo-able

C : Show technical internals from the casual user

D : Design for direct interaction with objects that appear on the screen

Q.no 14. Which of the following is not a white box technique?

A : State transition testing

B : Path testing

C : Statement testing

D : Data flow testing

Q.no 15. Which of the following is a static test?

A : Coverage analysis

B : Code inspection

C : Usability assessment

D : Installation test

Q.no 16. What type of abstraction used in Software design

A : Control, data, environmental

B : Data, environmental, procedural

C : Control, data, procedural

D : Control, Environmental, procedural

Q.no 17. Exhaustive testing is

A : always possible

B : practically possible
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 137/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : impractical but possible

D : impractical and impossible

Q.no 18. Verification and Validation uses __________.

A : Internal and External resources respectively.

B : Internal resources only.

C : External resources only.

D : External and Internal resources respectively.

Q.no 19. Which of the following is the best type of module coupling?

A : Control Coupling

B : Stamp Coupling

C : Data Coupling

D : Content Coupling

Q.no 20. Select the command in SeleniumIDE used to open a web page using theURL

A : OpenRecord

B : Open

C : OpenText

D : OpenTable

Q.no 21. A ________ view shows the system hardware and how software components are
distributed across the processors in the system.

A : physical

B : logical

C : process

D: all of the mentioned

Q.no 22. Which one of the following is not a standard software development process model?

A : Waterfall Model

B : Recursive Model

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 138/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : RAD Model

D : V Model

Q.no 23. The implementation phase of the waterfall model is a synonym for which one of the
following phases?

A : Coding and unit testing phase

B : Integration and system testing phase

C : Maintenance phase

D : Design phase

Q.no 24. CTC stands for

A : condition-transaction-consequence

B : condition-transfer-consequence

C : condition-transition-consequence

D : condition-transmission-consequence

Q.no 25. Which one of the following is a requirement that fits in a developer’s module ?

A : Availability

B : Testability

C : Usability

D : Flexibility

Q.no 26. A software reengineeering process model consists of:

A : code restructuring

B : back engineering

C : document engineerinhg

D : implementation engineering

Q.no 27. What combines procedures and tools to manage different versions of configuration
objects that are created during the software process?

A : Versioning

B : Audit trails

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 139/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : Change control

D : SCI

Q.no 28. Which architectural style goal is to achieve Modifiability with Reuse?

A : Data Flow Architecture

B : Call and Return Architecture

C : Data Centered Architectures

D : Virtual Machine Architecture

Q.no 29. Which of the following testing method is normally used as acceptance test for a software
system?

A : Regression testing

B : Integration testing

C : Unit testing

D : Functional testing

Q.no 30. What describes how a set of interacting components can share data?

A : model-view-controller

B : repository pattern

C : architecture

D : different operating system

Q.no 31. Which of the following is NOT a reasonable test objective:

A : To find faults in the software

B : To give confidence in the software

C : To prove that the software has no faults

D : To find performance problems

Q.no 32. Which architectural style goal is to achieve Integrability?

A : Data Flow Architecture

B : Call and Return Architecture

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 140/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : Data Centered Architectures

D : Virtual Machine Architecture

Q.no 33. ________is not a Software Test Life Cycle Phase?

A : Requirements Gathering

B : Test Planning

C : Test Closure

D : Test Design

Q.no 34. Which of the following is not a state of a defect in defect life cycle:

A : Verified

B : New

C : Critical

D : Deferred

Q.no 35. Which of the following statement is true?

A : Exhaustive testing is impossible but practicable

B : Exhaustive testing is possible but impracticable

C : Exhaustive testing is impossible and impracticable

D : Exhaustive testing is possible and practicable

Q.no 36. RE is the overall risk exposure and is written as:

A:PxC

B:PxM

C:MxC

D:PxS

Q.no 37. Which of the following pattern is the basis of interaction management in many web-
based systems?

A : model-view-controller

B : repository pattern

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 141/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : architecture

D : different operating system

Q.no 38. which of the following is the highest level in the reverse engineering process

A : testing level

B : abstraction level

C : design level

D : maintainence level

Q.no 39. What effect does achievement of quality attribute will have?

A : The achievement of quality attribute will always have a positive effect

B : The achievement of quality attribute will always have a negative effect

C : The achievement of quality attribute will have no effect

D : The achievement of quality attribute will have a positive as well as negative effect

Q.no 40. What is Fault Masking?

A : Creating a test case which does not reveal a fault

B : Error condition hiding another error condition

C : Masking a fault by developer

D : Masking a fault by a tester

Q.no 41. Beta Testing is done at:

A : Developer’s end

B : User’s end

C : User’s & Developer’s end

D : None of the mentioned

Q.no 42. Webapp configuration object can be managed in much the same way as conventional
software configuration objects except for

A : content items

B : graphic items

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 142/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : functional items

D : user items

Q.no 43. What is “V” Model?

A : Test Design Technique

B : Test Type

C : SDLC Model

D : Test Level

Q.no 44. Which architectural style goal is to achieve Portability?

A : Data Flow Architecture

B : Call and Return Architecture

C : Data Centered Architectures

D : Virtual Machine Architecture

Q.no 45. Requirement Engineering is not concern with ____________.

A : Requirement Design

B : Requirement Elicitation

C : Requirement Analysis

D : Requirement Documentation

Q.no 46. Who leads a formal review process?

A : Author

B : Moderator

C : Reviewer

D : Scribe

Q.no 47. The defect cluster change over time. Which of the following testing principle implies
this?

A : Testing shows presence of defects

B : Pesticide paradox

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 143/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : Testing is context dependent

D : Defect Clustering

Q.no 48. Three statements are given below regarding the User Interface Design: 1) Place the user
in Control. 2) Reduce user's memory load. 3) Make the interface consistent. These rules are
called as __________.

A : Governed Rule

B : Golden Rule

C : User Rule

D : Thumb Rule

Q.no 49. Which of the following items would not come under Configuration Management?

A : Operating systems

B : Live data

C : Test documentation

D : User requirement documents

Q.no 50. Which of the following is not the integration strategy?

A : Big-bang

B : Bottom-up

C : Design based

D : Top-down

Q.no 51. The __________ enables the software engineer to develop models of the information
domain and functional domain at the same time

A : Data flow diagram

B : State transition diagram

C : Control specification

D : Activity diagram

Q.no 52. when SCM is a formal activity the software configuration audit is conducted by

A : testing specialists

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 144/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

B : development team

C : senior managers

D : quality assurance group

Q.no 53. Which model shows the flow of object interactions?

A : Structural model

B : Dynamic model

C : Subsystem model

D : Sequence model

Q.no 54. What mechanism is used to apprise others of changes that are made?

A : Configuration management

B : Requirementss tracing

C : Reporting

D : Change control

Q.no 55. Which of the following is not a design principle that allow the user to maintain control?

A : Provide for flexible interaction

B : Allow user interaction to be interrupt-able and undo-able

C : Show technical internals from the casual user

D : Design for direct interaction with objects that appear on the screen

Q.no 56. Which one of these belongs to integration testing in the OO context?

A : Unit testing

B : Regression testing

C : Sandwich testing

D : Thread-based testing

Q.no 57. which control helps to ensure that parallel changes, performed by two different people,
don’t overwrite one another.

A : version control

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 145/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

B : synchronization control

C : access control

D : configuration control

Q.no 58. A chronological record of relevant details about the execution of tests is called as, a
_______

A : Test suite

B : Test procedure

C : Test data

D : Test log

Q.no 59. Which of the following is the component test standard?

A : BS7925-2

B : IEEE 829

C : BS7925-1

D : IEEE 610

Q.no 60. Which of the following is not needed to develop a system design from concept to detailed
object-oriented design?

A : Designing system architecture

B : Developing design models

C : Specifying interfaces

D : Developing a debugging system

Q.no 1. Consider a system where, a heat sensor detects an intrusion and alerts the security
company.” What kind of a requirement the system is providing?

A : Functional

B : Non-Functional

C : Known Requirement

D : None of the mentioned

Q.no 2. In case of Selenium IDE, the source view shows your script in

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 146/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : DHTML format

B : XML format

C : j2EE format

D : HTML format

Q.no 3. Which of these does not represent object oriented design?

A : Programs are thought of collection of objects

B : It follows regular procedural decomposition in favor of class and object decomposition

C : Central model represents class diagrams that show the classes comprising a program and their
relationships to one another

D : Object-oriented methods incorporates Structural methods

Q.no 4. Select the command which retrieves the alert message and stores it in a variable that you
will specify

A : storeAlert

B : storedAlert

C : store_Alert

D : storesAlert

Q.no 5. In software development life cycle , who is the best person to catch a defect?

A : Software Tester

B : Customers

C : Designer

D : Business Analyst

Q.no 6. Choose the incorrect statement with respect to Non-Functional Requirement(NFR)

A : Product-oriented Approach – Focus on system (or software) quality

B : Process-oriented Approach – Focus on how NFRs can be used in the design process

C : Quantitative Approach – Find measurable scales for the functionality attributes

D : Qualitative Approach – Study various relationships between quality goals

Q.no 7. A software process model represents which one of the following?

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 147/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : The way in which software is developed

B : The way in which software processes data

C : The way in which software is used

D : The way in which software may fail

Q.no 8. Which one of the following is not a step of requirement engineering?

A : elicitation

B : design

C : analysis

D : documentation

Q.no 9. Which one is the basic input device in GUI

A : Mouse

B : keyboard

C : cpu

D : monitor

Q.no 10. The Selenium RC is used

A : To run your test against different browers on different opearting systems

B : To create test with little or no prior knowledge in programming

C : To test a web application against firefox only

D : To run a huge test suite, that can be executed on multiple machines

Q.no 11. Which Testing is performed first?

A : Black box testing

B : White box testing

C : Dynamic testing

D : Static testing

Q.no 12. What incorporates data, architectural, interface, and procedural representations of the
software?

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 148/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : design model

B : user’s model

C : mental image

D : system image

Q.no 13. Members of a Scrum team are not expected to answer which one of the following
questions during a daily Scrum meeting?

A : It is the fundamental process flow of Scrum

B : It is month-long iteration, during which incremental product functionality completed

C : During a Sprint, customer feedback is continually obtained and the Sprint backlog is accordingly
modified

D : Each day begins with a daily Scrum meeting

Q.no 14. SCM stands for

A : Software Control Management

B : Software Configuration Management

C : Software Concept Management

D : Software Course Management

Q.no 15. Select the component which is not a type of assertion in Selenium IDE

A : Assert

B : Verify

C : WaitFor

D : Wait

Q.no 16. Which Selenium Component Supports all operating systems

A : Selenium Generator

B : Selenium IDE

C : Selenium WebDriver

D:0

Q.no 17. Testing done without planning and Documentation is called

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 149/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : Unit testing

B : Regression testing

C : Adhoc testing

D : None of the mentioned

Q.no 18. Alpha testing is:

A : Post-release testing by end user representatives at the developer’s site

B : The first testing that is performed

C : Pre-release testing by end user representatives at their sites

D : Pre-release testing by end user representatives at the developer’s site

Q.no 19. which of the following is not a component of risk

A : Quality risk

B : Performance risk

C : Cost risk

D : Support risk

Q.no 20. The importance of software design can be summarized in a single word which is:

A : Efficiency

B : Accuracy

C : Quality

D : Complexity

Q.no 21. The Web Driver is used

A : To execute tests on the HTML Unit browser

B : To design a test Using Selenese

C : To quickly create tests

D : To test a web application against Firefox only

Q.no 22. End result of Software Requirement Analysis is ________.

A : Functional and Behavioral


https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 150/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

B : Architectural and Structural

C : Usability and Reliability

D : Algorithmic and Data Structure

Q.no 23. Select the command which is used to compare the actual page title with an expected
value

A : verifyTitle

B : verifiedTitle

C : verifyTitles

D : verifiedTitles

Q.no 24. Select the method which performs a context-click at the curent mouse location

A : click_Context()

B : context.Click()

C : contextClick()

D : context_Click()

Q.no 25. Method which selects the option which displays the text matching the parameter passed
to it

A : selectVisibleText()

B : selectByVisibleText()

C : select_VisibleText()

D : select_ByVisibleText()

Q.no 26. After occurence of the risk ,the developement team members do some rapid actions to
overcome the problem called as

A : reactive risk mode

B : proactive risk mode

C : fire fighting mode

D : quick rectification mode

Q.no 27. A set of tools coupled within a file management system that enables access to and
management of each software configuration item is known as

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 151/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : component element

B : process element

C : construction element

D : human elements

Q.no 28. The modification of the software to match changes in the ever changing environment,
falls under which category of software maintenance?

A : Adaptive

B : Corrective

C : perfective

D : preventive

Q.no 29. Which of the following is not real-time architectural patterns that are commonly used?

A : Asynchronous communication

B : Observe and React

C : Environmental Control

D : Process Pipeline

Q.no 30. Which of the following is not a Software Configuration Management Activity?

A : Configuration item identification

B : Risk management

C : Release management

D : Branch management

Q.no 31. Which of the following is not a module type

A : Object modules

B : Hardware modules

C : Functional modules

D : Process support modules

Q.no 32. Which of the following is not an issue to consider when reverse engineering?

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 152/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : directionality

B : connectivity

C : completeness

D : abstraction level

Q.no 33. Maintenance testing is performed using which methodology?

A : Retesting

B : Sanity testing

C : Breadth test and depth test

D : Confirmation testing

Q.no 34. Static analysis can be best described as:

A : The reviewing of test plans

B : The analysis of batch programs

C : The use of black box testing

D : The analysis of program code

Q.no 35. which of the following is not a software risk

A : product risk

B : project risk

C : business risk

D : management rsik

Q.no 36. Which of the following truly describes Wrappers?

A : Encapsulation whereby some components is encased within an alternative abstraction

B : Translation between assumptions of an arbitrary component to some provides assumptions of some


other arbitrary components

C : cIncorporation of planning function that in effect results in runtime determination of the translation

D : Repair those cases you have detected by adapting the components

Q.no 37. Which of the following is/are commonly used architectural pattern(s)?

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 153/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : Model-View-Controller

B : Layered Architecture

C : Client–server

D : MVC, Layered Architecture and Client–server

Q.no 38. Version control is not capable of doing

A : enables any version to be constructed using differences from past versions

B : a make facility that enables you to collect all relevant configuration objects and construct a specific
version of the software.

C : If the central database is corrupted, the entire history remains safe and secured

D : a project database repository that stores all relevant configuration objects

Q.no 39. What are the criteria to decide the testing efforts?1. Time and budget
2. Size of development team
3. Size of testers
4. Risk associated with project

A : a. 1, 3, 4

B : b. 1, 2, 3

C : c. 1, 4

D : d. 1, 3

Q.no 40. E-Commerce software testing follows different approach than gaming software testing.
Which testing principle implies this?

A : Pareto principle

B : Testing is Context dependent

C : Testing shows presence of defects

D : Absence of errors-fallacy

Q.no 41. Which of the following truly describes Mediators?

A : Encapsulation whereby some components is encased within an alternative abstraction

B : Translation between assumptions of an arbitrary component to some provides assumptions of some


other arbitrary components

C : Incorporation of planning function that in effect results in runtime determination of the translation

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 154/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

D : Repair those cases you have detected by adapting the components

Q.no 42. Which is not a SQA activity?

A : Black box testing

B : White box testing

C : Integration testing

D : Unit testing

Q.no 43. Which architectural style goal is to achieve Modifiability with Scalability?

A : Data Flow Architecture

B : Call and Return Architecture

C : Data Centered Architectures

D : Virtual Machine Architecture

Q.no 44. In a simple risk table the risks are categorized into

A : PS, BU , CU

B : TU ,DE ,ST

C : BE ,CU ,ST

D : SU , TE ,CU ,PS

Q.no 45. Bug status is set to postpone due to ________.

A : Priority of that bug may low.

B : Lack of time for the release.

C : The bug may not be the major effect in the software.

D : Data may be unavailable.

Q.no 46. Which of the following truly describes Bridges?

A : Encapsulation whereby some components is encased within an alternative abstraction

B : Translation between assumptions of an arbitrary component to some provides assumptions of some


other arbitrary components

C : Incorporation of planning function that in effect results in runtime determination of the translation

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 155/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

D : Repair those cases you have detected by adapting the components

Q.no 47. Systems that involve interaction with a shared database can be considered as.

A : software-based

B : transaction-based

C : server-based

D : client-based

Q.no 48. Which of the following uses Impact Analysis most?

A : Non-functional system testing

B : Component testing

C : User acceptance testing

D : Maintenance testing

Q.no 49. Which granularity level of testing checks the behavior of module cooperation?

A : Unit Testing

B : Integration Testing

C : Acceptance Testing

D : Regression Testing

Q.no 50. which of the following risk is a potential threat to every software project

A : generic risk

B : project risk

C : product risk

D : business risk

Q.no 51. Which of the following is likely to benefit most from the use of test tools providing test
capture and replay facilities?

A : Integration testing

B : Regression testing

C : System testing

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 156/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

D : User acceptance testing

Q.no 52. Which model describes the static structure of the system using object classes and their
relationships?

A : Structural model

B : Dynamic model

C : Subsystem model

D : Sequence model

Q.no 53. What combines the outward manifestation of the computer-based system , coupled with
all supporting information that describe system syntax and semantics?

A : design model

B : user’s model

C : mental image

D : system image

Q.no 54. The main focus of ______ is to reduce defects and variations in the processes.

A : QA

B : QC

C : Six Sigma

D : tracking

Q.no 55. Risk mitigation is a risk ___________activity. Risk monitoring is a ___________ activity

A : Avoidance, Project tracking.

B : Increasing, Project tracking.

C : Project tracking, Avoidance.

D : Random, Tracking.

Q.no 56. Which of the following type of maintenance takes the maximum chunk of the total
maintenance effort in a typical life cycle of a software product ?

A : Adaptive maintenance

B : Corrective maintenance

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 157/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : Preventive maintenance

D : Perfective maintenance

Q.no 57. A __________ executes the loop task first, then tests a condition and repeats the task
until the condition fails.

A : repeat until

B : condition

C : do while tests

D : if then-else

Q.no 58. A _________ is a graphical representation that depicts information flow and the
transforms that are applied as data moves from input to output.

A : Data flow diagram

B : State transition diagram

C : Control specification

D : Activity diagram

Q.no 59. which of the following impact of the risk drivers on risk components is also called as
disastrous impact

A : critical impact

B : catastrophic impact

C : marginal impact

D : Destructive impact

Q.no 60. A product is re-engineered when

A : system crashes frequently

B : tools to support restructuring are disabled

C : hardware or software support becomes obsolete

D : subsystems of a larger system require few maintenance

Q.no 1. When an expected result is not specified in test case template then ___________.

A : We cannot run the test.

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 158/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

B : It may be difficult to determine if the test has passed or failed.

C : It may be difficult to repeat the test.

D : We cannot automate the user inputs.

Q.no 2. The UML was designed for describing _________

A : object-oriented systems

B : architectural design

C : SRS

D : Both object-oriented systems and Architectural design

Q.no 3. When testing principles are useful?

A : During testing

B : During execution

C : During review

D : Throughout life-cycle

Q.no 4. Select the command in SeleniumIDE used to open a web page using theURL

A : OpenRecord

B : Open

C : OpenText

D : OpenTable

Q.no 5. The risks that are analyzed and managed should be derived from thorough study of

A : people,
product, process, and project.

B : people,
product, process, and management.

C : people,
product, process, and feedback.

D : people,
product, process, and environment.

Q.no 6. Which of the following statements explains portability in non-functional requirements?

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 159/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : It is a degree to which software running on one platform can easily be converted to run on another
platform

B : It cannot be enhanced by using languages, OS’ and tools that are universally available and
standardized

C : The ability of the system to behave consistently in a user-acceptable manner when operating within
the environment for which the system was intended

D : None of the mentioned

Q.no 7. Which of the following is golden rule for interface design?

A : Place the user in control

B : Reduce the user’s memory load

C : Make the interface consistent

D : All of the mentioned

Q.no 8. Which of the following is not a part of a test design document?

A : Test Plan

B : Test Design Specification

C : Test Case Specification

D : Test Log

Q.no 9. The implementation phase of the waterfall model is a synonym for which one of the
following phases?

A : Coding and unit testing phase

B : Integration and system testing phase

C : Maintenance phase

D : Design phase

Q.no 10. Which of these truly defines Software design?

A : Software design is an activity subjected to constraints

B : Software Design specifies nature and composition of software product

C : Software Design satisfies client needs and desires

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 160/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

D : Software design is an activity subjected to constraints specifies nature and composition of software
product which satisfies client needs and desires

Q.no 11. What is Cyclomatic complexity?

A : Black box testing

B : White box testing

C : Yellow box testing

D : Green box testing

Q.no 12. Unit testing is carried out during which phase of the waterfall model?

A : Implementation phase

B : Testing phase

C : Maintenance phase

D : Design phase

Q.no 13. What is the main technique for achieving portable software?

A : The main technique for achieving portable software is to isolate system dependency

B : The main technique for achieving portable software is to increase the overall performance

C : The main technique for achieving portable software is to have independent platform dependency

D : The main technique for achieving portable software is to have independent platform dependency
and to increase accuracy

Q.no 14. Which component of Selenium can create customized test results ?

A : Web Driver

B : Selenium RC

C : Selenium IDE

D : Selenium Grid

Q.no 15. When is the requirement specification activity carried out?

A : During requirements gathering activity

B : Before requirements analysis activity

C : Before requirements gathering activity

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 161/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

D : After requirements analysis activity

Q.no 16. Select the browser which is supported by Selenium IDE

A : Google Chrome

B : Opera Mini

C : Mozilla Firefox

D : Internet Explorer

Q.no 17. Unit testing is done by:

A : Users

B : Developers

C : Customers

D : None of the mentioned

Q.no 18. The Selenium IDE is used

A : To create customized test results

B : To deploy your tests across multiple environments using Selenium Grid

C : To test with HTML Unit

D : To test a web application against Firefox only

Q.no 19. Which one of the following feedback paths is not present in an iterative waterfall
model?

A : Design phase to feasibility study phase

B : Implementation phase to design phase

C : Implementation phase to requirements specification phase

D : Design phase to requirements specification phase.

Q.no 20. In which of the following type of testing, testing is done without planning and
documentation?

A : Unit testing

B : Retesting

C : Ad hoc testing

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 162/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

D : Regression testing

Q.no 21. What can be used to test Flex/Flash aplication using Selenium

A : FlexUISelenium

B : FlexUI

C : UIFlexSelenium

D : SeleniumFlex

Q.no 22. RE represents what

A : Risk expense

B : Related expense

C : Risk exposure

D : Risk evaluation

Q.no 23. Which of the following is not a Software Development Life Cycle Phase?

A : Requirements Gathering

B : Test Closure

C : Coding

D : Testing

Q.no 24. Design phase will usually be.

A : Top down

B : Bottom up

C : Randon

D : iterative

Q.no 25. RMMM stands for

A : risk mitigation methodology and management

B : risk mitigation manupulation and management

C : risk mitigation monitoring and management

D : risk mitigation measurement and management


https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 163/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 26. Who leads a formal review process?

A : Author

B : Moderator

C : Reviewer

D : Scribe

Q.no 27. What describes how a set of interacting components can share data?

A : model-view-controller

B : repository pattern

C : architecture

D : different operating system

Q.no 28. The defect cluster change over time. Which of the following testing principle implies
this?

A : Testing shows presence of defects

B : Pesticide paradox

C : Testing is context dependent

D : Defect Clustering

Q.no 29. Software testing are most effective if applied immediately after

A : Requirement Specification

B : Design

C : Coding

D : Integration

Q.no 30. which of the following is the highest level in the reverse engineering process

A : testing level

B : abstraction level

C : design level

D : maintainence level

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 164/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 31. The nature of Software Application can be characterized by their information

A : Determinacy

B : Content

C : Complexity

D : Both OPTION 2 and OPTION 3

Q.no 32. What is Fault Masking?

A : Creating a test case which does not reveal a fault

B : Error condition hiding another error condition

C : Masking a fault by developer

D : Masking a fault by a tester

Q.no 33. Software tester focuses more on complex part of the software. Which of the following
testing principle implies this?

A : Testing shows presence of defects

B : Pesticide paradox

C : Testing is context dependent

D : Defect Clustering

Q.no 34. Beta Testing is done at:

A : Developer’s end

B : User’s end

C : User’s & Developer’s end

D : None of the mentioned

Q.no 35. Which of the following testing method is normally used as acceptance test for a software
system?

A : Regression testing

B : Integration testing

C : Unit testing

D : Functional testing

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 165/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 36. ______provide the mechanisms for assembling SCIs into a version-specific
configuration.

A : Repository

B : versioning

C : modeling

D : assembling

Q.no 37. Which of the following items would not come under Configuration Management?

A : Operating systems

B : Live data

C : Test documentation

D : User requirement documents

Q.no 38. A set of tools that automate the construction of software by ensuring that the proper set
of validated components have been assembled are known as

A : component element

B : process element

C : construction element

D : human elements

Q.no 39. Which of the following is not the integration strategy?

A : Big-bang

B : Bottom-up

C : Design based

D : Top-down

Q.no 40. What allows different projects to use the same source files at the same time?

A : Version Control

B : Access control

C : CM Process

D : Version Control and Access control

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 166/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 41. Architectural styles is composed of which of the following?

A : A set of component types that perform some function at run-time

B : A topological layout of these components indicating their run-time inter relationships

C : Coupling among the client will lessen the effect of data center architecture

D : A set of semantic constraints

Q.no 42. Which of the following statement is true?

A : Exhaustive testing is impossible but practicable

B : Exhaustive testing is possible but impracticable

C : Exhaustive testing is impossible and impracticable

D : Exhaustive testing is possible and practicable

Q.no 43. What is the major improvement in SVN

A : it allows to rollback of commit

B : addition of atomic commits

C : supported everywhere

D : each file is processed independently

Q.no 44. Test wares are handed over to maintenance team during which phase?

A : Test implementation and execution

B : Test closure activity

C : Evaluating exit criteria and reporting

D : Test analysis and design

Q.no 45. What can static analysis NOT find?

A : Memory leaks

B : Unreachable (“dead”) code

C : The use of a variable before it has been defined

D : Array bound violations

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 167/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 46. Webapp configuration object can be managed in much the same way as conventional
software configuration objects except for

A : content items

B : graphic items

C : functional items

D : user items

Q.no 47. What combines procedures and tools to manage different versions of configuration
objects that are created during the software process?

A : Versioning

B : Audit trails

C : Change control

D : SCI

Q.no 48. ________is not a Software Test Life Cycle Phase?

A : Requirements Gathering

B : Test Planning

C : Test Closure

D : Test Design

Q.no 49. Which of the following is not a Test Type?

A : Database Testing

B : Security Testing

C : Statement Testing

D : Functional Testing

Q.no 50. ETL stands for

A : Data Extraction Transformation & Loading

B : Data Execution Transformation & Loading

C : Extraction Transformation & Loading

D : Execution Transformation & Loading

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 168/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 51. Three factors that affect the consequences that are likely to happen if a risk does occur:

A : its nature,
its scope, and its intensity.

B : its nature,
its scope, and its timing.

C : its nature,
its scope, and its durability.

D : its nature,
its limit, and its timing.

Q.no 52. Which one of these belongs to integration testing in the OO context?

A : Unit testing

B : Regression testing

C : Sandwich testing

D : Thread-based testing

Q.no 53. which control helps to ensure that parallel changes, performed by two different people,
don’t overwrite one another.

A : version control

B : synchronization control

C : access control

D : configuration control

Q.no 54. when SCM is a formal activity the software configuration audit is conducted by

A : testing specialists

B : development team

C : senior managers

D : quality assurance group

Q.no 55. The __________ contains a state transition diagram that is a sequential specification of
behavior.

A : Data flow diagram

B : State transition diagram

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 169/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : Control specification

D : Activity diagram

Q.no 56. Which of the following is not a design principle that allow the user to maintain control?

A : Provide for flexible interaction

B : Allow user interaction to be interrupt-able and undo-able

C : Show technical internals from the casual user

D : Design for direct interaction with objects that appear on the screen

Q.no 57. The order in which test levels are performed is:

A : Unit, Integration, Acceptance, System

B : Unit, System, Integration, Acceptance

C : Unit, Integration, System, Acceptance

D : It depends on the nature of a project

Q.no 58. Which is not a type of incremental testing approach?

A : Bottom up

B : Top down

C : Big-bang

D : Functional incrimination

Q.no 59. When a cost to remove defect is not high?

A : During requirement analysis

B : During designing

C : During coding

D : During testing

Q.no 60. Which of the following is the component test standard?

A : BS7925-2

B : IEEE 829

C : BS7925-1
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 170/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

D : IEEE 610

Q.no 1. What is incorrect about structural design?

A : Structural design introduced notations and heuristics

B : Structural design emphasis on procedural decomposition

C : The advantage is data flow representation

D : It follows Structure chart

Q.no 2. Select the method which selects the option at the at the given index

A : selectByIndex()

B : selectIndex()

C : selectedByIndex()

D : selectByIndexes()

Q.no 3. Java packages and Fortran subroutine are examples of__________

A : Functions

B : Modules

C : Classes

D : Sub procedures

Q.no 4. Which one of the following activities spans all stages of a software development life cycle

A : Coding

B : Testing

C : Project management

D : Design

Q.no 5. which of the followingis not a configuration object

A : Design specification

B : Test specification

C : source code

D : configuration control
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 171/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 6. Acceptance testing is also known as

A : Grey box testing

B : White box testing

C : Alpha Testing

D : Beta testing

Q.no 7. Which one of the following most accurately reflects agile software development?

A : Incremental development

B : Iterative development

C : Linear development

D : Both incremental and iterative development

Q.no 8. Which of these are characteristics of a good design?

A : Exhibits strong coupling among between modules

B : Implements all requirements in the analysis model

C : Includes test cases for all components

D : Implements all requirements in the analysis model and provide a complete picture of the software

Q.no 9. Test cases are created in which phase?

A : Test Specification

B : Test Planning

C : Test Requirement

D : Test Configuration

Q.no 10. Consider the following partial description of the IIT security software. “A camera at the
main gate should detect an incoming vehicle, and the gate should be opened for registered
vehicles.” Which one of the following types of requirements is this?

A : Functional requirement

B : Non-Functional requirement

C : Design requirement

D : Design constraint

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 172/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 11. Select the method which clears all selected entries in Web Driver Selenium

A : dselectAll()

B : deselect_Al()

C : dselect_Al()

D : deselectAll()

Q.no 12. The Selenium RC is used

A : To run your test against different browers on different opearting systems

B : To create test with little or no prior knowledge in programming

C : To test a web application against firefox only

D : To run a huge test suite, that can be executed on multiple machines

Q.no 13. Why do you think iteration is important for design?

A : To frequently reanalyze the problem

B : To generate and improve solutions only once for better output

C : To compare and analyze the complexity of algorithm/ program

D : Due to language supports iterations

Q.no 14. When users are involved in complex tasks, the demand on __________ can be significant

A : short-term memory

B : shortcuts

C : objects that appear on the screen

D : all of the mentioned

Q.no 15. Source code translation is a part of which re-engineering technique

A : Data re-engineering

B : Refactoring

C : Restructuring

D : Repairing

Q.no 16. Software Design consists of _____________


https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 173/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : Software Product Design

B : Software Engineering Design

C : Software Product & Engineering Design

D : Only Software testing

Q.no 17. Which one of the following problems in the gathered requirements is not the focus of the
requirements analysis task?

A : Inconsistency

B : Ambiguity

C : Incompleteness

D : Unstructuredness

Q.no 18. A collection of actions and tasks that define an effective approach to change
management is known as

A : component element

B : process element

C : construction element

D : human elements

Q.no 19. Reference architecture is a

A : reference model mapped onto software components

B : data flow with comments

C : data flow with pieces

D : reference model mapped onto software components & data flow with comments

Q.no 20. Project risk factor is considered in which model?

A : Spiral model.

B : Waterfall model.

C : Prototyping model

D : Incremental Model.

Q.no 21. Error guessing is a:

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 174/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : Test verification techniques

B : Test data management techniques

C : Test control management techniques

D : Test execution techniques

Q.no 22. Software risk always involves two characteristics. What are those characteristics?

A : Uncertainity & loss

B : Certainity & Profit

C : Staff size and budget

D : Project Deadline and budget

Q.no 23. System testing is a

A : Black box testing

B : Grey box testing

C : White box testing

D : Glass box

Q.no 24. White-box testing can be started:

A : After installation

B : After SRS creation

C : After programming

D : After designing

Q.no 25. Which of the following is not a white box technique?

A : State transition testing

B : Path testing

C : Statement testing

D : Data flow testing

Q.no 26. What is “V” Model?

A : Test Design Technique


https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 175/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

B : Test Type

C : SDLC Model

D : Test Level

Q.no 27. Which of the following is not a Software Configuration Management Activity?

A : Configuration item identification

B : Risk management

C : Release management

D : Branch management

Q.no 28. Which architectural style goal is to achieve Modifiability with Scalability?

A : Data Flow Architecture

B : Call and Return Architecture

C : Data Centered Architectures

D : Virtual Machine Architecture

Q.no 29. Which of the following is NOT a reasonable test objective:

A : To find faults in the software

B : To give confidence in the software

C : To prove that the software has no faults

D : To find performance problems

Q.no 30. Version control is not capable of doing

A : enables any version to be constructed using differences from past versions

B : a make facility that enables you to collect all relevant configuration objects and construct a specific
version of the software.

C : If the central database is corrupted, the entire history remains safe and secured

D : a project database repository that stores all relevant configuration objects

Q.no 31. Three statements are given below regarding the User Interface Design: 1) Place the user
in Control. 2) Reduce user's memory load. 3) Make the interface consistent. These rules are
called as __________.

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 176/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : Governed Rule

B : Golden Rule

C : User Rule

D : Thumb Rule

Q.no 32. The modification of the software to match changes in the ever changing environment,
falls under which category of software maintenance?

A : Adaptive

B : Corrective

C : perfective

D : preventive

Q.no 33. Which is not a SQA activity?

A : Black box testing

B : White box testing

C : Integration testing

D : Unit testing

Q.no 34. What effect does achievement of quality attribute will have?

A : The achievement of quality attribute will always have a positive effect

B : The achievement of quality attribute will always have a negative effect

C : The achievement of quality attribute will have no effect

D : The achievement of quality attribute will have a positive as well as negative effect

Q.no 35. Which of the following truly describes Wrappers?

A : Encapsulation whereby some components is encased within an alternative abstraction

B : Translation between assumptions of an arbitrary component to some provides assumptions of some


other arbitrary components

C : cIncorporation of planning function that in effect results in runtime determination of the translation

D : Repair those cases you have detected by adapting the components

Q.no 36. RE is the overall risk exposure and is written as:

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 177/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A:PxC

B:PxM

C:MxC

D:PxS

Q.no 37. Which of the following truly describes Bridges?

A : Encapsulation whereby some components is encased within an alternative abstraction

B : Translation between assumptions of an arbitrary component to some provides assumptions of some


other arbitrary components

C : Incorporation of planning function that in effect results in runtime determination of the translation

D : Repair those cases you have detected by adapting the components

Q.no 38. Static analysis can be best described as:

A : The reviewing of test plans

B : The analysis of batch programs

C : The use of black box testing

D : The analysis of program code

Q.no 39. The technique applied for usability testing is:

A : White box

B : Grey box

C : Black box

D : Combination of all

Q.no 40. A set of tools coupled within a file management system that enables access to and
management of each software configuration item is known as

A : component element

B : process element

C : construction element

D : human elements

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 178/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 41. Which of the following pattern is the basis of interaction management in many web-
based systems?

A : model-view-controller

B : repository pattern

C : architecture

D : different operating system

Q.no 42. In a simple risk table the risks are categorized into

A : PS, BU , CU

B : TU ,DE ,ST

C : BE ,CU ,ST

D : SU , TE ,CU ,PS

Q.no 43. Which of the following is not real-time architectural patterns that are commonly used?

A : Asynchronous communication

B : Observe and React

C : Environmental Control

D : Process Pipeline

Q.no 44. Requirement Engineering is not concern with ____________.

A : Requirement Design

B : Requirement Elicitation

C : Requirement Analysis

D : Requirement Documentation

Q.no 45. Maintenance testing is performed using which methodology?

A : Retesting

B : Sanity testing

C : Breadth test and depth test

D : Confirmation testing

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 179/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 46. Bug status is set to postpone due to ________.

A : Priority of that bug may low.

B : Lack of time for the release.

C : The bug may not be the major effect in the software.

D : Data may be unavailable.

Q.no 47. Regression testing is a major part of which of the life cycle?

A : Waterfall model

B : V model

C : Iterative model

D : Agile model

Q.no 48. Which architectural style goal is to achieve Portability?

A : Data Flow Architecture

B : Call and Return Architecture

C : Data Centered Architectures

D : Virtual Machine Architecture

Q.no 49. Systems that involve interaction with a shared database can be considered as.

A : software-based

B : transaction-based

C : server-based

D : client-based

Q.no 50. Which of the following uses Impact Analysis most?

A : Non-functional system testing

B : Component testing

C : User acceptance testing

D : Maintenance testing

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 180/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 51. A chronological record of relevant details about the execution of tests is called as, a
_______

A : Test suite

B : Test procedure

C : Test data

D : Test log

Q.no 52. The ability to identify which requirement generated any given work product is known
as

A : forward tracing

B : backward tracing

C : Dependency tracking

D : Change management

Q.no 53. What mechanism is used to apprise others of changes that are made?

A : Configuration management

B : Requirementss tracing

C : Reporting

D : Change control

Q.no 54. Which model shows the flow of object interactions?

A : Structural model

B : Dynamic model

C : Subsystem model

D : Sequence model

Q.no 55. Which of the following is likely to benefit most from the use of test tools providing test
capture and replay facilities?

A : Integration testing

B : Regression testing

C : System testing

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 181/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

D : User acceptance testing

Q.no 56. Which model describes the static structure of the system using object classes and their
relationships?

A : Structural model

B : Dynamic model

C : Subsystem model

D : Sequence model

Q.no 57. A __________ executes the loop task first, then tests a condition and repeats the task
until the condition fails.

A : repeat until

B : condition

C : do while tests

D : if then-else

Q.no 58. What determines how information is stored in the repository, how data can be accessed
by tools and viewed by software engineers, how well data security and integrity can be
maintained, and how easily the existing model can be extended to accommodate new needs.

A : Data model

B : Meta model

C : Configuration model

D : Test model

Q.no 59. Which of the following is not needed to develop a system design from concept to detailed
object-oriented design?

A : Designing system architecture

B : Developing design models

C : Specifying interfaces

D : Developing a debugging system

Q.no 60. Risk mitigation is a risk ___________activity. Risk monitoring is a ___________ activity

A : Avoidance, Project tracking.

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 182/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

B : Increasing, Project tracking.

C : Project tracking, Avoidance.

D : Random, Tracking.

Q.no 1. WMITS stands for

A : waste mitigation inspection tracking system

B : waste management inspection tracking system

C : waste manupulation inspection tracking system

D : waste measurement inspection tracking system

Q.no 2. Risk management is responsibility of the

A : Customer

B : Investor

C : Developer

D : Project team

Q.no 3. Which Selenium Component Supports all operating systems

A : Selenium Generator

B : Selenium IDE

C : Selenium WebDriver

D:0

Q.no 4. Which of the following is not a user interface design process?

A : User, task, and environment analysis and modeling

B : Interface design

C : Knowledgeable, frequent users

D : Interface validation

Q.no 5. Which of the following is not a design principle that allows the user to maintain control?

A : Provide for flexible interaction

B : Allow user interaction to be interrupt-able and undo-able


https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 183/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : Show technical internals from the casual user

D : Design for direct interaction with objects that appear on the screen

Q.no 6. Select the tab which gives feedback and other useful information when executing tests

A : Information

B : Feddback

C : Reference

D : Element

Q.no 7. Which Testing is performed first?

A : Black box testing

B : White box testing

C : Dynamic testing

D : Static testing

Q.no 8. When testing principles are useful?

A : During testing

B : During execution

C : During review

D : Throughout life-cycle

Q.no 9. What is TestNG ?

A : TestNextGeneration

B : TestNewGenerlization

C : TestNewGeneration

D : TestNextGenerations

Q.no 10. Which of the following is not part of the software reengineering process model?

A : reverse engineering

B : forward engineering

C : inventory analysis
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 184/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

D : prototyping

Q.no 11. Verification is focused on

A : Product

B : Process

C : Design

D : Testing

Q.no 12. The selenium can

A : access controls within the desktop

B : both web and desktop applications

C : only test web applications

D:0

Q.no 13. Testing of software with actual data and in actual environment is known as?

A : Regression testing

B : Beta testing

C : Alpha testing

D : None of the above

Q.no 14. Select the command which is used to print a string value of a variable in Selenium IDE

A : The 'display' command

B : The 'echo' command

C : The 'print' command

D : The 'printr' command

Q.no 15. Select the language which is not supported by the Selenium RC

A : ASP

B : Java

C : C#

D : PHP
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 185/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 16. Method which selects the option which displays the text matching the parameter passed
to it

A : selectVisibleText()

B : selectByVisibleText()

C : select_VisibleText()

D : select_ByVisibleText()

Q.no 17. What type of abstraction used in Software design

A : Control, data, environmental

B : Data, environmental, procedural

C : Control, data, procedural

D : Control, Environmental, procedural

Q.no 18. A software component

A : Implements some functionality

B : Has explicit dependencies through provides and required interfaces

C : Communicates through its interfaces only

D : All of the mentioned

Q.no 19. Out of the following which is not a wait comand

A : waitForTitle

B : waitForTextPresent

C : waitForActive

D : waitForAlert

Q.no 20. Verification is the responsibility of

A : Developer

B : Designer

C : Tester

D : QA Team

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 186/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 21. Which lines depict that architecture defines constraints on an implementation?

A : An implementation exhibits an architecture if it conforms to the structural decisions described by


the architecture

B : The implementation need not be divided into prescribed components

C : An implementation exhibits an architecture if it conforms to the structural decisions described by


the architecture and the implementation must be divided into prescribed components

D : An implementation exhibits an architecture if it conforms to the structural decisions described by


the architecture whereas implementation need not be divided into prescribed components

Q.no 22. CTC stands for

A : condition-transaction-consequence

B : condition-transfer-consequence

C : condition-transition-consequence

D : condition-transmission-consequence

Q.no 23. A software requirements specification (SRS) document should avoid discussing which
one of the following?

A : Functional requirements

B : Non-functional requirements

C : Design specification

D : Constraints on the implementation

Q.no 24. Which of the following model put much more emphasis on testing?

A : waterfall model

B : agile model

C : spiral model

D : v-v model

Q.no 25. A ________ view shows the system hardware and how software components are
distributed across the processors in the system.

A : physical

B : logical

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 187/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : process

D: all of the mentioned

Q.no 26. What can static analysis NOT find?

A : Memory leaks

B : Unreachable (“dead”) code

C : The use of a variable before it has been defined

D : Array bound violations

Q.no 27. Which of the following is not a module type

A : Object modules

B : Hardware modules

C : Functional modules

D : Process support modules

Q.no 28. Which of the following is/are commonly used architectural pattern(s)?

A : Model-View-Controller

B : Layered Architecture

C : Client–server

D : MVC, Layered Architecture and Client–server

Q.no 29. Which architectural style goal is to achieve Integrability?

A : Data Flow Architecture

B : Call and Return Architecture

C : Data Centered Architectures

D : Virtual Machine Architecture

Q.no 30. Which of the following testing method is normally used as acceptance test for a software
system?

A : Regression testing

B : Integration testing

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 188/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : Unit testing

D : Functional testing

Q.no 31. What describes how a set of interacting components can share data?

A : model-view-controller

B : repository pattern

C : architecture

D : different operating system

Q.no 32. Which architectural style goal is to achieve Modifiability with Reuse?

A : Data Flow Architecture

B : Call and Return Architecture

C : Data Centered Architectures

D : Virtual Machine Architecture

Q.no 33. Which of the following statement is true?

A : Exhaustive testing is impossible but practicable

B : Exhaustive testing is possible but impracticable

C : Exhaustive testing is impossible and impracticable

D : Exhaustive testing is possible and practicable

Q.no 34. which of the following is not a software risk

A : product risk

B : project risk

C : business risk

D : management rsik

Q.no 35. Test wares are handed over to maintenance team during which phase?

A : Test implementation and execution

B : Test closure activity

C : Evaluating exit criteria and reporting


https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 189/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

D : Test analysis and design

Q.no 36. What combines procedures and tools to manage different versions of configuration
objects that are created during the software process?

A : Versioning

B : Audit trails

C : Change control

D : SCI

Q.no 37. What is Fault Masking?

A : Creating a test case which does not reveal a fault

B : Error condition hiding another error condition

C : Masking a fault by developer

D : Masking a fault by a tester

Q.no 38. The defect cluster change over time. Which of the following testing principle implies
this?

A : Testing shows presence of defects

B : Pesticide paradox

C : Testing is context dependent

D : Defect Clustering

Q.no 39. ________is not a Software Test Life Cycle Phase?

A : Requirements Gathering

B : Test Planning

C : Test Closure

D : Test Design

Q.no 40. ______provide the mechanisms for assembling SCIs into a version-specific
configuration.

A : Repository

B : versioning

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 190/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : modeling

D : assembling

Q.no 41. Architectural styles is composed of which of the following?

A : A set of component types that perform some function at run-time

B : A topological layout of these components indicating their run-time inter relationships

C : Coupling among the client will lessen the effect of data center architecture

D : A set of semantic constraints

Q.no 42. which of the following risk is a potential threat to every software project

A : generic risk

B : project risk

C : product risk

D : business risk

Q.no 43. Webapp configuration object can be managed in much the same way as conventional
software configuration objects except for

A : content items

B : graphic items

C : functional items

D : user items

Q.no 44. Which of the following is not an issue to consider when reverse engineering?

A : directionality

B : connectivity

C : completeness

D : abstraction level

Q.no 45. Which of the following is not a software testing generic characteristics?

A : Different testing techniques are appropriate at different points in time

B : Testing is conducted by the developer of the software or an independent test group

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 191/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : Testing and debugging are different activities, but debugging must be accommodated in any testing
strategy

D : None of the mentioned

Q.no 46. E-Commerce software testing follows different approach than gaming software testing.
Which testing principle implies this?

A : Pareto principle

B : Testing is Context dependent

C : Testing shows presence of defects

D : Absence of errors-fallacy

Q.no 47. The nature of Software Application can be characterized by their information

A : Determinacy

B : Content

C : Complexity

D : Both OPTION 2 and OPTION 3

Q.no 48. Beta Testing is done at:

A : Developer’s end

B : User’s end

C : User’s & Developer’s end

D : None of the mentioned

Q.no 49. Which of the following is not the integration strategy?

A : Big-bang

B : Bottom-up

C : Design based

D : Top-down

Q.no 50. After occurence of the risk ,the developement team members do some rapid actions to
overcome the problem called as

A : reactive risk mode

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 192/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

B : proactive risk mode

C : fire fighting mode

D : quick rectification mode

Q.no 51. A _________ is a graphical representation that depicts information flow and the
transforms that are applied as data moves from input to output.

A : Data flow diagram

B : State transition diagram

C : Control specification

D : Activity diagram

Q.no 52. which of the following impact of the risk drivers on risk components is also called as
disastrous impact

A : critical impact

B : catastrophic impact

C : marginal impact

D : Destructive impact

Q.no 53. Which one of these belongs to integration testing in the OO context?

A : Unit testing

B : Regression testing

C : Sandwich testing

D : Thread-based testing

Q.no 54. when SCM is a formal activity the software configuration audit is conducted by

A : testing specialists

B : development team

C : senior managers

D : quality assurance group

Q.no 55. Three factors that affect the consequences that are likely to happen if a risk does occur:

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 193/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : its nature,
its scope, and its intensity.

B : its nature,
its scope, and its timing.

C : its nature,
its scope, and its durability.

D : its nature,
its limit, and its timing.

Q.no 56. The main focus of ______ is to reduce defects and variations in the processes.

A : QA

B : QC

C : Six Sigma

D : tracking

Q.no 57. which control helps to ensure that parallel changes, performed by two different people,
don’t overwrite one another.

A : version control

B : synchronization control

C : access control

D : configuration control

Q.no 58. What combines the outward manifestation of the computer-based system , coupled with
all supporting information that describe system syntax and semantics?

A : design model

B : user’s model

C : mental image

D : system image

Q.no 59. Which of the following type of maintenance takes the maximum chunk of the total
maintenance effort in a typical life cycle of a software product ?

A : Adaptive maintenance

B : Corrective maintenance

C : Preventive maintenance
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 194/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

D : Perfective maintenance

Q.no 60. A product is re-engineered when

A : system crashes frequently

B : tools to support restructuring are disabled

C : hardware or software support becomes obsolete

D : subsystems of a larger system require few maintenance

Q.no 1. Software risk always involves two characteristics. What are those characteristics?

A : Uncertainity & loss

B : Certainity & Profit

C : Staff size and budget

D : Project Deadline and budget

Q.no 2. Which of the following is a static test?

A : Coverage analysis

B : Code inspection

C : Usability assessment

D : Installation test

Q.no 3. Which command can be used to enter values onto text boxes ?

A : sendsKey()

B : sendKey()

C : sendKeys

D : sendKeys()

Q.no 4. Which testing is performed with Planning and Documentation?

A : Ad-hoc testing

B : Monkey testing

C : Fuzz testing

D : End-to-End testing
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 195/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 5. Select the command which is used to pause execution until the page is loaded completely

A : waitForPageToLoad

B : waitForElementPresent

C : waitForPage

D : waitForLoad

Q.no 6. Members of a Scrum team are not expected to answer which one of the following
questions during a daily Scrum meeting?

A : It is the fundamental process flow of Scrum

B : It is month-long iteration, during which incremental product functionality completed

C : During a Sprint, customer feedback is continually obtained and the Sprint backlog is accordingly
modified

D : Each day begins with a daily Scrum meeting

Q.no 7. The operation phase of the waterfall model is a synonym for which one of the following
phases?

A : Coding and unit testing phase

B : Integration and system testing phase

C : Maintenance phase

D : Design phase

Q.no 8. End result of Software Requirement Analysis is ________.

A : Functional and Behavioral

B : Architectural and Structural

C : Usability and Reliability

D : Algorithmic and Data Structure

Q.no 9. Which of the following is not a white box technique?

A : State transition testing

B : Path testing

C : Statement testing

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 196/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

D : Data flow testing

Q.no 10. The Actions Commands

A : are commands that directly interact with page elements

B : are commands that allow you to store values to a variable

C : are commands that verify if a certain condition is met

D:0

Q.no 11. Which one of the following views is implicit in an SRS document?

A : Black box

B : White box

C : Grey box

D : Glass box

Q.no 12. The expected results of the software is _________________.

A : Only important in system testing

B : Only used in component testing

C : Most useful when specified in advance

D : Derived from the code.

Q.no 13. Who performs the Acceptance Testing?

A : Software Developer

B : End users

C : Testing team

D : Systems engineers

Q.no 14. Software Design consists of _____________

A : Software Product Design

B : Software Engineering Design

C : Software Product & Engineering Design

D : Only Software testing


https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 197/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 15. Select the method which selects the option at the at the given index

A : selectByIndex()

B : selectIndex()

C : selectedByIndex()

D : selectByIndexes()

Q.no 16. Unit testing is carried out during which phase of the waterfall model?

A : Implementation phase

B : Testing phase

C : Maintenance phase

D : Design phase

Q.no 17. Which one of the following activities spans all stages of a software development life cycle

A : Coding

B : Testing

C : Project management

D : Design

Q.no 18. The Selenium RC is used

A : To run your test against different browers on different opearting systems

B : To create test with little or no prior knowledge in programming

C : To test a web application against firefox only

D : To run a huge test suite, that can be executed on multiple machines

Q.no 19. In which of the following type of testing, testing is done without planning and
documentation?

A : Unit testing

B : Retesting

C : Ad hoc testing

D : Regression testing

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 198/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 20. Choose the incorrect statement with respect to Non-Functional Requirement(NFR)

A : Product-oriented Approach – Focus on system (or software) quality

B : Process-oriented Approach – Focus on how NFRs can be used in the design process

C : Quantitative Approach – Find measurable scales for the functionality attributes

D : Qualitative Approach – Study various relationships between quality goals

Q.no 21. The Selenium

A : provides professional computer support

B : tests reports are generated automatically

C : comes with a built in object repository

D : Cannot access elements outside of the web application under test

Q.no 22. The Web Driver is used

A : To execute tests on the HTML Unit browser

B : To design a test Using Selenese

C : To quickly create tests

D : To test a web application against Firefox only

Q.no 23. The importance of software design can be summarized in a single word which is:

A : Efficiency

B : Accuracy

C : Quality

D : Complexity

Q.no 24. Select the language which is supported by the Selenium Web driver

A : Perl

B : Sql

C : ASP

D : Cobol

Q.no 25. Select the operating system which is not supported by Selenium IDE
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 199/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : Unix

B : Linux

C : Windows

D : Solaries

Q.no 26. Who leads a formal review process?

A : Author

B : Moderator

C : Reviewer

D : Scribe

Q.no 27. Three statements are given below regarding the User Interface Design: 1) Place the user
in Control. 2) Reduce user's memory load. 3) Make the interface consistent. These rules are
called as __________.

A : Governed Rule

B : Golden Rule

C : User Rule

D : Thumb Rule

Q.no 28. Which of the following is not a Test Type?

A : Database Testing

B : Security Testing

C : Statement Testing

D : Functional Testing

Q.no 29. Maintenance testing is performed using which methodology?

A : Retesting

B : Sanity testing

C : Breadth test and depth test

D : Confirmation testing

Q.no 30. Requirement Engineering is not concern with ____________.

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 200/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : Requirement Design

B : Requirement Elicitation

C : Requirement Analysis

D : Requirement Documentation

Q.no 31. Static analysis can be best described as:

A : The reviewing of test plans

B : The analysis of batch programs

C : The use of black box testing

D : The analysis of program code

Q.no 32. Which is not a SQA activity?

A : Black box testing

B : White box testing

C : Integration testing

D : Unit testing

Q.no 33. Which of the following uses Impact Analysis most?

A : Non-functional system testing

B : Component testing

C : User acceptance testing

D : Maintenance testing

Q.no 34. In a simple risk table the risks are categorized into

A : PS, BU , CU

B : TU ,DE ,ST

C : BE ,CU ,ST

D : SU , TE ,CU ,PS

Q.no 35. Software testing are most effective if applied immediately after

A : Requirement Specification
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 201/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

B : Design

C : Coding

D : Integration

Q.no 36. Which of the following truly describes Bridges?

A : Encapsulation whereby some components is encased within an alternative abstraction

B : Translation between assumptions of an arbitrary component to some provides assumptions of some


other arbitrary components

C : Incorporation of planning function that in effect results in runtime determination of the translation

D : Repair those cases you have detected by adapting the components

Q.no 37. What are the criteria to decide the testing efforts?1. Time and budget
2. Size of development team
3. Size of testers
4. Risk associated with project

A : a. 1, 3, 4

B : b. 1, 2, 3

C : c. 1, 4

D : d. 1, 3

Q.no 38. Which of the following risk is the failure of a purchased component to perform as
expected

A : Product risk

B : Business risk

C : Programming risk

D : Project risk

Q.no 39. Bug status is set to postpone due to ________.

A : Priority of that bug may low.

B : Lack of time for the release.

C : The bug may not be the major effect in the software.

D : Data may be unavailable.

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 202/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 40. The modification of the software to match changes in the ever changing environment,
falls under which category of software maintenance?

A : Adaptive

B : Corrective

C : perfective

D : preventive

Q.no 41. Regression testing is a major part of which of the life cycle?

A : Waterfall model

B : V model

C : Iterative model

D : Agile model

Q.no 42. Which of the following is NOT a reasonable test objective:

A : To find faults in the software

B : To give confidence in the software

C : To prove that the software has no faults

D : To find performance problems

Q.no 43. What is the major improvement in SVN

A : it allows to rollback of commit

B : addition of atomic commits

C : supported everywhere

D : each file is processed independently

Q.no 44. Software tester focuses more on complex part of the software. Which of the following
testing principle implies this?

A : Testing shows presence of defects

B : Pesticide paradox

C : Testing is context dependent

D : Defect Clustering

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 203/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 45. Systems that involve interaction with a shared database can be considered as.

A : software-based

B : transaction-based

C : server-based

D : client-based

Q.no 46. What allows different projects to use the same source files at the same time?

A : Version Control

B : Access control

C : CM Process

D : Version Control and Access control

Q.no 47. Which of the following truly describes Mediators?

A : Encapsulation whereby some components is encased within an alternative abstraction

B : Translation between assumptions of an arbitrary component to some provides assumptions of some


other arbitrary components

C : Incorporation of planning function that in effect results in runtime determination of the translation

D : Repair those cases you have detected by adapting the components

Q.no 48. Which of the following truly describes Wrappers?

A : Encapsulation whereby some components is encased within an alternative abstraction

B : Translation between assumptions of an arbitrary component to some provides assumptions of some


other arbitrary components

C : cIncorporation of planning function that in effect results in runtime determination of the translation

D : Repair those cases you have detected by adapting the components

Q.no 49. Which of the following is not a state of a defect in defect life cycle:

A : Verified

B : New

C : Critical

D : Deferred

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 204/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 50. A software reengineeering process model consists of:

A : code restructuring

B : back engineering

C : document engineerinhg

D : implementation engineering

Q.no 51. Risk mitigation is a risk ___________activity. Risk monitoring is a ___________ activity

A : Avoidance, Project tracking.

B : Increasing, Project tracking.

C : Project tracking, Avoidance.

D : Random, Tracking.

Q.no 52. Which of the following is not a design principle that allow the user to maintain control?

A : Provide for flexible interaction

B : Allow user interaction to be interrupt-able and undo-able

C : Show technical internals from the casual user

D : Design for direct interaction with objects that appear on the screen

Q.no 53. The __________ enables the software engineer to develop models of the information
domain and functional domain at the same time

A : Data flow diagram

B : State transition diagram

C : Control specification

D : Activity diagram

Q.no 54. Which model describes the static structure of the system using object classes and their
relationships?

A : Structural model

B : Dynamic model

C : Subsystem model

D : Sequence model

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 205/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 55. The order in which test levels are performed is:

A : Unit, Integration, Acceptance, System

B : Unit, System, Integration, Acceptance

C : Unit, Integration, System, Acceptance

D : It depends on the nature of a project

Q.no 56. A __________ executes the loop task first, then tests a condition and repeats the task
until the condition fails.

A : repeat until

B : condition

C : do while tests

D : if then-else

Q.no 57. Which is not a type of incremental testing approach?

A : Bottom up

B : Top down

C : Big-bang

D : Functional incrimination

Q.no 58. Which of the following is not needed to develop a system design from concept to detailed
object-oriented design?

A : Designing system architecture

B : Developing design models

C : Specifying interfaces

D : Developing a debugging system

Q.no 59. Which of the following is the component test standard?

A : BS7925-2

B : IEEE 829

C : BS7925-1

D : IEEE 610

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 206/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 60. The ability to identify which requirement generated any given work product is known
as

A : forward tracing

B : backward tracing

C : Dependency tracking

D : Change management

Q.no 1. Which one of the following is not a standard software development process model?

A : Waterfall Model

B : Recursive Model

C : RAD Model

D : V Model

Q.no 2. Which of the following is not a user interface design process?

A : User, task, and environment analysis and modeling

B : Interface design

C : Knowledgeable, frequent users

D : Interface validation

Q.no 3. Alpha testing is:

A : Post-release testing by end user representatives at the developer’s site

B : The first testing that is performed

C : Pre-release testing by end user representatives at their sites

D : Pre-release testing by end user representatives at the developer’s site

Q.no 4. When is the requirement specification activity carried out?

A : During requirements gathering activity

B : Before requirements analysis activity

C : Before requirements gathering activity

D : After requirements analysis activity

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 207/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 5. What does “Every software system has an architecture” implies?

A : Architecture an exist independently of its description or specification

B : All the system to be stable should posses an architecture

C : System itself is a component

D : Component itself is a system and hence architecture

Q.no 6. Which one of the following is a requirement that fits in a developer’s module ?

A : Availability

B : Testability

C : Usability

D : Flexibility

Q.no 7. Which one of the following may be experienced by a software development team when it
adopts a systematic development process model in preference to a build-and-fix style of
development?

A : Increased documentation overhead

B : Increased development cost

C : Decreased maintainability

D : Increased development time

Q.no 8. Which lines depict that architecture defines constraints on an implementation?

A : An implementation exhibits an architecture if it conforms to the structural decisions described by


the architecture

B : The implementation need not be divided into prescribed components

C : An implementation exhibits an architecture if it conforms to the structural decisions described by


the architecture and the implementation must be divided into prescribed components

D : An implementation exhibits an architecture if it conforms to the structural decisions described by


the architecture whereas implementation need not be divided into prescribed components

Q.no 9. System testing is a

A : Black box testing

B : Grey box testing

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 208/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : White box testing

D : Glass box

Q.no 10. Select the command which is used to check the presence of a certain element

A : verifyTable

B : verifyTitlePresent

C : verifyTextPresent

D : verifyElementPresent

Q.no 11. Why do you think iteration is important for design?

A : To frequently reanalyze the problem

B : To generate and improve solutions only once for better output

C : To compare and analyze the complexity of algorithm/ program

D : Due to language supports iterations

Q.no 12. RMMM stands for

A : risk mitigation methodology and management

B : risk mitigation manupulation and management

C : risk mitigation monitoring and management

D : risk mitigation measurement and management

Q.no 13. Which one is the basic input device in GUI

A : Mouse

B : keyboard

C : cpu

D : monitor

Q.no 14. Agile model advocates which one of the following approaches?

A : In each increment, get something “quick and dirty” delivered and thereby save time

B : In each increment, get something simple released as quickly as possible

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 209/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : In each increment, get something of business-value delivered as quickly as possible, consistent with
the right level of quality

D : In each increment, get something delivered once it has been fully documented and the
documentation has been signed off as complete

Q.no 15. Select the command which retrieves the alert message and stores it in a variable that
you will specify

A : storeAlert

B : storedAlert

C : store_Alert

D : storesAlert

Q.no 16. In software development life cycle , who is the best person to catch a defect?

A : Software Tester

B : Customers

C : Designer

D : Business Analyst

Q.no 17. A ________ view shows the system hardware and how software components are
distributed across the processors in the system.

A : physical

B : logical

C : process

D: all of the mentioned

Q.no 18. Which of the following is not a part of a test design document?

A : Test Plan

B : Test Design Specification

C : Test Case Specification

D : Test Log

Q.no 19. Select the command which is used to compare the actual page title with an expected
value

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 210/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : verifyTitle

B : verifiedTitle

C : verifyTitles

D : verifiedTitles

Q.no 20. Which is not the other name for structural testing?

A : Behavioral testing

B : Glass box testing

C : White box testing

D : None of the above

Q.no 21. Select the language which is not supported by the Selenium RC

A : ASP

B : Java

C : C#

D : PHP

Q.no 22. What incorporates data, architectural, interface, and procedural representations of the
software?

A : design model

B : user’s model

C : mental image

D : system image

Q.no 23. Select the method which clears all selected entries in Web Driver Selenium

A : dselectAll()

B : deselect_Al()

C : dselect_Al()

D : deselectAll()

Q.no 24. Which one of the following is not a step of requirement engineering?

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 211/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : elicitation

B : design

C : analysis

D : documentation

Q.no 25. Which one of the following is a functional requirement ?

A : Maintainability

B : Portability

C : Robustness

D : None of the mentioned

Q.no 26. Version control is not capable of doing

A : enables any version to be constructed using differences from past versions

B : a make facility that enables you to collect all relevant configuration objects and construct a specific
version of the software.

C : If the central database is corrupted, the entire history remains safe and secured

D : a project database repository that stores all relevant configuration objects

Q.no 27. ________is not a Software Test Life Cycle Phase?

A : Requirements Gathering

B : Test Planning

C : Test Closure

D : Test Design

Q.no 28. Which of the following is not the integration strategy?

A : Big-bang

B : Bottom-up

C : Design based

D : Top-down

Q.no 29. which of the following is not a software risk

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 212/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : product risk

B : project risk

C : business risk

D : management rsik

Q.no 30. which of the following is the highest level in the reverse engineering process

A : testing level

B : abstraction level

C : design level

D : maintainence level

Q.no 31. What can static analysis NOT find?

A : Memory leaks

B : Unreachable (“dead”) code

C : The use of a variable before it has been defined

D : Array bound violations

Q.no 32. Which of the following is not real-time architectural patterns that are commonly used?

A : Asynchronous communication

B : Observe and React

C : Environmental Control

D : Process Pipeline

Q.no 33. RE is the overall risk exposure and is written as:

A:PxC

B:PxM

C:MxC

D:PxS

Q.no 34. Test wares are handed over to maintenance team during which phase?

A : Test implementation and execution


https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 213/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

B : Test closure activity

C : Evaluating exit criteria and reporting

D : Test analysis and design

Q.no 35. The technique applied for usability testing is:

A : White box

B : Grey box

C : Black box

D : Combination of all

Q.no 36. Which architectural style goal is to achieve Integrability?

A : Data Flow Architecture

B : Call and Return Architecture

C : Data Centered Architectures

D : Virtual Machine Architecture

Q.no 37. What is Fault Masking?

A : Creating a test case which does not reveal a fault

B : Error condition hiding another error condition

C : Masking a fault by developer

D : Masking a fault by a tester

Q.no 38. What is “V” Model?

A : Test Design Technique

B : Test Type

C : SDLC Model

D : Test Level

Q.no 39. Which granularity level of testing checks the behavior of module cooperation?

A : Unit Testing

B : Integration Testing
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 214/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : Acceptance Testing

D : Regression Testing

Q.no 40. Which of the following testing method is normally used as acceptance test for a software
system?

A : Regression testing

B : Integration testing

C : Unit testing

D : Functional testing

Q.no 41. The defect cluster change over time. Which of the following testing principle implies
this?

A : Testing shows presence of defects

B : Pesticide paradox

C : Testing is context dependent

D : Defect Clustering

Q.no 42. Architectural styles is composed of which of the following?

A : A set of component types that perform some function at run-time

B : A topological layout of these components indicating their run-time inter relationships

C : Coupling among the client will lessen the effect of data center architecture

D : A set of semantic constraints

Q.no 43. The nature of Software Application can be characterized by their information

A : Determinacy

B : Content

C : Complexity

D : Both OPTION 2 and OPTION 3

Q.no 44. Which of the following is not a software testing generic characteristics?

A : Different testing techniques are appropriate at different points in time

B : Testing is conducted by the developer of the software or an independent test group

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 215/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : Testing and debugging are different activities, but debugging must be accommodated in any testing
strategy

D : None of the mentioned

Q.no 45. A set of tools coupled within a file management system that enables access to and
management of each software configuration item is known as

A : component element

B : process element

C : construction element

D : human elements

Q.no 46. Beta Testing is done at:

A : Developer’s end

B : User’s end

C : User’s & Developer’s end

D : None of the mentioned

Q.no 47. A set of tools that automate the construction of software by ensuring that the proper set
of validated components have been assembled are known as

A : component element

B : process element

C : construction element

D : human elements

Q.no 48. What combines procedures and tools to manage different versions of configuration
objects that are created during the software process?

A : Versioning

B : Audit trails

C : Change control

D : SCI

Q.no 49. Which architectural style goal is to achieve Portability?

A : Data Flow Architecture

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 216/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

B : Call and Return Architecture

C : Data Centered Architectures

D : Virtual Machine Architecture

Q.no 50. ETL stands for

A : Data Extraction Transformation & Loading

B : Data Execution Transformation & Loading

C : Extraction Transformation & Loading

D : Execution Transformation & Loading

Q.no 51. which control helps to ensure that parallel changes, performed by two different people,
don’t overwrite one another.

A : version control

B : synchronization control

C : access control

D : configuration control

Q.no 52. When a cost to remove defect is not high?

A : During requirement analysis

B : During designing

C : During coding

D : During testing

Q.no 53. Which one of these belongs to integration testing in the OO context?

A : Unit testing

B : Regression testing

C : Sandwich testing

D : Thread-based testing

Q.no 54. when SCM is a formal activity the software configuration audit is conducted by

A : testing specialists

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 217/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

B : development team

C : senior managers

D : quality assurance group

Q.no 55. The __________ contains a state transition diagram that is a sequential specification of
behavior.

A : Data flow diagram

B : State transition diagram

C : Control specification

D : Activity diagram

Q.no 56. A product is re-engineered when

A : system crashes frequently

B : tools to support restructuring are disabled

C : hardware or software support becomes obsolete

D : subsystems of a larger system require few maintenance

Q.no 57. A chronological record of relevant details about the execution of tests is called as, a
_______

A : Test suite

B : Test procedure

C : Test data

D : Test log

Q.no 58. What mechanism is used to apprise others of changes that are made?

A : Configuration management

B : Requirementss tracing

C : Reporting

D : Change control

Q.no 59. which of the following impact of the risk drivers on risk components is also called as
disastrous impact

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 218/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : critical impact

B : catastrophic impact

C : marginal impact

D : Destructive impact

Q.no 60. What determines how information is stored in the repository, how data can be accessed
by tools and viewed by software engineers, how well data security and integrity can be
maintained, and how easily the existing model can be extended to accommodate new needs.

A : Data model

B : Meta model

C : Configuration model

D : Test model

Q.no 1. Which testing is performed with Planning and Documentation?

A : Ad-hoc testing

B : Monkey testing

C : Fuzz testing

D : End-to-End testing

Q.no 2. Test cases are designed during which of the following stages?

A : Test recording

B : Test configuration

C : Test planning

D : Test specification

Q.no 3. SCM stands for

A : Software Control Management

B : Software Configuration Management

C : Software Concept Management

D : Software Course Management

Q.no 4. The risks that are analyzed and managed should be derived from thorough study of

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 219/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : people,
product, process, and project.

B : people,
product, process, and management.

C : people,
product, process, and feedback.

D : people,
product, process, and environment.

Q.no 5. A software process model represents which one of the following?

A : The way in which software is developed

B : The way in which software processes data

C : The way in which software is used

D : The way in which software may fail

Q.no 6. What is Cyclomatic complexity?

A : Black box testing

B : White box testing

C : Yellow box testing

D : Green box testing

Q.no 7. Select the operating system which is not supported by Selenium IDE

A : Unix

B : Linux

C : Windows

D : Solaries

Q.no 8. Verification is focused on

A : Product

B : Process

C : Design

D : Testing

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 220/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 9. In order to control cost, defects should ideally be detected in which phase:

A : Coding

B : Design

C : Implementation

D : Requirements Gathering

Q.no 10. The Actions Commands

A : are commands that directly interact with page elements

B : are commands that allow you to store values to a variable

C : are commands that verify if a certain condition is met

D:0

Q.no 11. Which of these are characteristics of a good design?

A : Exhibits strong coupling among between modules

B : Implements all requirements in the analysis model

C : Includes test cases for all components

D : Implements all requirements in the analysis model and provide a complete picture of the software

Q.no 12. Error guessing is a:

A : Test verification techniques

B : Test data management techniques

C : Test control management techniques

D : Test execution techniques

Q.no 13. Which of the following model put much more emphasis on testing?

A : waterfall model

B : agile model

C : spiral model

D : v-v model

Q.no 14. Design phase will usually be.


https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 221/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : Top down

B : Bottom up

C : Randon

D : iterative

Q.no 15. Select the component which is not part of Selenium Suite

A : Selenium IDE

B : Selenium RC

C : SeleniumGrid

D : Selenium Web

Q.no 16. which of the following is not a component of risk

A : Quality risk

B : Performance risk

C : Cost risk

D : Support risk

Q.no 17. Select the browser which is supported by Selenium IDE

A : Google Chrome

B : Opera Mini

C : Mozilla Firefox

D : Internet Explorer

Q.no 18. Consider the following requirement for a word processor software: " The software
should provide facility to import an existing image available as a jpeg file into the document
being created.". Which one of the following types of requirements is this?

A : Functional requirement

B : Non-functional requirement

C : Constraint on the implementation

D : Goal of implementation

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 222/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 19. A software requirements specification (SRS) document should avoid discussing which
one of the following?

A : Functional requirements

B : Non-functional requirements

C : Design specification

D : Constraints on the implementation

Q.no 20. Software Design consists of _____________

A : Software Product Design

B : Software Engineering Design

C : Software Product & Engineering Design

D : Only Software testing

Q.no 21. Before handing over the software to the client, which testing is to be done in-house?

A : Alpha

B : Betta

C : Gamma

D : Theta

Q.no 22. Which of these truly defines Software design?

A : Software design is an activity subjected to constraints

B : Software Design specifies nature and composition of software product

C : Software Design satisfies client needs and desires

D : Software design is an activity subjected to constraints specifies nature and composition of software
product which satisfies client needs and desires

Q.no 23. Select the method which performs a context-click at the curent mouse location

A : click_Context()

B : context.Click()

C : contextClick()

D : context_Click()

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 223/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 24. Test cases are created in which phase?

A : Test Specification

B : Test Planning

C : Test Requirement

D : Test Configuration

Q.no 25. Which of these does not represent object oriented design?

A : Programs are thought of collection of objects

B : It follows regular procedural decomposition in favor of class and object decomposition

C : Central model represents class diagrams that show the classes comprising a program and their
relationships to one another

D : Object-oriented methods incorporates Structural methods

Q.no 26. Software tester focuses more on complex part of the software. Which of the following
testing principle implies this?

A : Testing shows presence of defects

B : Pesticide paradox

C : Testing is context dependent

D : Defect Clustering

Q.no 27. Which of the following is NOT a reasonable test objective:

A : To find faults in the software

B : To give confidence in the software

C : To prove that the software has no faults

D : To find performance problems

Q.no 28. Bug status is set to postpone due to ________.

A : Priority of that bug may low.

B : Lack of time for the release.

C : The bug may not be the major effect in the software.

D : Data may be unavailable.

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 224/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 29. Who leads a formal review process?

A : Author

B : Moderator

C : Reviewer

D : Scribe

Q.no 30. The modification of the software to match changes in the ever changing environment,
falls under which category of software maintenance?

A : Adaptive

B : Corrective

C : perfective

D : preventive

Q.no 31. Which of the following is not a Test Type?

A : Database Testing

B : Security Testing

C : Statement Testing

D : Functional Testing

Q.no 32. Systems that involve interaction with a shared database can be considered as.

A : software-based

B : transaction-based

C : server-based

D : client-based

Q.no 33. Which of the following truly describes Mediators?

A : Encapsulation whereby some components is encased within an alternative abstraction

B : Translation between assumptions of an arbitrary component to some provides assumptions of some


other arbitrary components

C : Incorporation of planning function that in effect results in runtime determination of the translation

D : Repair those cases you have detected by adapting the components

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 225/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 34. After occurence of the risk ,the developement team members do some rapid actions to
overcome the problem called as

A : reactive risk mode

B : proactive risk mode

C : fire fighting mode

D : quick rectification mode

Q.no 35. Webapp configuration object can be managed in much the same way as conventional
software configuration objects except for

A : content items

B : graphic items

C : functional items

D : user items

Q.no 36. Which of the following is not a state of a defect in defect life cycle:

A : Verified

B : New

C : Critical

D : Deferred

Q.no 37. Which of the following risk is the failure of a purchased component to perform as
expected

A : Product risk

B : Business risk

C : Programming risk

D : Project risk

Q.no 38. A software reengineeering process model consists of:

A : code restructuring

B : back engineering

C : document engineerinhg

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 226/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

D : implementation engineering

Q.no 39. Which of the following truly describes Wrappers?

A : Encapsulation whereby some components is encased within an alternative abstraction

B : Translation between assumptions of an arbitrary component to some provides assumptions of some


other arbitrary components

C : cIncorporation of planning function that in effect results in runtime determination of the translation

D : Repair those cases you have detected by adapting the components

Q.no 40. Regression testing is a major part of which of the life cycle?

A : Waterfall model

B : V model

C : Iterative model

D : Agile model

Q.no 41. Maintenance testing is performed using which methodology?

A : Retesting

B : Sanity testing

C : Breadth test and depth test

D : Confirmation testing

Q.no 42. Which of the following is not a Software Configuration Management Activity?

A : Configuration item identification

B : Risk management

C : Release management

D : Branch management

Q.no 43. What allows different projects to use the same source files at the same time?

A : Version Control

B : Access control

C : CM Process

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 227/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

D : Version Control and Access control

Q.no 44. What effect does achievement of quality attribute will have?

A : The achievement of quality attribute will always have a positive effect

B : The achievement of quality attribute will always have a negative effect

C : The achievement of quality attribute will have no effect

D : The achievement of quality attribute will have a positive as well as negative effect

Q.no 45. Which of the following items would not come under Configuration Management?

A : Operating systems

B : Live data

C : Test documentation

D : User requirement documents

Q.no 46. ______provide the mechanisms for assembling SCIs into a version-specific
configuration.

A : Repository

B : versioning

C : modeling

D : assembling

Q.no 47. Which of the following is not an issue to consider when reverse engineering?

A : directionality

B : connectivity

C : completeness

D : abstraction level

Q.no 48. Which of the following pattern is the basis of interaction management in many web-
based systems?

A : model-view-controller

B : repository pattern

C : architecture

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 228/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

D : different operating system

Q.no 49. Which is not a SQA activity?

A : Black box testing

B : White box testing

C : Integration testing

D : Unit testing

Q.no 50. Static analysis can be best described as:

A : The reviewing of test plans

B : The analysis of batch programs

C : The use of black box testing

D : The analysis of program code

Q.no 51. The ability to identify which requirement generated any given work product is known
as

A : forward tracing

B : backward tracing

C : Dependency tracking

D : Change management

Q.no 52. What combines the outward manifestation of the computer-based system , coupled with
all supporting information that describe system syntax and semantics?

A : design model

B : user’s model

C : mental image

D : system image

Q.no 53. Three factors that affect the consequences that are likely to happen if a risk does occur:

A : its nature,
its scope, and its intensity.

B : its nature,
its scope, and its timing.

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 229/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : its nature,
its scope, and its durability.

D : its nature,
its limit, and its timing.

Q.no 54. Which of the following is the component test standard?

A : BS7925-2

B : IEEE 829

C : BS7925-1

D : IEEE 610

Q.no 55. Risk mitigation is a risk ___________activity. Risk monitoring is a ___________ activity

A : Avoidance, Project tracking.

B : Increasing, Project tracking.

C : Project tracking, Avoidance.

D : Random, Tracking.

Q.no 56. Which model describes the static structure of the system using object classes and their
relationships?

A : Structural model

B : Dynamic model

C : Subsystem model

D : Sequence model

Q.no 57. Which of the following type of maintenance takes the maximum chunk of the total
maintenance effort in a typical life cycle of a software product ?

A : Adaptive maintenance

B : Corrective maintenance

C : Preventive maintenance

D : Perfective maintenance

Q.no 58. The __________ enables the software engineer to develop models of the information
domain and functional domain at the same time

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 230/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : Data flow diagram

B : State transition diagram

C : Control specification

D : Activity diagram

Q.no 59. A __________ executes the loop task first, then tests a condition and repeats the task
until the condition fails.

A : repeat until

B : condition

C : do while tests

D : if then-else

Q.no 60. Which of the following is not needed to develop a system design from concept to detailed
object-oriented design?

A : Designing system architecture

B : Developing design models

C : Specifying interfaces

D : Developing a debugging system

Q.no 1. Which of the following statements explains portability in non-functional requirements?

A : It is a degree to which software running on one platform can easily be converted to run on another
platform

B : It cannot be enhanced by using languages, OS’ and tools that are universally available and
standardized

C : The ability of the system to behave consistently in a user-acceptable manner when operating within
the environment for which the system was intended

D : None of the mentioned

Q.no 2. Which of the following is a static test?

A : Coverage analysis

B : Code inspection

C : Usability assessment

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 231/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

D : Installation test

Q.no 3. Select the component which is not a type of assertion in Selenium IDE

A : Assert

B : Verify

C : WaitFor

D : Wait

Q.no 4. Which design model is equivallent to the detailed drawing of accesspoints and external
utilities of a building

A : Architectural Design

B : Component level design

C : Data design

D : Interface design

Q.no 5. Java packages and Fortran subroutine are examples of__________

A : Functions

B : Modules

C : Classes

D : Sub procedures

Q.no 6. How many classification schemes have been developed for NFRs ?

A : Two

B : Three

C : Four

D : Five

Q.no 7. When is the requirement specification activity carried out?

A : During requirements gathering activity

B : Before requirements analysis activity

C : Before requirements gathering activity

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 232/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

D : After requirements analysis activity

Q.no 8. Which one of the following most accurately reflects agile software development?

A : Incremental development

B : Iterative development

C : Linear development

D : Both incremental and iterative development

Q.no 9. Which of the following is not a part of a test design document?

A : Test Plan

B : Test Design Specification

C : Test Case Specification

D : Test Log

Q.no 10. Risk management is responsibility of the

A : Customer

B : Investor

C : Developer

D : Project team

Q.no 11. When testing principles are useful?

A : During testing

B : During execution

C : During review

D : Throughout life-cycle

Q.no 12. What is incorrect about structural design?

A : Structural design introduced notations and heuristics

B : Structural design emphasis on procedural decomposition

C : The advantage is data flow representation

D : It follows Structure chart


https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 233/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 13. What can be used to test Flex/Flash aplication using Selenium

A : FlexUISelenium

B : FlexUI

C : UIFlexSelenium

D : SeleniumFlex

Q.no 14. Alpha testing is:

A : Post-release testing by end user representatives at the developer’s site

B : The first testing that is performed

C : Pre-release testing by end user representatives at their sites

D : Pre-release testing by end user representatives at the developer’s site

Q.no 15. RE represents what

A : Risk expense

B : Related expense

C : Risk exposure

D : Risk evaluation

Q.no 16. Select the command which is used to check the presence of a certain element

A : verifyTable

B : verifyTitlePresent

C : verifyTextPresent

D : verifyElementPresent

Q.no 17. System testing is a

A : Black box testing

B : Grey box testing

C : White box testing

D : Glass box

Q.no 18. Acceptance testing is also known as


https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 234/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : Grey box testing

B : White box testing

C : Alpha Testing

D : Beta testing

Q.no 19. which of the followingis not a configuration object

A : Design specification

B : Test specification

C : source code

D : configuration control

Q.no 20. Testing done without planning and Documentation is called

A : Unit testing

B : Regression testing

C : Adhoc testing

D : None of the mentioned

Q.no 21. Which is/are ways to deal with risk?

A : Mitigate,Contingency

B : Transfer

C : Mitigate,Contingency, Transfer, Ignore

D : Ignore

Q.no 22. Select the tab which gives feedback and other useful information when executing tests

A : Information

B : Feddback

C : Reference

D : Element

Q.no 23. Unit testing is done by:

A : Users
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 235/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

B : Developers

C : Customers

D : None of the mentioned

Q.no 24. Select the command which retrieves the alert message and stores it in a variable that
you will specify

A : storeAlert

B : storedAlert

C : store_Alert

D : storesAlert

Q.no 25. Which one of the following is not a standard software development process model?

A : Waterfall Model

B : Recursive Model

C : RAD Model

D : V Model

Q.no 26. What is “V” Model?

A : Test Design Technique

B : Test Type

C : SDLC Model

D : Test Level

Q.no 27. Three statements are given below regarding the User Interface Design: 1) Place the user
in Control. 2) Reduce user's memory load. 3) Make the interface consistent. These rules are
called as __________.

A : Governed Rule

B : Golden Rule

C : User Rule

D : Thumb Rule

Q.no 28. Requirement Engineering is not concern with ____________.

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 236/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : Requirement Design

B : Requirement Elicitation

C : Requirement Analysis

D : Requirement Documentation

Q.no 29. ETL stands for

A : Data Extraction Transformation & Loading

B : Data Execution Transformation & Loading

C : Extraction Transformation & Loading

D : Execution Transformation & Loading

Q.no 30. What can static analysis NOT find?

A : Memory leaks

B : Unreachable (“dead”) code

C : The use of a variable before it has been defined

D : Array bound violations

Q.no 31. A set of tools that automate the construction of software by ensuring that the proper set
of validated components have been assembled are known as

A : component element

B : process element

C : construction element

D : human elements

Q.no 32. Which of the following statement is true?

A : Exhaustive testing is impossible but practicable

B : Exhaustive testing is possible but impracticable

C : Exhaustive testing is impossible and impracticable

D : Exhaustive testing is possible and practicable

Q.no 33. Which of the following is not a module type

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 237/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : Object modules

B : Hardware modules

C : Functional modules

D : Process support modules

Q.no 34. What is Fault Masking?

A : Creating a test case which does not reveal a fault

B : Error condition hiding another error condition

C : Masking a fault by developer

D : Masking a fault by a tester

Q.no 35. What are the criteria to decide the testing efforts?1. Time and budget
2. Size of development team
3. Size of testers
4. Risk associated with project

A : a. 1, 3, 4

B : b. 1, 2, 3

C : c. 1, 4

D : d. 1, 3

Q.no 36. Which of the following testing method is normally used as acceptance test for a software
system?

A : Regression testing

B : Integration testing

C : Unit testing

D : Functional testing

Q.no 37. In a simple risk table the risks are categorized into

A : PS, BU , CU

B : TU ,DE ,ST

C : BE ,CU ,ST

D : SU , TE ,CU ,PS

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 238/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 38. Which of the following uses Impact Analysis most?

A : Non-functional system testing

B : Component testing

C : User acceptance testing

D : Maintenance testing

Q.no 39. Which architectural style goal is to achieve Portability?

A : Data Flow Architecture

B : Call and Return Architecture

C : Data Centered Architectures

D : Virtual Machine Architecture

Q.no 40. Beta Testing is done at:

A : Developer’s end

B : User’s end

C : User’s & Developer’s end

D : None of the mentioned

Q.no 41. Which architectural style goal is to achieve Modifiability with Reuse?

A : Data Flow Architecture

B : Call and Return Architecture

C : Data Centered Architectures

D : Virtual Machine Architecture

Q.no 42. Which architectural style goal is to achieve Modifiability with Scalability?

A : Data Flow Architecture

B : Call and Return Architecture

C : Data Centered Architectures

D : Virtual Machine Architecture

Q.no 43. RE is the overall risk exposure and is written as:


https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 239/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A:PxC

B:PxM

C:MxC

D:PxS

Q.no 44. The defect cluster change over time. Which of the following testing principle implies
this?

A : Testing shows presence of defects

B : Pesticide paradox

C : Testing is context dependent

D : Defect Clustering

Q.no 45. Which granularity level of testing checks the behavior of module cooperation?

A : Unit Testing

B : Integration Testing

C : Acceptance Testing

D : Regression Testing

Q.no 46. What combines procedures and tools to manage different versions of configuration
objects that are created during the software process?

A : Versioning

B : Audit trails

C : Change control

D : SCI

Q.no 47. Which of the following is not the integration strategy?

A : Big-bang

B : Bottom-up

C : Design based

D : Top-down

Q.no 48. Which of the following truly describes Bridges?

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 240/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : Encapsulation whereby some components is encased within an alternative abstraction

B : Translation between assumptions of an arbitrary component to some provides assumptions of some


other arbitrary components

C : Incorporation of planning function that in effect results in runtime determination of the translation

D : Repair those cases you have detected by adapting the components

Q.no 49. Which of the following is not real-time architectural patterns that are commonly used?

A : Asynchronous communication

B : Observe and React

C : Environmental Control

D : Process Pipeline

Q.no 50. E-Commerce software testing follows different approach than gaming software testing.
Which testing principle implies this?

A : Pareto principle

B : Testing is Context dependent

C : Testing shows presence of defects

D : Absence of errors-fallacy

Q.no 51. Which of the following is not a design principle that allow the user to maintain control?

A : Provide for flexible interaction

B : Allow user interaction to be interrupt-able and undo-able

C : Show technical internals from the casual user

D : Design for direct interaction with objects that appear on the screen

Q.no 52. Which one of these belongs to integration testing in the OO context?

A : Unit testing

B : Regression testing

C : Sandwich testing

D : Thread-based testing

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 241/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 53. Which of the following is likely to benefit most from the use of test tools providing test
capture and replay facilities?

A : Integration testing

B : Regression testing

C : System testing

D : User acceptance testing

Q.no 54. The main focus of ______ is to reduce defects and variations in the processes.

A : QA

B : QC

C : Six Sigma

D : tracking

Q.no 55. Which model shows the flow of object interactions?

A : Structural model

B : Dynamic model

C : Subsystem model

D : Sequence model

Q.no 56. which of the following impact of the risk drivers on risk components is also called as
disastrous impact

A : critical impact

B : catastrophic impact

C : marginal impact

D : Destructive impact

Q.no 57. Which is not a type of incremental testing approach?

A : Bottom up

B : Top down

C : Big-bang

D : Functional incrimination

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 242/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 58. The order in which test levels are performed is:

A : Unit, Integration, Acceptance, System

B : Unit, System, Integration, Acceptance

C : Unit, Integration, System, Acceptance

D : It depends on the nature of a project

Q.no 59. What determines how information is stored in the repository, how data can be accessed
by tools and viewed by software engineers, how well data security and integrity can be
maintained, and how easily the existing model can be extended to accommodate new needs.

A : Data model

B : Meta model

C : Configuration model

D : Test model

Q.no 60. A chronological record of relevant details about the execution of tests is called as, a
_______

A : Test suite

B : Test procedure

C : Test data

D : Test log

Q.no 1. The Selenium RC is used

A : To run your test against different browers on different opearting systems

B : To create test with little or no prior knowledge in programming

C : To test a web application against firefox only

D : To run a huge test suite, that can be executed on multiple machines

Q.no 2. What is TestNG ?

A : TestNextGeneration

B : TestNewGenerlization

C : TestNewGeneration

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 243/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

D : TestNextGenerations

Q.no 3. What is the main technique for achieving portable software?

A : The main technique for achieving portable software is to isolate system dependency

B : The main technique for achieving portable software is to increase the overall performance

C : The main technique for achieving portable software is to have independent platform dependency

D : The main technique for achieving portable software is to have independent platform dependency
and to increase accuracy

Q.no 4. Which command can be used to enter values onto text boxes ?

A : sendsKey()

B : sendKey()

C : sendKeys

D : sendKeys()

Q.no 5. Which one of the following activities spans all stages of a software development life cycle

A : Coding

B : Testing

C : Project management

D : Design

Q.no 6. In software development life cycle , who is the best person to catch a defect?

A : Software Tester

B : Customers

C : Designer

D : Business Analyst

Q.no 7. The Web Driver is used

A : To execute tests on the HTML Unit browser

B : To design a test Using Selenese

C : To quickly create tests

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 244/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

D : To test a web application against Firefox only

Q.no 8. Which of the following is golden rule for interface design?

A : Place the user in control

B : Reduce the user’s memory load

C : Make the interface consistent

D : All of the mentioned

Q.no 9. Select the name which is not the type of locators

A : ID

B : Name

C : Password

D : Link Text

Q.no 10. Consider the following requirement for a word processor software: " The software
should provide facility to import an existing image available as a jpeg file into the document
being created.". Which one of the following types of requirements is this?

A : Functional requirement

B : Non-functional requirement

C : Constraint on the implementation

D : Goal of implementation

Q.no 11. Which one of the following may be experienced by a software development team when it
adopts a systematic development process model in preference to a build-and-fix style of
development?

A : Increased documentation overhead

B : Increased development cost

C : Decreased maintainability

D : Increased development time

Q.no 12. When an expected result is not specified in test case template then ___________.

A : We cannot run the test.

B : It may be difficult to determine if the test has passed or failed.

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 245/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : It may be difficult to repeat the test.

D : We cannot automate the user inputs.

Q.no 13. CTC stands for

A : condition-transaction-consequence

B : condition-transfer-consequence

C : condition-transition-consequence

D : condition-transmission-consequence

Q.no 14. Method which selects the option which displays the text matching the parameter passed
to it

A : selectVisibleText()

B : selectByVisibleText()

C : select_VisibleText()

D : select_ByVisibleText()

Q.no 15. What are the benefits for component based product lines?

A : Being able to take faster advantage of new product and new technology

B : Increase in time to market market

C : Higher employee productivity

D : A disciplined approach to specify as many assumptions about a components interface as is feasible

Q.no 16. Unit testing is carried out during which phase of the waterfall model?

A : Implementation phase

B : Testing phase

C : Maintenance phase

D : Design phase

Q.no 17. Which of these are characteristics of a good design?

A : Exhibits strong coupling among between modules

B : Implements all requirements in the analysis model

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 246/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : Includes test cases for all components

D : Implements all requirements in the analysis model and provide a complete picture of the software

Q.no 18. When users are involved in complex tasks, the demand on __________ can be significant

A : short-term memory

B : shortcuts

C : objects that appear on the screen

D : all of the mentioned

Q.no 19. The importance of software design can be summarized in a single word which is:

A : Efficiency

B : Accuracy

C : Quality

D : Complexity

Q.no 20. Exhaustive testing is

A : always possible

B : practically possible

C : impractical but possible

D : impractical and impossible

Q.no 21. Which one of the following statements most accurately identifies the stakeholders in a
software development project?

A : A shareholder of the organization developing the software

B : Anyone who is interested in the software

C : Anyone who is a source of requirements for the software

D : Anyone who might be affected by the software

Q.no 22. End result of Software Requirement Analysis is ________.

A : Functional and Behavioral

B : Architectural and Structural

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 247/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : Usability and Reliability

D : Algorithmic and Data Structure

Q.no 23. In which of the following type of testing, testing is done without planning and
documentation?

A : Unit testing

B : Retesting

C : Ad hoc testing

D : Regression testing

Q.no 24. The Selenium IDE is used

A : To create customized test results

B : To deploy your tests across multiple environments using Selenium Grid

C : To test with HTML Unit

D : To test a web application against Firefox only

Q.no 25. Source code translation is a part of which re-engineering technique

A : Data re-engineering

B : Refactoring

C : Restructuring

D : Repairing

Q.no 26. A set of tools coupled within a file management system that enables access to and
management of each software configuration item is known as

A : component element

B : process element

C : construction element

D : human elements

Q.no 27. ______provide the mechanisms for assembling SCIs into a version-specific
configuration.

A : Repository

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 248/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

B : versioning

C : modeling

D : assembling

Q.no 28. The nature of Software Application can be characterized by their information

A : Determinacy

B : Content

C : Complexity

D : Both OPTION 2 and OPTION 3

Q.no 29. Which of the following is/are commonly used architectural pattern(s)?

A : Model-View-Controller

B : Layered Architecture

C : Client–server

D : MVC, Layered Architecture and Client–server

Q.no 30. Systems that involve interaction with a shared database can be considered as.

A : software-based

B : transaction-based

C : server-based

D : client-based

Q.no 31. Test wares are handed over to maintenance team during which phase?

A : Test implementation and execution

B : Test closure activity

C : Evaluating exit criteria and reporting

D : Test analysis and design

Q.no 32. Webapp configuration object can be managed in much the same way as conventional
software configuration objects except for

A : content items

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 249/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

B : graphic items

C : functional items

D : user items

Q.no 33. which of the following risk is a potential threat to every software project

A : generic risk

B : project risk

C : product risk

D : business risk

Q.no 34. ________is not a Software Test Life Cycle Phase?

A : Requirements Gathering

B : Test Planning

C : Test Closure

D : Test Design

Q.no 35. Maintenance testing is performed using which methodology?

A : Retesting

B : Sanity testing

C : Breadth test and depth test

D : Confirmation testing

Q.no 36. Regression testing is a major part of which of the life cycle?

A : Waterfall model

B : V model

C : Iterative model

D : Agile model

Q.no 37. Architectural styles is composed of which of the following?

A : A set of component types that perform some function at run-time

B : A topological layout of these components indicating their run-time inter relationships


https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 250/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : Coupling among the client will lessen the effect of data center architecture

D : A set of semantic constraints

Q.no 38. A software reengineeering process model consists of:

A : code restructuring

B : back engineering

C : document engineerinhg

D : implementation engineering

Q.no 39. Bug status is set to postpone due to ________.

A : Priority of that bug may low.

B : Lack of time for the release.

C : The bug may not be the major effect in the software.

D : Data may be unavailable.

Q.no 40. Which of the following is NOT a reasonable test objective:

A : To find faults in the software

B : To give confidence in the software

C : To prove that the software has no faults

D : To find performance problems

Q.no 41. Which of the following is not an issue to consider when reverse engineering?

A : directionality

B : connectivity

C : completeness

D : abstraction level

Q.no 42. Which of the following pattern is the basis of interaction management in many web-
based systems?

A : model-view-controller

B : repository pattern

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 251/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : architecture

D : different operating system

Q.no 43. Static analysis can be best described as:

A : The reviewing of test plans

B : The analysis of batch programs

C : The use of black box testing

D : The analysis of program code

Q.no 44. The technique applied for usability testing is:

A : White box

B : Grey box

C : Black box

D : Combination of all

Q.no 45. Which is not a SQA activity?

A : Black box testing

B : White box testing

C : Integration testing

D : Unit testing

Q.no 46. What allows different projects to use the same source files at the same time?

A : Version Control

B : Access control

C : CM Process

D : Version Control and Access control

Q.no 47. Which of the following is not a software testing generic characteristics?

A : Different testing techniques are appropriate at different points in time

B : Testing is conducted by the developer of the software or an independent test group

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 252/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : Testing and debugging are different activities, but debugging must be accommodated in any testing
strategy

D : None of the mentioned

Q.no 48. What describes how a set of interacting components can share data?

A : model-view-controller

B : repository pattern

C : architecture

D : different operating system

Q.no 49. Which of the following is not a Test Type?

A : Database Testing

B : Security Testing

C : Statement Testing

D : Functional Testing

Q.no 50. which of the following is the highest level in the reverse engineering process

A : testing level

B : abstraction level

C : design level

D : maintainence level

Q.no 51. What combines the outward manifestation of the computer-based system , coupled with
all supporting information that describe system syntax and semantics?

A : design model

B : user’s model

C : mental image

D : system image

Q.no 52. The __________ contains a state transition diagram that is a sequential specification of
behavior.

A : Data flow diagram

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 253/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

B : State transition diagram

C : Control specification

D : Activity diagram

Q.no 53. when SCM is a formal activity the software configuration audit is conducted by

A : testing specialists

B : development team

C : senior managers

D : quality assurance group

Q.no 54. Three factors that affect the consequences that are likely to happen if a risk does occur:

A : its nature,
its scope, and its intensity.

B : its nature,
its scope, and its timing.

C : its nature,
its scope, and its durability.

D : its nature,
its limit, and its timing.

Q.no 55. What mechanism is used to apprise others of changes that are made?

A : Configuration management

B : Requirementss tracing

C : Reporting

D : Change control

Q.no 56. Risk mitigation is a risk ___________activity. Risk monitoring is a ___________ activity

A : Avoidance, Project tracking.

B : Increasing, Project tracking.

C : Project tracking, Avoidance.

D : Random, Tracking.

Q.no 57. Which of the following is the component test standard?

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 254/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : BS7925-2

B : IEEE 829

C : BS7925-1

D : IEEE 610

Q.no 58. The ability to identify which requirement generated any given work product is known
as

A : forward tracing

B : backward tracing

C : Dependency tracking

D : Change management

Q.no 59. The __________ enables the software engineer to develop models of the information
domain and functional domain at the same time

A : Data flow diagram

B : State transition diagram

C : Control specification

D : Activity diagram

Q.no 60. A _________ is a graphical representation that depicts information flow and the
transforms that are applied as data moves from input to output.

A : Data flow diagram

B : State transition diagram

C : Control specification

D : Activity diagram

Q.no 1. Select the command which is used to print a string value of a variable in Selenium IDE

A : The 'display' command

B : The 'echo' command

C : The 'print' command

D : The 'printr' command

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 255/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 2. Select the method which performs a context-click at the curent mouse location

A : click_Context()

B : context.Click()

C : contextClick()

D : context_Click()

Q.no 3. Which design model is equivallent to the detailed drawing of accesspoints and external
utilities of a building

A : Architectural Design

B : Component level design

C : Data design

D : Interface design

Q.no 4. RMMM stands for

A : risk mitigation methodology and management

B : risk mitigation manupulation and management

C : risk mitigation monitoring and management

D : risk mitigation measurement and management

Q.no 5. Reactive risk management is sometimes described as:

A : Fire fighting mode

B : Solution mode

C : Uncertain mode

D : Perfect mode

Q.no 6. Software risk always involves two characteristics. What are those characteristics?

A : Uncertainity & loss

B : Certainity & Profit

C : Staff size and budget

D : Project Deadline and budget

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 256/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 7. Which of the following is not a part of a test design document?

A : Test Plan

B : Test Design Specification

C : Test Case Specification

D : Test Log

Q.no 8. Which of the following are correct statements?

A : An architecture is foremost an abstraction of a system that suppresses details of the components


that do not affect how they are used

B : An architecture is not dependable on requirements

C : An architecture may or may not defines components

D : An architecture is foremost an abstraction of a system that suppresses details of the components


that always affect how they are used

Q.no 9. First graphical user interface used commercially was introduced in

A : 1975

B : 1966

C : 1977

D : 1967

Q.no 10. Select the component which is not a type of assertion in Selenium IDE

A : Assert

B : Verify

C : WaitFor

D : Wait

Q.no 11. When is the requirement specification activity carried out?

A : During requirements gathering activity

B : Before requirements analysis activity

C : Before requirements gathering activity

D : After requirements analysis activity

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 257/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 12. A software component

A : Implements some functionality

B : Has explicit dependencies through provides and required interfaces

C : Communicates through its interfaces only

D : All of the mentioned

Q.no 13. The Selenium

A : provides professional computer support

B : tests reports are generated automatically

C : comes with a built in object repository

D : Cannot access elements outside of the web application under test

Q.no 14. In order to control cost, defects should ideally be detected in which phase:

A : Coding

B : Design

C : Implementation

D : Requirements Gathering

Q.no 15. Select the tab that shows which command Selenium IDE is currently executing

A : Variable

B : Data

C : Information

D : Info

Q.no 16. Which of the following is not a Software Development Life Cycle Phase?

A : Requirements Gathering

B : Test Closure

C : Coding

D : Testing

Q.no 17. Which one of the following is not a requirements gathering technique
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 258/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : Task analysis

B : Scenario analysis

C : Form analysis

D : SRS document review

Q.no 18. Select the tab which gives feedback and other useful information when executing tests

A : Information

B : Feddback

C : Reference

D : Element

Q.no 19. The selenium can

A : access controls within the desktop

B : both web and desktop applications

C : only test web applications

D:0

Q.no 20. Which component of Selenium can create customized test results ?

A : Web Driver

B : Selenium RC

C : Selenium IDE

D : Selenium Grid

Q.no 21. Which one of the following feedback paths is not present in an iterative waterfall
model?

A : Design phase to feasibility study phase

B : Implementation phase to design phase

C : Implementation phase to requirements specification phase

D : Design phase to requirements specification phase.

Q.no 22. Select the language which is supported by the Selenium Web driver

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 259/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : Perl

B : Sql

C : ASP

D : Cobol

Q.no 23. What incorporates data, architectural, interface, and procedural representations of the
software?

A : design model

B : user’s model

C : mental image

D : system image

Q.no 24. Design phase will usually be.

A : Top down

B : Bottom up

C : Randon

D : iterative

Q.no 25. Testing done without planning and Documentation is called

A : Unit testing

B : Regression testing

C : Adhoc testing

D : None of the mentioned

Q.no 26. Beta Testing is done at:

A : Developer’s end

B : User’s end

C : User’s & Developer’s end

D : None of the mentioned

Q.no 27. Which of the following is not real-time architectural patterns that are commonly used?

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 260/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : Asynchronous communication

B : Observe and React

C : Environmental Control

D : Process Pipeline

Q.no 28. A set of tools that automate the construction of software by ensuring that the proper set
of validated components have been assembled are known as

A : component element

B : process element

C : construction element

D : human elements

Q.no 29. which of the following is not a software risk

A : product risk

B : project risk

C : business risk

D : management rsik

Q.no 30. Which of the following truly describes Wrappers?

A : Encapsulation whereby some components is encased within an alternative abstraction

B : Translation between assumptions of an arbitrary component to some provides assumptions of some


other arbitrary components

C : cIncorporation of planning function that in effect results in runtime determination of the translation

D : Repair those cases you have detected by adapting the components

Q.no 31. Software tester focuses more on complex part of the software. Which of the following
testing principle implies this?

A : Testing shows presence of defects

B : Pesticide paradox

C : Testing is context dependent

D : Defect Clustering

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 261/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 32. Which of the following truly describes Mediators?

A : Encapsulation whereby some components is encased within an alternative abstraction

B : Translation between assumptions of an arbitrary component to some provides assumptions of some


other arbitrary components

C : Incorporation of planning function that in effect results in runtime determination of the translation

D : Repair those cases you have detected by adapting the components

Q.no 33. What effect does achievement of quality attribute will have?

A : The achievement of quality attribute will always have a positive effect

B : The achievement of quality attribute will always have a negative effect

C : The achievement of quality attribute will have no effect

D : The achievement of quality attribute will have a positive as well as negative effect

Q.no 34. Which of the following is not a module type

A : Object modules

B : Hardware modules

C : Functional modules

D : Process support modules

Q.no 35. ETL stands for

A : Data Extraction Transformation & Loading

B : Data Execution Transformation & Loading

C : Extraction Transformation & Loading

D : Execution Transformation & Loading

Q.no 36. E-Commerce software testing follows different approach than gaming software testing.
Which testing principle implies this?

A : Pareto principle

B : Testing is Context dependent

C : Testing shows presence of defects

D : Absence of errors-fallacy

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 262/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 37. Which architectural style goal is to achieve Integrability?

A : Data Flow Architecture

B : Call and Return Architecture

C : Data Centered Architectures

D : Virtual Machine Architecture

Q.no 38. The modification of the software to match changes in the ever changing environment,
falls under which category of software maintenance?

A : Adaptive

B : Corrective

C : perfective

D : preventive

Q.no 39. What is “V” Model?

A : Test Design Technique

B : Test Type

C : SDLC Model

D : Test Level

Q.no 40. What combines procedures and tools to manage different versions of configuration
objects that are created during the software process?

A : Versioning

B : Audit trails

C : Change control

D : SCI

Q.no 41. Which architectural style goal is to achieve Modifiability with Reuse?

A : Data Flow Architecture

B : Call and Return Architecture

C : Data Centered Architectures

D : Virtual Machine Architecture

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 263/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 42. Requirement Engineering is not concern with ____________.

A : Requirement Design

B : Requirement Elicitation

C : Requirement Analysis

D : Requirement Documentation

Q.no 43. Which of the following uses Impact Analysis most?

A : Non-functional system testing

B : Component testing

C : User acceptance testing

D : Maintenance testing

Q.no 44. Which of the following is not a Software Configuration Management Activity?

A : Configuration item identification

B : Risk management

C : Release management

D : Branch management

Q.no 45. RE is the overall risk exposure and is written as:

A:PxC

B:PxM

C:MxC

D:PxS

Q.no 46. Which of the following items would not come under Configuration Management?

A : Operating systems

B : Live data

C : Test documentation

D : User requirement documents

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 264/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 47. Which of the following risk is the failure of a purchased component to perform as
expected

A : Product risk

B : Business risk

C : Programming risk

D : Project risk

Q.no 48. Which of the following statement is true?

A : Exhaustive testing is impossible but practicable

B : Exhaustive testing is possible but impracticable

C : Exhaustive testing is impossible and impracticable

D : Exhaustive testing is possible and practicable

Q.no 49. Version control is not capable of doing

A : enables any version to be constructed using differences from past versions

B : a make facility that enables you to collect all relevant configuration objects and construct a specific
version of the software.

C : If the central database is corrupted, the entire history remains safe and secured

D : a project database repository that stores all relevant configuration objects

Q.no 50. The defect cluster change over time. Which of the following testing principle implies
this?

A : Testing shows presence of defects

B : Pesticide paradox

C : Testing is context dependent

D : Defect Clustering

Q.no 51. Which model shows the flow of object interactions?

A : Structural model

B : Dynamic model

C : Subsystem model

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 265/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

D : Sequence model

Q.no 52. When a cost to remove defect is not high?

A : During requirement analysis

B : During designing

C : During coding

D : During testing

Q.no 53. Which one of these belongs to integration testing in the OO context?

A : Unit testing

B : Regression testing

C : Sandwich testing

D : Thread-based testing

Q.no 54. A __________ executes the loop task first, then tests a condition and repeats the task
until the condition fails.

A : repeat until

B : condition

C : do while tests

D : if then-else

Q.no 55. Which model describes the static structure of the system using object classes and their
relationships?

A : Structural model

B : Dynamic model

C : Subsystem model

D : Sequence model

Q.no 56. Which of the following is likely to benefit most from the use of test tools providing test
capture and replay facilities?

A : Integration testing

B : Regression testing

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 266/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : System testing

D : User acceptance testing

Q.no 57. The order in which test levels are performed is:

A : Unit, Integration, Acceptance, System

B : Unit, System, Integration, Acceptance

C : Unit, Integration, System, Acceptance

D : It depends on the nature of a project

Q.no 58. which of the following impact of the risk drivers on risk components is also called as
disastrous impact

A : critical impact

B : catastrophic impact

C : marginal impact

D : Destructive impact

Q.no 59. Which is not a type of incremental testing approach?

A : Bottom up

B : Top down

C : Big-bang

D : Functional incrimination

Q.no 60. Which of the following type of maintenance takes the maximum chunk of the total
maintenance effort in a typical life cycle of a software product ?

A : Adaptive maintenance

B : Corrective maintenance

C : Preventive maintenance

D : Perfective maintenance

Q.no 1. Verification is the responsibility of

A : Developer

B : Designer

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 267/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : Tester

D : QA Team

Q.no 2. RE represents what

A : Risk expense

B : Related expense

C : Risk exposure

D : Risk evaluation

Q.no 3. Select the command which is used to compare the actual page title with an expected value

A : verifyTitle

B : verifiedTitle

C : verifyTitles

D : verifiedTitles

Q.no 4. Agile model advocates which one of the following approaches?

A : In each increment, get something “quick and dirty” delivered and thereby save time

B : In each increment, get something simple released as quickly as possible

C : In each increment, get something of business-value delivered as quickly as possible, consistent with
the right level of quality

D : In each increment, get something delivered once it has been fully documented and the
documentation has been signed off as complete

Q.no 5. What is Cyclomatic complexity?

A : Black box testing

B : White box testing

C : Yellow box testing

D : Green box testing

Q.no 6. select the variation which locates elements by the value of their "id" attribute in Web
Driver Selenium

A : By.id

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 268/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

B : By.idno

C : By.id_no

D : By.tag_id

Q.no 7. The operation phase of the waterfall model is a synonym for which one of the following
phases?

A : Coding and unit testing phase

B : Integration and system testing phase

C : Maintenance phase

D : Design phase

Q.no 8. In which of the following type of testing, testing is done without planning and
documentation?

A : Unit testing

B : Retesting

C : Ad hoc testing

D : Regression testing

Q.no 9. Which of these does not represent object oriented design?

A : Programs are thought of collection of objects

B : It follows regular procedural decomposition in favor of class and object decomposition

C : Central model represents class diagrams that show the classes comprising a program and their
relationships to one another

D : Object-oriented methods incorporates Structural methods

Q.no 10. Java packages and Fortran subroutine are examples of__________

A : Functions

B : Modules

C : Classes

D : Sub procedures

Q.no 11. What does “Every software system has an architecture” implies?

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 269/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : Architecture an exist independently of its description or specification

B : All the system to be stable should posses an architecture

C : System itself is a component

D : Component itself is a system and hence architecture

Q.no 12. Which one of the following statements most accurately identifies the stakeholders in a
software development project?

A : A shareholder of the organization developing the software

B : Anyone who is interested in the software

C : Anyone who is a source of requirements for the software

D : Anyone who might be affected by the software

Q.no 13. The UML was designed for describing _________

A : object-oriented systems

B : architectural design

C : SRS

D : Both object-oriented systems and Architectural design

Q.no 14. Consider the following partial description of the IIT security software. “A camera at the
main gate should detect an incoming vehicle, and the gate should be opened for registered
vehicles.” Which one of the following types of requirements is this?

A : Functional requirement

B : Non-Functional requirement

C : Design requirement

D : Design constraint

Q.no 15. Which of the following is not a user interface design process?

A : User, task, and environment analysis and modeling

B : Interface design

C : Knowledgeable, frequent users

D : Interface validation

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 270/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 16. A software requirements specification (SRS) document should avoid discussing which
one of the following?

A : Functional requirements

B : Non-functional requirements

C : Design specification

D : Constraints on the implementation

Q.no 17. A program with high cyclometic complexity is likely to be:

A : Large

B : Small

C : Difficult to write

D : Difficult to test

Q.no 18. Out of the following which is not a wait comand

A : waitForTitle

B : waitForTextPresent

C : waitForActive

D : waitForAlert

Q.no 19. Choose the incorrect statement with respect to Non-Functional Requirement(NFR)

A : Product-oriented Approach – Focus on system (or software) quality

B : Process-oriented Approach – Focus on how NFRs can be used in the design process

C : Quantitative Approach – Find measurable scales for the functionality attributes

D : Qualitative Approach – Study various relationships between quality goals

Q.no 20. What can be used to test Flex/Flash aplication using Selenium

A : FlexUISelenium

B : FlexUI

C : UIFlexSelenium

D : SeleniumFlex

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 271/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 21. The Actions Commands

A : are commands that directly interact with page elements

B : are commands that allow you to store values to a variable

C : are commands that verify if a certain condition is met

D:0

Q.no 22. Which of the following statements explains portability in non-functional requirements?

A : It is a degree to which software running on one platform can easily be converted to run on another
platform

B : It cannot be enhanced by using languages, OS’ and tools that are universally available and
standardized

C : The ability of the system to behave consistently in a user-acceptable manner when operating within
the environment for which the system was intended

D : None of the mentioned

Q.no 23. Which of the following model put much more emphasis on testing?

A : waterfall model

B : agile model

C : spiral model

D : v-v model

Q.no 24. Which one of the following is a functional requirement ?

A : Maintainability

B : Portability

C : Robustness

D : None of the mentioned

Q.no 25. Select the command in SeleniumIDE used to open a web page using theURL

A : OpenRecord

B : Open

C : OpenText

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 272/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

D : OpenTable

Q.no 26. What can static analysis NOT find?

A : Memory leaks

B : Unreachable (“dead”) code

C : The use of a variable before it has been defined

D : Array bound violations

Q.no 27. Which of the following truly describes Bridges?

A : Encapsulation whereby some components is encased within an alternative abstraction

B : Translation between assumptions of an arbitrary component to some provides assumptions of some


other arbitrary components

C : Incorporation of planning function that in effect results in runtime determination of the translation

D : Repair those cases you have detected by adapting the components

Q.no 28. What describes how a set of interacting components can share data?

A : model-view-controller

B : repository pattern

C : architecture

D : different operating system

Q.no 29. Three statements are given below regarding the User Interface Design: 1) Place the user
in Control. 2) Reduce user's memory load. 3) Make the interface consistent. These rules are
called as __________.

A : Governed Rule

B : Golden Rule

C : User Rule

D : Thumb Rule

Q.no 30. What is the major improvement in SVN

A : it allows to rollback of commit

B : addition of atomic commits

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 273/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : supported everywhere

D : each file is processed independently

Q.no 31. Bug status is set to postpone due to ________.

A : Priority of that bug may low.

B : Lack of time for the release.

C : The bug may not be the major effect in the software.

D : Data may be unavailable.

Q.no 32. Which of the following is NOT a reasonable test objective:

A : To find faults in the software

B : To give confidence in the software

C : To prove that the software has no faults

D : To find performance problems

Q.no 33. What are the criteria to decide the testing efforts?1. Time and budget
2. Size of development team
3. Size of testers
4. Risk associated with project

A : a. 1, 3, 4

B : b. 1, 2, 3

C : c. 1, 4

D : d. 1, 3

Q.no 34. Architectural styles is composed of which of the following?

A : A set of component types that perform some function at run-time

B : A topological layout of these components indicating their run-time inter relationships

C : Coupling among the client will lessen the effect of data center architecture

D : A set of semantic constraints

Q.no 35. which of the following is the highest level in the reverse engineering process

A : testing level

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 274/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

B : abstraction level

C : design level

D : maintainence level

Q.no 36. Regression testing is a major part of which of the life cycle?

A : Waterfall model

B : V model

C : Iterative model

D : Agile model

Q.no 37. What is Fault Masking?

A : Creating a test case which does not reveal a fault

B : Error condition hiding another error condition

C : Masking a fault by developer

D : Masking a fault by a tester

Q.no 38. Which is not a SQA activity?

A : Black box testing

B : White box testing

C : Integration testing

D : Unit testing

Q.no 39. Which of the following pattern is the basis of interaction management in many web-
based systems?

A : model-view-controller

B : repository pattern

C : architecture

D : different operating system

Q.no 40. Systems that involve interaction with a shared database can be considered as.

A : software-based

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 275/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

B : transaction-based

C : server-based

D : client-based

Q.no 41. Which of the following is not an issue to consider when reverse engineering?

A : directionality

B : connectivity

C : completeness

D : abstraction level

Q.no 42. Which of the following testing method is normally used as acceptance test for a software
system?

A : Regression testing

B : Integration testing

C : Unit testing

D : Functional testing

Q.no 43. Which architectural style goal is to achieve Modifiability with Scalability?

A : Data Flow Architecture

B : Call and Return Architecture

C : Data Centered Architectures

D : Virtual Machine Architecture

Q.no 44. Software testing are most effective if applied immediately after

A : Requirement Specification

B : Design

C : Coding

D : Integration

Q.no 45. Which of the following is not a Test Type?

A : Database Testing

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 276/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

B : Security Testing

C : Statement Testing

D : Functional Testing

Q.no 46. After occurence of the risk ,the developement team members do some rapid actions to
overcome the problem called as

A : reactive risk mode

B : proactive risk mode

C : fire fighting mode

D : quick rectification mode

Q.no 47. Who leads a formal review process?

A : Author

B : Moderator

C : Reviewer

D : Scribe

Q.no 48. which of the following risk is a potential threat to every software project

A : generic risk

B : project risk

C : product risk

D : business risk

Q.no 49. Which of the following is/are commonly used architectural pattern(s)?

A : Model-View-Controller

B : Layered Architecture

C : Client–server

D : MVC, Layered Architecture and Client–server

Q.no 50. Which of the following is not the integration strategy?

A : Big-bang

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 277/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

B : Bottom-up

C : Design based

D : Top-down

Q.no 51. Risk mitigation is a risk ___________activity. Risk monitoring is a ___________ activity

A : Avoidance, Project tracking.

B : Increasing, Project tracking.

C : Project tracking, Avoidance.

D : Random, Tracking.

Q.no 52. What determines how information is stored in the repository, how data can be accessed
by tools and viewed by software engineers, how well data security and integrity can be
maintained, and how easily the existing model can be extended to accommodate new needs.

A : Data model

B : Meta model

C : Configuration model

D : Test model

Q.no 53. The __________ contains a state transition diagram that is a sequential specification of
behavior.

A : Data flow diagram

B : State transition diagram

C : Control specification

D : Activity diagram

Q.no 54. A product is re-engineered when

A : system crashes frequently

B : tools to support restructuring are disabled

C : hardware or software support becomes obsolete

D : subsystems of a larger system require few maintenance

Q.no 55. Which of the following is not a design principle that allow the user to maintain control?

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 278/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : Provide for flexible interaction

B : Allow user interaction to be interrupt-able and undo-able

C : Show technical internals from the casual user

D : Design for direct interaction with objects that appear on the screen

Q.no 56. A chronological record of relevant details about the execution of tests is called as, a
_______

A : Test suite

B : Test procedure

C : Test data

D : Test log

Q.no 57. which control helps to ensure that parallel changes, performed by two different people,
don’t overwrite one another.

A : version control

B : synchronization control

C : access control

D : configuration control

Q.no 58. The __________ enables the software engineer to develop models of the information
domain and functional domain at the same time

A : Data flow diagram

B : State transition diagram

C : Control specification

D : Activity diagram

Q.no 59. The ability to identify which requirement generated any given work product is known
as

A : forward tracing

B : backward tracing

C : Dependency tracking

D : Change management

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 279/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 60. What mechanism is used to apprise others of changes that are made?

A : Configuration management

B : Requirementss tracing

C : Reporting

D : Change control

Q.no 1. Exhaustive testing is

A : always possible

B : practically possible

C : impractical but possible

D : impractical and impossible

Q.no 2. The Selenium IDE is used

A : To create customized test results

B : To deploy your tests across multiple environments using Selenium Grid

C : To test with HTML Unit

D : To test a web application against Firefox only

Q.no 3. Which lines depict that architecture defines constraints on an implementation?

A : An implementation exhibits an architecture if it conforms to the structural decisions described by


the architecture

B : The implementation need not be divided into prescribed components

C : An implementation exhibits an architecture if it conforms to the structural decisions described by


the architecture and the implementation must be divided into prescribed components

D : An implementation exhibits an architecture if it conforms to the structural decisions described by


the architecture whereas implementation need not be divided into prescribed components

Q.no 4. Which of these are characteristics of a good design?

A : Exhibits strong coupling among between modules

B : Implements all requirements in the analysis model

C : Includes test cases for all components

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 280/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

D : Implements all requirements in the analysis model and provide a complete picture of the software

Q.no 5. A ________ view shows the system hardware and how software components are
distributed across the processors in the system.

A : physical

B : logical

C : process

D: all of the mentioned

Q.no 6. Which one of the following phases accounts for the maximum effort during development
of a typical software?

A : Coding

B : Testing

C : Designing

D : Specification

Q.no 7. The implementation phase of the waterfall model is a synonym for which one of the
following phases?

A : Coding and unit testing phase

B : Integration and system testing phase

C : Maintenance phase

D : Design phase

Q.no 8. The Web Driver is used

A : To execute tests on the HTML Unit browser

B : To design a test Using Selenese

C : To quickly create tests

D : To test a web application against Firefox only

Q.no 9. System testing is a

A : Black box testing

B : Grey box testing

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 281/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : White box testing

D : Glass box

Q.no 10. Which is/are ways to deal with risk?

A : Mitigate,Contingency

B : Transfer

C : Mitigate,Contingency, Transfer, Ignore

D : Ignore

Q.no 11. Select the method which clears all selected entries in Web Driver Selenium

A : dselectAll()

B : deselect_Al()

C : dselect_Al()

D : deselectAll()

Q.no 12. RMMM stands for

A : risk mitigation methodology and management

B : risk mitigation manupulation and management

C : risk mitigation monitoring and management

D : risk mitigation measurement and management

Q.no 13. Which design model is equivallent to set of detailed drawing for each room of a building

A : Architectural Design

B : Component level design

C : Data design

D : Interface design

Q.no 14. First graphical user interface used commercially was introduced in

A : 1975

B : 1966

C : 1977
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 282/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

D : 1967

Q.no 15. Which is not the other name for structural testing?

A : Behavioral testing

B : Glass box testing

C : White box testing

D : None of the above

Q.no 16. Which one of the following activities spans all stages of a software development life cycle

A : Coding

B : Testing

C : Project management

D : Design

Q.no 17. Which Testing is performed first?

A : Black box testing

B : White box testing

C : Dynamic testing

D : Static testing

Q.no 18. Which one of the following feedback paths is not present in an iterative waterfall
model?

A : Design phase to feasibility study phase

B : Implementation phase to design phase

C : Implementation phase to requirements specification phase

D : Design phase to requirements specification phase.

Q.no 19. Validation is focused on

A : Product

B : Process

C : Design

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 283/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

D : Testing

Q.no 20. Which of the following is golden rule for interface design?

A : Place the user in control

B : Reduce the user’s memory load

C : Make the interface consistent

D : All of the mentioned

Q.no 21. In case of Selenium IDE, the source view shows your script in

A : DHTML format

B : XML format

C : j2EE format

D : HTML format

Q.no 22. What is the main technique for achieving portable software?

A : The main technique for achieving portable software is to isolate system dependency

B : The main technique for achieving portable software is to increase the overall performance

C : The main technique for achieving portable software is to have independent platform dependency

D : The main technique for achieving portable software is to have independent platform dependency
and to increase accuracy

Q.no 23. Which one of the following is not a step of requirement engineering?

A : elicitation

B : design

C : analysis

D : documentation

Q.no 24. Project risk factor is considered in which model?

A : Spiral model.

B : Waterfall model.

C : Prototyping model

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 284/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

D : Incremental Model.

Q.no 25. Software risk always involves two characteristics. What are those characteristics?

A : Uncertainity & loss

B : Certainity & Profit

C : Staff size and budget

D : Project Deadline and budget

Q.no 26. What is “V” Model?

A : Test Design Technique

B : Test Type

C : SDLC Model

D : Test Level

Q.no 27. The modification of the software to match changes in the ever changing environment,
falls under which category of software maintenance?

A : Adaptive

B : Corrective

C : perfective

D : preventive

Q.no 28. Which architectural style goal is to achieve Portability?

A : Data Flow Architecture

B : Call and Return Architecture

C : Data Centered Architectures

D : Virtual Machine Architecture

Q.no 29. Maintenance testing is performed using which methodology?

A : Retesting

B : Sanity testing

C : Breadth test and depth test

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 285/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

D : Confirmation testing

Q.no 30. Which granularity level of testing checks the behavior of module cooperation?

A : Unit Testing

B : Integration Testing

C : Acceptance Testing

D : Regression Testing

Q.no 31. Which of the following truly describes Wrappers?

A : Encapsulation whereby some components is encased within an alternative abstraction

B : Translation between assumptions of an arbitrary component to some provides assumptions of some


other arbitrary components

C : cIncorporation of planning function that in effect results in runtime determination of the translation

D : Repair those cases you have detected by adapting the components

Q.no 32. A set of tools that automate the construction of software by ensuring that the proper set
of validated components have been assembled are known as

A : component element

B : process element

C : construction element

D : human elements

Q.no 33. The defect cluster change over time. Which of the following testing principle implies
this?

A : Testing shows presence of defects

B : Pesticide paradox

C : Testing is context dependent

D : Defect Clustering

Q.no 34. Which of the following is not a Software Configuration Management Activity?

A : Configuration item identification

B : Risk management

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 286/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : Release management

D : Branch management

Q.no 35. Which of the following risk is the failure of a purchased component to perform as
expected

A : Product risk

B : Business risk

C : Programming risk

D : Project risk

Q.no 36. Which architectural style goal is to achieve Integrability?

A : Data Flow Architecture

B : Call and Return Architecture

C : Data Centered Architectures

D : Virtual Machine Architecture

Q.no 37. ETL stands for

A : Data Extraction Transformation & Loading

B : Data Execution Transformation & Loading

C : Extraction Transformation & Loading

D : Execution Transformation & Loading

Q.no 38. Which of the following is not a state of a defect in defect life cycle:

A : Verified

B : New

C : Critical

D : Deferred

Q.no 39. ______provide the mechanisms for assembling SCIs into a version-specific
configuration.

A : Repository

B : versioning

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 287/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : modeling

D : assembling

Q.no 40. What allows different projects to use the same source files at the same time?

A : Version Control

B : Access control

C : CM Process

D : Version Control and Access control

Q.no 41. A set of tools coupled within a file management system that enables access to and
management of each software configuration item is known as

A : component element

B : process element

C : construction element

D : human elements

Q.no 42. Which of the following items would not come under Configuration Management?

A : Operating systems

B : Live data

C : Test documentation

D : User requirement documents

Q.no 43. What effect does achievement of quality attribute will have?

A : The achievement of quality attribute will always have a positive effect

B : The achievement of quality attribute will always have a negative effect

C : The achievement of quality attribute will have no effect

D : The achievement of quality attribute will have a positive as well as negative effect

Q.no 44. In a simple risk table the risks are categorized into

A : PS, BU , CU

B : TU ,DE ,ST

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 288/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : BE ,CU ,ST

D : SU , TE ,CU ,PS

Q.no 45. Which of the following is not real-time architectural patterns that are commonly used?

A : Asynchronous communication

B : Observe and React

C : Environmental Control

D : Process Pipeline

Q.no 46. What combines procedures and tools to manage different versions of configuration
objects that are created during the software process?

A : Versioning

B : Audit trails

C : Change control

D : SCI

Q.no 47. Which of the following statement is true?

A : Exhaustive testing is impossible but practicable

B : Exhaustive testing is possible but impracticable

C : Exhaustive testing is impossible and impracticable

D : Exhaustive testing is possible and practicable

Q.no 48. Version control is not capable of doing

A : enables any version to be constructed using differences from past versions

B : a make facility that enables you to collect all relevant configuration objects and construct a specific
version of the software.

C : If the central database is corrupted, the entire history remains safe and secured

D : a project database repository that stores all relevant configuration objects

Q.no 49. which of the following is not a software risk

A : product risk

B : project risk

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 289/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : business risk

D : management rsik

Q.no 50. Which of the following is not a software testing generic characteristics?

A : Different testing techniques are appropriate at different points in time

B : Testing is conducted by the developer of the software or an independent test group

C : Testing and debugging are different activities, but debugging must be accommodated in any testing
strategy

D : None of the mentioned

Q.no 51. Which of the following type of maintenance takes the maximum chunk of the total
maintenance effort in a typical life cycle of a software product ?

A : Adaptive maintenance

B : Corrective maintenance

C : Preventive maintenance

D : Perfective maintenance

Q.no 52. When a cost to remove defect is not high?

A : During requirement analysis

B : During designing

C : During coding

D : During testing

Q.no 53. What combines the outward manifestation of the computer-based system , coupled with
all supporting information that describe system syntax and semantics?

A : design model

B : user’s model

C : mental image

D : system image

Q.no 54. The order in which test levels are performed is:

A : Unit, Integration, Acceptance, System

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 290/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

B : Unit, System, Integration, Acceptance

C : Unit, Integration, System, Acceptance

D : It depends on the nature of a project

Q.no 55. Which is not a type of incremental testing approach?

A : Bottom up

B : Top down

C : Big-bang

D : Functional incrimination

Q.no 56. Three factors that affect the consequences that are likely to happen if a risk does occur:

A : its nature,
its scope, and its intensity.

B : its nature,
its scope, and its timing.

C : its nature,
its scope, and its durability.

D : its nature,
its limit, and its timing.

Q.no 57. The main focus of ______ is to reduce defects and variations in the processes.

A : QA

B : QC

C : Six Sigma

D : tracking

Q.no 58. Which of the following is likely to benefit most from the use of test tools providing test
capture and replay facilities?

A : Integration testing

B : Regression testing

C : System testing

D : User acceptance testing

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 291/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 59. Which one of these belongs to integration testing in the OO context?

A : Unit testing

B : Regression testing

C : Sandwich testing

D : Thread-based testing

Q.no 60. A _________ is a graphical representation that depicts information flow and the
transforms that are applied as data moves from input to output.

A : Data flow diagram

B : State transition diagram

C : Control specification

D : Activity diagram

Q.no 1. Select the method which selects the option at the at the given index

A : selectByIndex()

B : selectIndex()

C : selectedByIndex()

D : selectByIndexes()

Q.no 2. CTC stands for

A : condition-transaction-consequence

B : condition-transfer-consequence

C : condition-transition-consequence

D : condition-transmission-consequence

Q.no 3. What type of abstraction used in Software design

A : Control, data, environmental

B : Data, environmental, procedural

C : Control, data, procedural

D : Control, Environmental, procedural

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 292/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 4. Coupling is a qualitative indication of the degree to which a module

A : can be written more compactly

B : focuses on just one thing

C : is able to complete its function in a timely manner

D : is connected to other modules and the outside world

Q.no 5. SCM stands for

A : Software Control Management

B : Software Configuration Management

C : Software Concept Management

D : Software Course Management

Q.no 6. Which of the following is not a design principle that allows the user to maintain control?

A : Provide for flexible interaction

B : Allow user interaction to be interrupt-able and undo-able

C : Show technical internals from the casual user

D : Design for direct interaction with objects that appear on the screen

Q.no 7. Which one of the following is not a requirements gathering technique

A : Task analysis

B : Scenario analysis

C : Form analysis

D : SRS document review

Q.no 8. Which one of the following is a requirement that fits in a developer’s module ?

A : Availability

B : Testability

C : Usability

D : Flexibility

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 293/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 9. Select the command that will not wait for the new page to load before moving on to the
next command

A : clickAndWait

B : typeAndWait

C : selectAndWait

D : selectAndType

Q.no 10. The expected results of the software is _________________.

A : Only important in system testing

B : Only used in component testing

C : Most useful when specified in advance

D : Derived from the code.

Q.no 11. Which of the following is a static test?

A : Coverage analysis

B : Code inspection

C : Usability assessment

D : Installation test

Q.no 12. When a company plans to develop a generic product, who among the following is
usually the source of the requirements?

A : Development team members

B : Project manager

C : Marketing personnel

D : Personnel from finance department

Q.no 13. Select the command which is used to pause execution until the page is loaded completely

A : waitForPageToLoad

B : waitForElementPresent

C : waitForPage

D : waitForLoad

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 294/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 14. Testing of software with actual data and in actual environment is known as?

A : Regression testing

B : Beta testing

C : Alpha testing

D : None of the above

Q.no 15. Which Selenium Component Supports all operating systems

A : Selenium Generator

B : Selenium IDE

C : Selenium WebDriver

D:0

Q.no 16. Selenium IDE stands for

A : Selenium Initialization Development Environment

B : Selenium Interrelated Development Environment

C : Selenium Integrated Development Environment

D : Selenium Information Development Environment

Q.no 17. Software Design consists of _____________

A : Software Product Design

B : Software Engineering Design

C : Software Product & Engineering Design

D : Only Software testing

Q.no 18. Which of the following are correct statements?

A : An architecture is foremost an abstraction of a system that suppresses details of the components


that do not affect how they are used

B : An architecture is not dependable on requirements

C : An architecture may or may not defines components

D : An architecture is foremost an abstraction of a system that suppresses details of the components


that always affect how they are used

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 295/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 19. Select the component which is not part of Selenium Suite

A : Selenium IDE

B : Selenium RC

C : SeleniumGrid

D : Selenium Web

Q.no 20. White-box testing can be started:

A : After installation

B : After SRS creation

C : After programming

D : After designing

Q.no 21. Verification is focused on

A : Product

B : Process

C : Design

D : Testing

Q.no 22. The Selenium RC is used

A : To run your test against different browers on different opearting systems

B : To create test with little or no prior knowledge in programming

C : To test a web application against firefox only

D : To run a huge test suite, that can be executed on multiple machines

Q.no 23. A software requirements specification (SRS) document should avoid discussing which
one of the following?

A : Functional requirements

B : Non-functional requirements

C : Design specification

D : Constraints on the implementation

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 296/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 24. which of the followingis not a configuration object

A : Design specification

B : Test specification

C : source code

D : configuration control

Q.no 25. Verification and Validation uses __________.

A : Internal and External resources respectively.

B : Internal resources only.

C : External resources only.

D : External and Internal resources respectively.

Q.no 26. Which of the following truly describes Bridges?

A : Encapsulation whereby some components is encased within an alternative abstraction

B : Translation between assumptions of an arbitrary component to some provides assumptions of some


other arbitrary components

C : Incorporation of planning function that in effect results in runtime determination of the translation

D : Repair those cases you have detected by adapting the components

Q.no 27. which of the following risk is a potential threat to every software project

A : generic risk

B : project risk

C : product risk

D : business risk

Q.no 28. Which is not a SQA activity?

A : Black box testing

B : White box testing

C : Integration testing

D : Unit testing

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 297/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 29. The technique applied for usability testing is:

A : White box

B : Grey box

C : Black box

D : Combination of all

Q.no 30. What is the major improvement in SVN

A : it allows to rollback of commit

B : addition of atomic commits

C : supported everywhere

D : each file is processed independently

Q.no 31. ________is not a Software Test Life Cycle Phase?

A : Requirements Gathering

B : Test Planning

C : Test Closure

D : Test Design

Q.no 32. Who leads a formal review process?

A : Author

B : Moderator

C : Reviewer

D : Scribe

Q.no 33. Architectural styles is composed of which of the following?

A : A set of component types that perform some function at run-time

B : A topological layout of these components indicating their run-time inter relationships

C : Coupling among the client will lessen the effect of data center architecture

D : A set of semantic constraints

Q.no 34. which of the following is the highest level in the reverse engineering process
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 298/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : testing level

B : abstraction level

C : design level

D : maintainence level

Q.no 35. Which of the following truly describes Mediators?

A : Encapsulation whereby some components is encased within an alternative abstraction

B : Translation between assumptions of an arbitrary component to some provides assumptions of some


other arbitrary components

C : Incorporation of planning function that in effect results in runtime determination of the translation

D : Repair those cases you have detected by adapting the components

Q.no 36. Webapp configuration object can be managed in much the same way as conventional
software configuration objects except for

A : content items

B : graphic items

C : functional items

D : user items

Q.no 37. Beta Testing is done at:

A : Developer’s end

B : User’s end

C : User’s & Developer’s end

D : None of the mentioned

Q.no 38. Which of the following is not a module type

A : Object modules

B : Hardware modules

C : Functional modules

D : Process support modules

Q.no 39. What describes how a set of interacting components can share data?

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 299/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : model-view-controller

B : repository pattern

C : architecture

D : different operating system

Q.no 40. RE is the overall risk exposure and is written as:

A:PxC

B:PxM

C:MxC

D:PxS

Q.no 41. What can static analysis NOT find?

A : Memory leaks

B : Unreachable (“dead”) code

C : The use of a variable before it has been defined

D : Array bound violations

Q.no 42. Software tester focuses more on complex part of the software. Which of the following
testing principle implies this?

A : Testing shows presence of defects

B : Pesticide paradox

C : Testing is context dependent

D : Defect Clustering

Q.no 43. Which of the following pattern is the basis of interaction management in many web-
based systems?

A : model-view-controller

B : repository pattern

C : architecture

D : different operating system

Q.no 44. Which of the following uses Impact Analysis most?

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 300/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : Non-functional system testing

B : Component testing

C : User acceptance testing

D : Maintenance testing

Q.no 45. A software reengineeering process model consists of:

A : code restructuring

B : back engineering

C : document engineerinhg

D : implementation engineering

Q.no 46. Which of the following is/are commonly used architectural pattern(s)?

A : Model-View-Controller

B : Layered Architecture

C : Client–server

D : MVC, Layered Architecture and Client–server

Q.no 47. Which of the following is not an issue to consider when reverse engineering?

A : directionality

B : connectivity

C : completeness

D : abstraction level

Q.no 48. Requirement Engineering is not concern with ____________.

A : Requirement Design

B : Requirement Elicitation

C : Requirement Analysis

D : Requirement Documentation

Q.no 49. Static analysis can be best described as:

A : The reviewing of test plans


https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 301/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

B : The analysis of batch programs

C : The use of black box testing

D : The analysis of program code

Q.no 50. Which of the following is NOT a reasonable test objective:

A : To find faults in the software

B : To give confidence in the software

C : To prove that the software has no faults

D : To find performance problems

Q.no 51. Which model describes the static structure of the system using object classes and their
relationships?

A : Structural model

B : Dynamic model

C : Subsystem model

D : Sequence model

Q.no 52. Which of the following is not needed to develop a system design from concept to detailed
object-oriented design?

A : Designing system architecture

B : Developing design models

C : Specifying interfaces

D : Developing a debugging system

Q.no 53. Which model shows the flow of object interactions?

A : Structural model

B : Dynamic model

C : Subsystem model

D : Sequence model

Q.no 54. What mechanism is used to apprise others of changes that are made?

A : Configuration management

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 302/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

B : Requirementss tracing

C : Reporting

D : Change control

Q.no 55. when SCM is a formal activity the software configuration audit is conducted by

A : testing specialists

B : development team

C : senior managers

D : quality assurance group

Q.no 56. A __________ executes the loop task first, then tests a condition and repeats the task
until the condition fails.

A : repeat until

B : condition

C : do while tests

D : if then-else

Q.no 57. Which of the following is not a design principle that allow the user to maintain control?

A : Provide for flexible interaction

B : Allow user interaction to be interrupt-able and undo-able

C : Show technical internals from the casual user

D : Design for direct interaction with objects that appear on the screen

Q.no 58. The ability to identify which requirement generated any given work product is known
as

A : forward tracing

B : backward tracing

C : Dependency tracking

D : Change management

Q.no 59. Which of the following is the component test standard?

A : BS7925-2

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 303/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

B : IEEE 829

C : BS7925-1

D : IEEE 610

Q.no 60. which control helps to ensure that parallel changes, performed by two different people,
don’t overwrite one another.

A : version control

B : synchronization control

C : access control

D : configuration control

Q.no 1. The risks that are analyzed and managed should be derived from thorough study of

A : people,
product, process, and project.

B : people,
product, process, and management.

C : people,
product, process, and feedback.

D : people,
product, process, and environment.

Q.no 2. Test cases are created in which phase?

A : Test Specification

B : Test Planning

C : Test Requirement

D : Test Configuration

Q.no 3. What is incorrect about structural design?

A : Structural design introduced notations and heuristics

B : Structural design emphasis on procedural decomposition

C : The advantage is data flow representation

D : It follows Structure chart

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 304/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 4. Cohesion is a qualitative indication of the degree to which a module

A : can be written more compactly

B : focuses on just one thing

C : is able to complete its function in a timely manner

D : is connected to other modules and the outside world

Q.no 5. Members of a Scrum team are not expected to answer which one of the following
questions during a daily Scrum meeting?

A : It is the fundamental process flow of Scrum

B : It is month-long iteration, during which incremental product functionality completed

C : During a Sprint, customer feedback is continually obtained and the Sprint backlog is accordingly
modified

D : Each day begins with a daily Scrum meeting

Q.no 6. When testing principles are useful?

A : During testing

B : During execution

C : During review

D : Throughout life-cycle

Q.no 7. Consider the following partial requirement for a software: “A web browser should be
used as the front end.” It can be considered to be which one of the following types of
requirements?

A : Functional requirement

B : Non-functional requirement

C : Design constraint

D : External interface

Q.no 8. Testing done without planning and Documentation is called

A : Unit testing

B : Regression testing

C : Adhoc testing

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 305/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

D : None of the mentioned

Q.no 9. Which one of the following is a functional requirement ?

A : Maintainability

B : Portability

C : Robustness

D : None of the mentioned

Q.no 10. Which design model is equivallent to set of detailed drawing for each room of a building

A : Architectural Design

B : Component level design

C : Data design

D : Interface design

Q.no 11. A software process model represents which one of the following?

A : The way in which software is developed

B : The way in which software processes data

C : The way in which software is used

D : The way in which software may fail

Q.no 12. Select the operating system which is not supported by Selenium IDE

A : Unix

B : Linux

C : Windows

D : Solaries

Q.no 13. Before handing over the software to the client, which testing is to be done in-house?

A : Alpha

B : Betta

C : Gamma

D : Theta
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 306/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 14. which of the following is not a component of risk

A : Quality risk

B : Performance risk

C : Cost risk

D : Support risk

Q.no 15. Validation is focused on

A : Product

B : Process

C : Design

D : Testing

Q.no 16. The Web Driver is used

A : To execute tests on the HTML Unit browser

B : To design a test Using Selenese

C : To quickly create tests

D : To test a web application against Firefox only

Q.no 17. Out of the following which is not a wait comand

A : waitForTitle

B : waitForTextPresent

C : waitForActive

D : waitForAlert

Q.no 18. Which of the following is not part of the software reengineering process model?

A : reverse engineering

B : forward engineering

C : inventory analysis

D : prototyping

Q.no 19. What establishes the profile of end-users of the system?


https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 307/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : design model

B : user’s model

C : mental image

D : system image

Q.no 20. Which one of the following most accurately reflects agile software development?

A : Incremental development

B : Iterative development

C : Linear development

D : Both incremental and iterative development

Q.no 21. Which of the following is not a Software Development Life Cycle Phase?

A : Requirements Gathering

B : Test Closure

C : Coding

D : Testing

Q.no 22. Which one of the following problems in the gathered requirements is not the focus of the
requirements analysis task?

A : Inconsistency

B : Ambiguity

C : Incompleteness

D : Unstructuredness

Q.no 23. Acceptance testing is also known as

A : Grey box testing

B : White box testing

C : Alpha Testing

D : Beta testing

Q.no 24. Which one of the following activities spans all stages of a software development life cycle

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 308/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : Coding

B : Testing

C : Project management

D : Design

Q.no 25. Choose the incorrect statement with respect to Non-Functional Requirement(NFR)

A : Product-oriented Approach – Focus on system (or software) quality

B : Process-oriented Approach – Focus on how NFRs can be used in the design process

C : Quantitative Approach – Find measurable scales for the functionality attributes

D : Qualitative Approach – Study various relationships between quality goals

Q.no 26. Systems that involve interaction with a shared database can be considered as.

A : software-based

B : transaction-based

C : server-based

D : client-based

Q.no 27. What is Fault Masking?

A : Creating a test case which does not reveal a fault

B : Error condition hiding another error condition

C : Masking a fault by developer

D : Masking a fault by a tester

Q.no 28. What effect does achievement of quality attribute will have?

A : The achievement of quality attribute will always have a positive effect

B : The achievement of quality attribute will always have a negative effect

C : The achievement of quality attribute will have no effect

D : The achievement of quality attribute will have a positive as well as negative effect

Q.no 29. Software testing are most effective if applied immediately after

A : Requirement Specification
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 309/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

B : Design

C : Coding

D : Integration

Q.no 30. Which of the following is not a Software Configuration Management Activity?

A : Configuration item identification

B : Risk management

C : Release management

D : Branch management

Q.no 31. Regression testing is a major part of which of the life cycle?

A : Waterfall model

B : V model

C : Iterative model

D : Agile model

Q.no 32. Bug status is set to postpone due to ________.

A : Priority of that bug may low.

B : Lack of time for the release.

C : The bug may not be the major effect in the software.

D : Data may be unavailable.

Q.no 33. The defect cluster change over time. Which of the following testing principle implies
this?

A : Testing shows presence of defects

B : Pesticide paradox

C : Testing is context dependent

D : Defect Clustering

Q.no 34. ETL stands for

A : Data Extraction Transformation & Loading

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 310/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

B : Data Execution Transformation & Loading

C : Extraction Transformation & Loading

D : Execution Transformation & Loading

Q.no 35. Which of the following is not a Test Type?

A : Database Testing

B : Security Testing

C : Statement Testing

D : Functional Testing

Q.no 36. Which of the following risk is the failure of a purchased component to perform as
expected

A : Product risk

B : Business risk

C : Programming risk

D : Project risk

Q.no 37. Which of the following is not a software testing generic characteristics?

A : Different testing techniques are appropriate at different points in time

B : Testing is conducted by the developer of the software or an independent test group

C : Testing and debugging are different activities, but debugging must be accommodated in any testing
strategy

D : None of the mentioned

Q.no 38. What are the criteria to decide the testing efforts?1. Time and budget
2. Size of development team
3. Size of testers
4. Risk associated with project

A : a. 1, 3, 4

B : b. 1, 2, 3

C : c. 1, 4

D : d. 1, 3

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 311/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 39. Which architectural style goal is to achieve Integrability?

A : Data Flow Architecture

B : Call and Return Architecture

C : Data Centered Architectures

D : Virtual Machine Architecture

Q.no 40. Test wares are handed over to maintenance team during which phase?

A : Test implementation and execution

B : Test closure activity

C : Evaluating exit criteria and reporting

D : Test analysis and design

Q.no 41. A set of tools coupled within a file management system that enables access to and
management of each software configuration item is known as

A : component element

B : process element

C : construction element

D : human elements

Q.no 42. ______provide the mechanisms for assembling SCIs into a version-specific
configuration.

A : Repository

B : versioning

C : modeling

D : assembling

Q.no 43. Which architectural style goal is to achieve Modifiability with Reuse?

A : Data Flow Architecture

B : Call and Return Architecture

C : Data Centered Architectures

D : Virtual Machine Architecture

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 312/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 44. What combines procedures and tools to manage different versions of configuration
objects that are created during the software process?

A : Versioning

B : Audit trails

C : Change control

D : SCI

Q.no 45. Which of the following is not real-time architectural patterns that are commonly used?

A : Asynchronous communication

B : Observe and React

C : Environmental Control

D : Process Pipeline

Q.no 46. The modification of the software to match changes in the ever changing environment,
falls under which category of software maintenance?

A : Adaptive

B : Corrective

C : perfective

D : preventive

Q.no 47. Which of the following is not a state of a defect in defect life cycle:

A : Verified

B : New

C : Critical

D : Deferred

Q.no 48. What is “V” Model?

A : Test Design Technique

B : Test Type

C : SDLC Model

D : Test Level

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 313/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 49. Which of the following is not the integration strategy?

A : Big-bang

B : Bottom-up

C : Design based

D : Top-down

Q.no 50. Three statements are given below regarding the User Interface Design: 1) Place the user
in Control. 2) Reduce user's memory load. 3) Make the interface consistent. These rules are
called as __________.

A : Governed Rule

B : Golden Rule

C : User Rule

D : Thumb Rule

Q.no 51. A _________ is a graphical representation that depicts information flow and the
transforms that are applied as data moves from input to output.

A : Data flow diagram

B : State transition diagram

C : Control specification

D : Activity diagram

Q.no 52. What combines the outward manifestation of the computer-based system , coupled with
all supporting information that describe system syntax and semantics?

A : design model

B : user’s model

C : mental image

D : system image

Q.no 53. When a cost to remove defect is not high?

A : During requirement analysis

B : During designing

C : During coding

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 314/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

D : During testing

Q.no 54. A product is re-engineered when

A : system crashes frequently

B : tools to support restructuring are disabled

C : hardware or software support becomes obsolete

D : subsystems of a larger system require few maintenance

Q.no 55. What determines how information is stored in the repository, how data can be accessed
by tools and viewed by software engineers, how well data security and integrity can be
maintained, and how easily the existing model can be extended to accommodate new needs.

A : Data model

B : Meta model

C : Configuration model

D : Test model

Q.no 56. The order in which test levels are performed is:

A : Unit, Integration, Acceptance, System

B : Unit, System, Integration, Acceptance

C : Unit, Integration, System, Acceptance

D : It depends on the nature of a project

Q.no 57. The __________ enables the software engineer to develop models of the information
domain and functional domain at the same time

A : Data flow diagram

B : State transition diagram

C : Control specification

D : Activity diagram

Q.no 58. which of the following impact of the risk drivers on risk components is also called as
disastrous impact

A : critical impact

B : catastrophic impact

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 315/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : marginal impact

D : Destructive impact

Q.no 59. Which one of these belongs to integration testing in the OO context?

A : Unit testing

B : Regression testing

C : Sandwich testing

D : Thread-based testing

Q.no 60. Risk mitigation is a risk ___________activity. Risk monitoring is a ___________ activity

A : Avoidance, Project tracking.

B : Increasing, Project tracking.

C : Project tracking, Avoidance.

D : Random, Tracking.

Q.no 1. Method which selects the option which displays the text matching the parameter passed
to it

A : selectVisibleText()

B : selectByVisibleText()

C : select_VisibleText()

D : select_ByVisibleText()

Q.no 2. A program with high cyclometic complexity is likely to be:

A : Large

B : Small

C : Difficult to write

D : Difficult to test

Q.no 3. How many classification schemes have been developed for NFRs ?

A : Two

B : Three

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 316/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : Four

D : Five

Q.no 4. Project risk factor is considered in which model?

A : Spiral model.

B : Waterfall model.

C : Prototyping model

D : Incremental Model.

Q.no 5. In case of Selenium IDE, the source view shows your script in

A : DHTML format

B : XML format

C : j2EE format

D : HTML format

Q.no 6. Which one of the following views is implicit in an SRS document?

A : Black box

B : White box

C : Grey box

D : Glass box

Q.no 7. Testing of software with actual data and in actual environment is known as?

A : Regression testing

B : Beta testing

C : Alpha testing

D : None of the above

Q.no 8. Verification is focused on

A : Product

B : Process

C : Design
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 317/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

D : Testing

Q.no 9. Which of these truly defines Software design?

A : Software design is an activity subjected to constraints

B : Software Design specifies nature and composition of software product

C : Software Design satisfies client needs and desires

D : Software design is an activity subjected to constraints specifies nature and composition of software
product which satisfies client needs and desires

Q.no 10. Select the command which is used to check the presence of a certain element

A : verifyTable

B : verifyTitlePresent

C : verifyTextPresent

D : verifyElementPresent

Q.no 11. Which of the following is not a design principle that allows the user to maintain control?

A : Provide for flexible interaction

B : Allow user interaction to be interrupt-able and undo-able

C : Show technical internals from the casual user

D : Design for direct interaction with objects that appear on the screen

Q.no 12. When a company plans to develop a generic product, who among the following is
usually the source of the requirements?

A : Development team members

B : Project manager

C : Marketing personnel

D : Personnel from finance department

Q.no 13. A software component

A : Implements some functionality

B : Has explicit dependencies through provides and required interfaces

C : Communicates through its interfaces only

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 318/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

D : All of the mentioned

Q.no 14. Select the name which is not the type of locators

A : ID

B : Name

C : Password

D : Link Text

Q.no 15. What does “Every software system has an architecture” implies?

A : Architecture an exist independently of its description or specification

B : All the system to be stable should posses an architecture

C : System itself is a component

D : Component itself is a system and hence architecture

Q.no 16. Which of the following are correct statements?

A : An architecture is foremost an abstraction of a system that suppresses details of the components


that do not affect how they are used

B : An architecture is not dependable on requirements

C : An architecture may or may not defines components

D : An architecture is foremost an abstraction of a system that suppresses details of the components


that always affect how they are used

Q.no 17. Agile model advocates which one of the following approaches?

A : In each increment, get something “quick and dirty” delivered and thereby save time

B : In each increment, get something simple released as quickly as possible

C : In each increment, get something of business-value delivered as quickly as possible, consistent with
the right level of quality

D : In each increment, get something delivered once it has been fully documented and the
documentation has been signed off as complete

Q.no 18. Select the method which selects the option at the at the given index

A : selectByIndex()

B : selectIndex()

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 319/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : selectedByIndex()

D : selectByIndexes()

Q.no 19. Java packages and Fortran subroutine are examples of__________

A : Functions

B : Modules

C : Classes

D : Sub procedures

Q.no 20. In order to control cost, defects should ideally be detected in which phase:

A : Coding

B : Design

C : Implementation

D : Requirements Gathering

Q.no 21. Test cases are designed during which of the following stages?

A : Test recording

B : Test configuration

C : Test planning

D : Test specification

Q.no 22. The implementation phase of the waterfall model is a synonym for which one of the
following phases?

A : Coding and unit testing phase

B : Integration and system testing phase

C : Maintenance phase

D : Design phase

Q.no 23. Consider the following requirement for a word processor software: " The software
should provide facility to import an existing image available as a jpeg file into the document
being created.". Which one of the following types of requirements is this?

A : Functional requirement

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 320/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

B : Non-functional requirement

C : Constraint on the implementation

D : Goal of implementation

Q.no 24. Alpha testing is:

A : Post-release testing by end user representatives at the developer’s site

B : The first testing that is performed

C : Pre-release testing by end user representatives at their sites

D : Pre-release testing by end user representatives at the developer’s site

Q.no 25. End result of Software Requirement Analysis is ________.

A : Functional and Behavioral

B : Architectural and Structural

C : Usability and Reliability

D : Algorithmic and Data Structure

Q.no 26. Maintenance testing is performed using which methodology?

A : Retesting

B : Sanity testing

C : Breadth test and depth test

D : Confirmation testing

Q.no 27. Which of the following pattern is the basis of interaction management in many web-
based systems?

A : model-view-controller

B : repository pattern

C : architecture

D : different operating system

Q.no 28. Which of the following truly describes Mediators?

A : Encapsulation whereby some components is encased within an alternative abstraction

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 321/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

B : Translation between assumptions of an arbitrary component to some provides assumptions of some


other arbitrary components

C : Incorporation of planning function that in effect results in runtime determination of the translation

D : Repair those cases you have detected by adapting the components

Q.no 29. ________is not a Software Test Life Cycle Phase?

A : Requirements Gathering

B : Test Planning

C : Test Closure

D : Test Design

Q.no 30. A set of tools that automate the construction of software by ensuring that the proper set
of validated components have been assembled are known as

A : component element

B : process element

C : construction element

D : human elements

Q.no 31. Which of the following is/are commonly used architectural pattern(s)?

A : Model-View-Controller

B : Layered Architecture

C : Client–server

D : MVC, Layered Architecture and Client–server

Q.no 32. Which of the following statement is true?

A : Exhaustive testing is impossible but practicable

B : Exhaustive testing is possible but impracticable

C : Exhaustive testing is impossible and impracticable

D : Exhaustive testing is possible and practicable

Q.no 33. After occurence of the risk ,the developement team members do some rapid actions to
overcome the problem called as

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 322/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : reactive risk mode

B : proactive risk mode

C : fire fighting mode

D : quick rectification mode

Q.no 34. What allows different projects to use the same source files at the same time?

A : Version Control

B : Access control

C : CM Process

D : Version Control and Access control

Q.no 35. RE is the overall risk exposure and is written as:

A:PxC

B:PxM

C:MxC

D:PxS

Q.no 36. E-Commerce software testing follows different approach than gaming software testing.
Which testing principle implies this?

A : Pareto principle

B : Testing is Context dependent

C : Testing shows presence of defects

D : Absence of errors-fallacy

Q.no 37. Which of the following truly describes Wrappers?

A : Encapsulation whereby some components is encased within an alternative abstraction

B : Translation between assumptions of an arbitrary component to some provides assumptions of some


other arbitrary components

C : cIncorporation of planning function that in effect results in runtime determination of the translation

D : Repair those cases you have detected by adapting the components

Q.no 38. which of the following is not a software risk

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 323/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : product risk

B : project risk

C : business risk

D : management rsik

Q.no 39. Beta Testing is done at:

A : Developer’s end

B : User’s end

C : User’s & Developer’s end

D : None of the mentioned

Q.no 40. Requirement Engineering is not concern with ____________.

A : Requirement Design

B : Requirement Elicitation

C : Requirement Analysis

D : Requirement Documentation

Q.no 41. Which of the following testing method is normally used as acceptance test for a software
system?

A : Regression testing

B : Integration testing

C : Unit testing

D : Functional testing

Q.no 42. The technique applied for usability testing is:

A : White box

B : Grey box

C : Black box

D : Combination of all

Q.no 43. Which granularity level of testing checks the behavior of module cooperation?

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 324/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : Unit Testing

B : Integration Testing

C : Acceptance Testing

D : Regression Testing

Q.no 44. Architectural styles is composed of which of the following?

A : A set of component types that perform some function at run-time

B : A topological layout of these components indicating their run-time inter relationships

C : Coupling among the client will lessen the effect of data center architecture

D : A set of semantic constraints

Q.no 45. What is the major improvement in SVN

A : it allows to rollback of commit

B : addition of atomic commits

C : supported everywhere

D : each file is processed independently

Q.no 46. Version control is not capable of doing

A : enables any version to be constructed using differences from past versions

B : a make facility that enables you to collect all relevant configuration objects and construct a specific
version of the software.

C : If the central database is corrupted, the entire history remains safe and secured

D : a project database repository that stores all relevant configuration objects

Q.no 47. which of the following is the highest level in the reverse engineering process

A : testing level

B : abstraction level

C : design level

D : maintainence level

Q.no 48. Webapp configuration object can be managed in much the same way as conventional
software configuration objects except for

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 325/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : content items

B : graphic items

C : functional items

D : user items

Q.no 49. Which is not a SQA activity?

A : Black box testing

B : White box testing

C : Integration testing

D : Unit testing

Q.no 50. Which architectural style goal is to achieve Modifiability with Scalability?

A : Data Flow Architecture

B : Call and Return Architecture

C : Data Centered Architectures

D : Virtual Machine Architecture

Q.no 51. Which of the following is likely to benefit most from the use of test tools providing test
capture and replay facilities?

A : Integration testing

B : Regression testing

C : System testing

D : User acceptance testing

Q.no 52. The __________ contains a state transition diagram that is a sequential specification of
behavior.

A : Data flow diagram

B : State transition diagram

C : Control specification

D : Activity diagram

Q.no 53. Which is not a type of incremental testing approach?

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 326/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : Bottom up

B : Top down

C : Big-bang

D : Functional incrimination

Q.no 54. when SCM is a formal activity the software configuration audit is conducted by

A : testing specialists

B : development team

C : senior managers

D : quality assurance group

Q.no 55. Which of the following type of maintenance takes the maximum chunk of the total
maintenance effort in a typical life cycle of a software product ?

A : Adaptive maintenance

B : Corrective maintenance

C : Preventive maintenance

D : Perfective maintenance

Q.no 56. which control helps to ensure that parallel changes, performed by two different people,
don’t overwrite one another.

A : version control

B : synchronization control

C : access control

D : configuration control

Q.no 57. A chronological record of relevant details about the execution of tests is called as, a
_______

A : Test suite

B : Test procedure

C : Test data

D : Test log

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 327/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 58. The main focus of ______ is to reduce defects and variations in the processes.

A : QA

B : QC

C : Six Sigma

D : tracking

Q.no 59. Which model describes the static structure of the system using object classes and their
relationships?

A : Structural model

B : Dynamic model

C : Subsystem model

D : Sequence model

Q.no 60. which of the following impact of the risk drivers on risk components is also called as
disastrous impact

A : critical impact

B : catastrophic impact

C : marginal impact

D : Destructive impact

Q.no 1. Which Testing is performed first?

A : Black box testing

B : White box testing

C : Dynamic testing

D : Static testing

Q.no 2. Reactive risk management is sometimes described as:

A : Fire fighting mode

B : Solution mode

C : Uncertain mode

D : Perfect mode

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 328/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 3. What can be used to test Flex/Flash aplication using Selenium

A : FlexUISelenium

B : FlexUI

C : UIFlexSelenium

D : SeleniumFlex

Q.no 4. Which of these are characteristics of a good design?

A : Exhibits strong coupling among between modules

B : Implements all requirements in the analysis model

C : Includes test cases for all components

D : Implements all requirements in the analysis model and provide a complete picture of the software

Q.no 5. The Selenium RC is used

A : To run your test against different browers on different opearting systems

B : To create test with little or no prior knowledge in programming

C : To test a web application against firefox only

D : To run a huge test suite, that can be executed on multiple machines

Q.no 6. Test cases are created in which phase?

A : Test Specification

B : Test Planning

C : Test Requirement

D : Test Configuration

Q.no 7. Which one is the basic input device in GUI

A : Mouse

B : keyboard

C : cpu

D : monitor

Q.no 8. Which lines depict that architecture defines constraints on an implementation?


https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 329/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : An implementation exhibits an architecture if it conforms to the structural decisions described by


the architecture

B : The implementation need not be divided into prescribed components

C : An implementation exhibits an architecture if it conforms to the structural decisions described by


the architecture and the implementation must be divided into prescribed components

D : An implementation exhibits an architecture if it conforms to the structural decisions described by


the architecture whereas implementation need not be divided into prescribed components

Q.no 9. Select the command which is used to compare the actual page title with an expected value

A : verifyTitle

B : verifiedTitle

C : verifyTitles

D : verifiedTitles

Q.no 10. Exhaustive testing is:

A : always possible

B : impractical but possible

C : practically possible

D : impractical and impossible

Q.no 11. Select the method which performs a context-click at the curent mouse location

A : click_Context()

B : context.Click()

C : contextClick()

D : context_Click()

Q.no 12. What is TestNG ?

A : TestNextGeneration

B : TestNewGenerlization

C : TestNewGeneration

D : TestNextGenerations

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 330/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 13. What is the main technique for achieving portable software?

A : The main technique for achieving portable software is to isolate system dependency

B : The main technique for achieving portable software is to increase the overall performance

C : The main technique for achieving portable software is to have independent platform dependency

D : The main technique for achieving portable software is to have independent platform dependency
and to increase accuracy

Q.no 14. What establishes the profile of end-users of the system?

A : design model

B : user’s model

C : mental image

D : system image

Q.no 15. Select the language which is supported by the Selenium Web driver

A : Perl

B : Sql

C : ASP

D : Cobol

Q.no 16. Verification and Validation uses __________.

A : Internal and External resources respectively.

B : Internal resources only.

C : External resources only.

D : External and Internal resources respectively.

Q.no 17. which of the following is not a type of maintainence

A : Corrective maintainence

B : adaptive maintainence

C : perfective maintainence

D : predetermined maintainence

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 331/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 18. The selenium can

A : access controls within the desktop

B : both web and desktop applications

C : only test web applications

D:0

Q.no 19. Which of the following is not a part of a test design document?

A : Test Plan

B : Test Design Specification

C : Test Case Specification

D : Test Log

Q.no 20. Which component of Selenium can create customized test results ?

A : Web Driver

B : Selenium RC

C : Selenium IDE

D : Selenium Grid

Q.no 21. Selenium IDE stands for

A : Selenium Initialization Development Environment

B : Selenium Interrelated Development Environment

C : Selenium Integrated Development Environment

D : Selenium Information Development Environment

Q.no 22. Which one of the following statements most accurately identifies the stakeholders in a
software development project?

A : A shareholder of the organization developing the software

B : Anyone who is interested in the software

C : Anyone who is a source of requirements for the software

D : Anyone who might be affected by the software

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 332/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 23. Which of the following is not a Software Development Life Cycle Phase?

A : Requirements Gathering

B : Test Closure

C : Coding

D : Testing

Q.no 24. Choose the incorrect statement with respect to Non-Functional Requirement(NFR)

A : Product-oriented Approach – Focus on system (or software) quality

B : Process-oriented Approach – Focus on how NFRs can be used in the design process

C : Quantitative Approach – Find measurable scales for the functionality attributes

D : Qualitative Approach – Study various relationships between quality goals

Q.no 25. A software requirements specification (SRS) document should avoid discussing which
one of the following?

A : Functional requirements

B : Non-functional requirements

C : Design specification

D : Constraints on the implementation

Q.no 26. ETL stands for

A : Data Extraction Transformation & Loading

B : Data Execution Transformation & Loading

C : Extraction Transformation & Loading

D : Execution Transformation & Loading

Q.no 27. What combines procedures and tools to manage different versions of configuration
objects that are created during the software process?

A : Versioning

B : Audit trails

C : Change control

D : SCI

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 333/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 28. What can static analysis NOT find?

A : Memory leaks

B : Unreachable (“dead”) code

C : The use of a variable before it has been defined

D : Array bound violations

Q.no 29. Which of the following is not an issue to consider when reverse engineering?

A : directionality

B : connectivity

C : completeness

D : abstraction level

Q.no 30. A set of tools coupled within a file management system that enables access to and
management of each software configuration item is known as

A : component element

B : process element

C : construction element

D : human elements

Q.no 31. What is Fault Masking?

A : Creating a test case which does not reveal a fault

B : Error condition hiding another error condition

C : Masking a fault by developer

D : Masking a fault by a tester

Q.no 32. Software testing are most effective if applied immediately after

A : Requirement Specification

B : Design

C : Coding

D : Integration

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 334/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 33. Bug status is set to postpone due to ________.

A : Priority of that bug may low.

B : Lack of time for the release.

C : The bug may not be the major effect in the software.

D : Data may be unavailable.

Q.no 34. Which of the following uses Impact Analysis most?

A : Non-functional system testing

B : Component testing

C : User acceptance testing

D : Maintenance testing

Q.no 35. ______provide the mechanisms for assembling SCIs into a version-specific
configuration.

A : Repository

B : versioning

C : modeling

D : assembling

Q.no 36. Software tester focuses more on complex part of the software. Which of the following
testing principle implies this?

A : Testing shows presence of defects

B : Pesticide paradox

C : Testing is context dependent

D : Defect Clustering

Q.no 37. Who leads a formal review process?

A : Author

B : Moderator

C : Reviewer

D : Scribe

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 335/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 38. Which architectural style goal is to achieve Integrability?

A : Data Flow Architecture

B : Call and Return Architecture

C : Data Centered Architectures

D : Virtual Machine Architecture

Q.no 39. Static analysis can be best described as:

A : The reviewing of test plans

B : The analysis of batch programs

C : The use of black box testing

D : The analysis of program code

Q.no 40. A software reengineeering process model consists of:

A : code restructuring

B : back engineering

C : document engineerinhg

D : implementation engineering

Q.no 41. Which of the following is not a Software Configuration Management Activity?

A : Configuration item identification

B : Risk management

C : Release management

D : Branch management

Q.no 42. Which of the following is not a software testing generic characteristics?

A : Different testing techniques are appropriate at different points in time

B : Testing is conducted by the developer of the software or an independent test group

C : Testing and debugging are different activities, but debugging must be accommodated in any testing
strategy

D : None of the mentioned

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 336/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 43. Regression testing is a major part of which of the life cycle?

A : Waterfall model

B : V model

C : Iterative model

D : Agile model

Q.no 44. which of the following risk is a potential threat to every software project

A : generic risk

B : project risk

C : product risk

D : business risk

Q.no 45. Which of the following is not a state of a defect in defect life cycle:

A : Verified

B : New

C : Critical

D : Deferred

Q.no 46. The modification of the software to match changes in the ever changing environment,
falls under which category of software maintenance?

A : Adaptive

B : Corrective

C : perfective

D : preventive

Q.no 47. Which of the following is not a Test Type?

A : Database Testing

B : Security Testing

C : Statement Testing

D : Functional Testing

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 337/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 48. Which of the following is not real-time architectural patterns that are commonly used?

A : Asynchronous communication

B : Observe and React

C : Environmental Control

D : Process Pipeline

Q.no 49. Which of the following is NOT a reasonable test objective:

A : To find faults in the software

B : To give confidence in the software

C : To prove that the software has no faults

D : To find performance problems

Q.no 50. Which of the following is not a module type

A : Object modules

B : Hardware modules

C : Functional modules

D : Process support modules

Q.no 51. A product is re-engineered when

A : system crashes frequently

B : tools to support restructuring are disabled

C : hardware or software support becomes obsolete

D : subsystems of a larger system require few maintenance

Q.no 52. Which of the following is likely to benefit most from the use of test tools providing test
capture and replay facilities?

A : Integration testing

B : Regression testing

C : System testing

D : User acceptance testing

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 338/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 53. The __________ enables the software engineer to develop models of the information
domain and functional domain at the same time

A : Data flow diagram

B : State transition diagram

C : Control specification

D : Activity diagram

Q.no 54. The __________ contains a state transition diagram that is a sequential specification of
behavior.

A : Data flow diagram

B : State transition diagram

C : Control specification

D : Activity diagram

Q.no 55. Which of the following is not a design principle that allow the user to maintain control?

A : Provide for flexible interaction

B : Allow user interaction to be interrupt-able and undo-able

C : Show technical internals from the casual user

D : Design for direct interaction with objects that appear on the screen

Q.no 56. The ability to identify which requirement generated any given work product is known
as

A : forward tracing

B : backward tracing

C : Dependency tracking

D : Change management

Q.no 57. Which one of these belongs to integration testing in the OO context?

A : Unit testing

B : Regression testing

C : Sandwich testing

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 339/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

D : Thread-based testing

Q.no 58. A _________ is a graphical representation that depicts information flow and the
transforms that are applied as data moves from input to output.

A : Data flow diagram

B : State transition diagram

C : Control specification

D : Activity diagram

Q.no 59. Three factors that affect the consequences that are likely to happen if a risk does occur:

A : its nature,
its scope, and its intensity.

B : its nature,
its scope, and its timing.

C : its nature,
its scope, and its durability.

D : its nature,
its limit, and its timing.

Q.no 60. What combines the outward manifestation of the computer-based system , coupled with
all supporting information that describe system syntax and semantics?

A : design model

B : user’s model

C : mental image

D : system image

Q.no 1. which of the following is not a component of risk

A : Quality risk

B : Performance risk

C : Cost risk

D : Support risk

Q.no 2. Select the browser which is supported by Selenium IDE

A : Google Chrome

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 340/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

B : Opera Mini

C : Mozilla Firefox

D : Internet Explorer

Q.no 3. Which one of the following most accurately reflects agile software development?

A : Incremental development

B : Iterative development

C : Linear development

D : Both incremental and iterative development

Q.no 4. White-box testing can be started:

A : After installation

B : After SRS creation

C : After programming

D : After designing

Q.no 5. Select the command which is used to pause execution until the page is loaded completely

A : waitForPageToLoad

B : waitForElementPresent

C : waitForPage

D : waitForLoad

Q.no 6. What are the benefits for component based product lines?

A : Being able to take faster advantage of new product and new technology

B : Increase in time to market market

C : Higher employee productivity

D : A disciplined approach to specify as many assumptions about a components interface as is feasible

Q.no 7. Which one of the following is not a requirements gathering technique

A : Task analysis

B : Scenario analysis
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 341/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : Form analysis

D : SRS document review

Q.no 8. Which one of the following may be experienced by a software development team when it
adopts a systematic development process model in preference to a build-and-fix style of
development?

A : Increased documentation overhead

B : Increased development cost

C : Decreased maintainability

D : Increased development time

Q.no 9. Select the command which retrieves the alert message and stores it in a variable that you
will specify

A : storeAlert

B : storedAlert

C : store_Alert

D : storesAlert

Q.no 10. Method which selects the option which displays the text matching the parameter passed
to it

A : selectVisibleText()

B : selectByVisibleText()

C : select_VisibleText()

D : select_ByVisibleText()

Q.no 11. The UML was designed for describing _________

A : object-oriented systems

B : architectural design

C : SRS

D : Both object-oriented systems and Architectural design

Q.no 12. SCM stands for

A : Software Control Management

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 342/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

B : Software Configuration Management

C : Software Concept Management

D : Software Course Management

Q.no 13. When is the requirement specification activity carried out?

A : During requirements gathering activity

B : Before requirements analysis activity

C : Before requirements gathering activity

D : After requirements analysis activity

Q.no 14. Which of the following is a static test?

A : Coverage analysis

B : Code inspection

C : Usability assessment

D : Installation test

Q.no 15. The expected results of the software is _________________.

A : Only important in system testing

B : Only used in component testing

C : Most useful when specified in advance

D : Derived from the code.

Q.no 16. Reference architecture is a

A : reference model mapped onto software components

B : data flow with comments

C : data flow with pieces

D : reference model mapped onto software components & data flow with comments

Q.no 17. Who performs the Acceptance Testing?

A : Software Developer

B : End users
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 343/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : Testing team

D : Systems engineers

Q.no 18. Consider the following partial description of the IIT security software. “A camera at the
main gate should detect an incoming vehicle, and the gate should be opened for registered
vehicles.” Which one of the following types of requirements is this?

A : Functional requirement

B : Non-Functional requirement

C : Design requirement

D : Design constraint

Q.no 19. The operation phase of the waterfall model is a synonym for which one of the
following phases?

A : Coding and unit testing phase

B : Integration and system testing phase

C : Maintenance phase

D : Design phase

Q.no 20. Which one of the following is a requirement that fits in a developer’s module ?

A : Availability

B : Testability

C : Usability

D : Flexibility

Q.no 21. Select the method which clears all selected entries in Web Driver Selenium

A : dselectAll()

B : deselect_Al()

C : dselect_Al()

D : deselectAll()

Q.no 22. The Selenium

A : provides professional computer support

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 344/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

B : tests reports are generated automatically

C : comes with a built in object repository

D : Cannot access elements outside of the web application under test

Q.no 23. Project risk factor is considered in which model?

A : Spiral model.

B : Waterfall model.

C : Prototyping model

D : Incremental Model.

Q.no 24. Agile model advocates which one of the following approaches?

A : In each increment, get something “quick and dirty” delivered and thereby save time

B : In each increment, get something simple released as quickly as possible

C : In each increment, get something of business-value delivered as quickly as possible, consistent with
the right level of quality

D : In each increment, get something delivered once it has been fully documented and the
documentation has been signed off as complete

Q.no 25. Which one of the following is a functional requirement ?

A : Maintainability

B : Portability

C : Robustness

D : None of the mentioned

Q.no 26. The nature of Software Application can be characterized by their information

A : Determinacy

B : Content

C : Complexity

D : Both OPTION 2 and OPTION 3

Q.no 27. ________is not a Software Test Life Cycle Phase?

A : Requirements Gathering

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 345/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

B : Test Planning

C : Test Closure

D : Test Design

Q.no 28. In a simple risk table the risks are categorized into

A : PS, BU , CU

B : TU ,DE ,ST

C : BE ,CU ,ST

D : SU , TE ,CU ,PS

Q.no 29. Which of the following items would not come under Configuration Management?

A : Operating systems

B : Live data

C : Test documentation

D : User requirement documents

Q.no 30. Which of the following truly describes Mediators?

A : Encapsulation whereby some components is encased within an alternative abstraction

B : Translation between assumptions of an arbitrary component to some provides assumptions of some


other arbitrary components

C : Incorporation of planning function that in effect results in runtime determination of the translation

D : Repair those cases you have detected by adapting the components

Q.no 31. Three statements are given below regarding the User Interface Design: 1) Place the user
in Control. 2) Reduce user's memory load. 3) Make the interface consistent. These rules are
called as __________.

A : Governed Rule

B : Golden Rule

C : User Rule

D : Thumb Rule

Q.no 32. which of the following is the highest level in the reverse engineering process

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 346/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : testing level

B : abstraction level

C : design level

D : maintainence level

Q.no 33. E-Commerce software testing follows different approach than gaming software testing.
Which testing principle implies this?

A : Pareto principle

B : Testing is Context dependent

C : Testing shows presence of defects

D : Absence of errors-fallacy

Q.no 34. Systems that involve interaction with a shared database can be considered as.

A : software-based

B : transaction-based

C : server-based

D : client-based

Q.no 35. Which architectural style goal is to achieve Portability?

A : Data Flow Architecture

B : Call and Return Architecture

C : Data Centered Architectures

D : Virtual Machine Architecture

Q.no 36. Which of the following is not the integration strategy?

A : Big-bang

B : Bottom-up

C : Design based

D : Top-down

Q.no 37. What are the criteria to decide the testing efforts?1. Time and budget
2. Size of development team

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 347/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

3. Size of testers
4. Risk associated with project

A : a. 1, 3, 4

B : b. 1, 2, 3

C : c. 1, 4

D : d. 1, 3

Q.no 38. RE is the overall risk exposure and is written as:

A:PxC

B:PxM

C:MxC

D:PxS

Q.no 39. What allows different projects to use the same source files at the same time?

A : Version Control

B : Access control

C : CM Process

D : Version Control and Access control

Q.no 40. Which architectural style goal is to achieve Modifiability with Reuse?

A : Data Flow Architecture

B : Call and Return Architecture

C : Data Centered Architectures

D : Virtual Machine Architecture

Q.no 41. Architectural styles is composed of which of the following?

A : A set of component types that perform some function at run-time

B : A topological layout of these components indicating their run-time inter relationships

C : Coupling among the client will lessen the effect of data center architecture

D : A set of semantic constraints

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 348/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 42. Which of the following statement is true?

A : Exhaustive testing is impossible but practicable

B : Exhaustive testing is possible but impracticable

C : Exhaustive testing is impossible and impracticable

D : Exhaustive testing is possible and practicable

Q.no 43. Which of the following risk is the failure of a purchased component to perform as
expected

A : Product risk

B : Business risk

C : Programming risk

D : Project risk

Q.no 44. What is the major improvement in SVN

A : it allows to rollback of commit

B : addition of atomic commits

C : supported everywhere

D : each file is processed independently

Q.no 45. Beta Testing is done at:

A : Developer’s end

B : User’s end

C : User’s & Developer’s end

D : None of the mentioned

Q.no 46. Maintenance testing is performed using which methodology?

A : Retesting

B : Sanity testing

C : Breadth test and depth test

D : Confirmation testing

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 349/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 47. What is “V” Model?

A : Test Design Technique

B : Test Type

C : SDLC Model

D : Test Level

Q.no 48. The defect cluster change over time. Which of the following testing principle implies
this?

A : Testing shows presence of defects

B : Pesticide paradox

C : Testing is context dependent

D : Defect Clustering

Q.no 49. Which granularity level of testing checks the behavior of module cooperation?

A : Unit Testing

B : Integration Testing

C : Acceptance Testing

D : Regression Testing

Q.no 50. Which of the following truly describes Wrappers?

A : Encapsulation whereby some components is encased within an alternative abstraction

B : Translation between assumptions of an arbitrary component to some provides assumptions of some


other arbitrary components

C : cIncorporation of planning function that in effect results in runtime determination of the translation

D : Repair those cases you have detected by adapting the components

Q.no 51. When a cost to remove defect is not high?

A : During requirement analysis

B : During designing

C : During coding

D : During testing

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 350/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 52. What determines how information is stored in the repository, how data can be accessed
by tools and viewed by software engineers, how well data security and integrity can be
maintained, and how easily the existing model can be extended to accommodate new needs.

A : Data model

B : Meta model

C : Configuration model

D : Test model

Q.no 53. Which model shows the flow of object interactions?

A : Structural model

B : Dynamic model

C : Subsystem model

D : Sequence model

Q.no 54. Which is not a type of incremental testing approach?

A : Bottom up

B : Top down

C : Big-bang

D : Functional incrimination

Q.no 55. The main focus of ______ is to reduce defects and variations in the processes.

A : QA

B : QC

C : Six Sigma

D : tracking

Q.no 56. Risk mitigation is a risk ___________activity. Risk monitoring is a ___________ activity

A : Avoidance, Project tracking.

B : Increasing, Project tracking.

C : Project tracking, Avoidance.

D : Random, Tracking.

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 351/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 57. Which of the following is not needed to develop a system design from concept to detailed
object-oriented design?

A : Designing system architecture

B : Developing design models

C : Specifying interfaces

D : Developing a debugging system

Q.no 58. which control helps to ensure that parallel changes, performed by two different people,
don’t overwrite one another.

A : version control

B : synchronization control

C : access control

D : configuration control

Q.no 59. A __________ executes the loop task first, then tests a condition and repeats the task
until the condition fails.

A : repeat until

B : condition

C : do while tests

D : if then-else

Q.no 60. The order in which test levels are performed is:

A : Unit, Integration, Acceptance, System

B : Unit, System, Integration, Acceptance

C : Unit, Integration, System, Acceptance

D : It depends on the nature of a project

Q.no 1. What incorporates data, architectural, interface, and procedural representations of the
software?

A : design model

B : user’s model

C : mental image

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 352/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

D : system image

Q.no 2. End result of Software Requirement Analysis is ________.

A : Functional and Behavioral

B : Architectural and Structural

C : Usability and Reliability

D : Algorithmic and Data Structure

Q.no 3. Which of the following is the best type of module coupling?

A : Control Coupling

B : Stamp Coupling

C : Data Coupling

D : Content Coupling

Q.no 4. Coupling is a qualitative indication of the degree to which a module

A : can be written more compactly

B : focuses on just one thing

C : is able to complete its function in a timely manner

D : is connected to other modules and the outside world

Q.no 5. The importance of software design can be summarized in a single word which is:

A : Efficiency

B : Accuracy

C : Quality

D : Complexity

Q.no 6. Select the language which is not supported by the Selenium RC

A : ASP

B : Java

C : C#

D : PHP
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 353/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 7. Testing done without planning and Documentation is called

A : Unit testing

B : Regression testing

C : Adhoc testing

D : None of the mentioned

Q.no 8. A program with high cyclometic complexity is likely to be:

A : Large

B : Small

C : Difficult to write

D : Difficult to test

Q.no 9. CTC stands for

A : condition-transaction-consequence

B : condition-transfer-consequence

C : condition-transition-consequence

D : condition-transmission-consequence

Q.no 10. Select the command which is used to print a string value of a variable in Selenium IDE

A : The 'display' command

B : The 'echo' command

C : The 'print' command

D : The 'printr' command

Q.no 11. Testing of software with actual data and in actual environment is known as?

A : Regression testing

B : Beta testing

C : Alpha testing

D : None of the above

Q.no 12. Which of the following model put much more emphasis on testing?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 354/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : waterfall model

B : agile model

C : spiral model

D : v-v model

Q.no 13. Which one of the following phases accounts for the maximum effort during development
of a typical software?

A : Coding

B : Testing

C : Designing

D : Specification

Q.no 14. Which of the following is not a user interface design process?

A : User, task, and environment analysis and modeling

B : Interface design

C : Knowledgeable, frequent users

D : Interface validation

Q.no 15. What is incorrect about structural design?

A : Structural design introduced notations and heuristics

B : Structural design emphasis on procedural decomposition

C : The advantage is data flow representation

D : It follows Structure chart

Q.no 16. Select the operating system which is not supported by Selenium IDE

A : Unix

B : Linux

C : Windows

D : Solaries

Q.no 17. Which of the following are correct statements?

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 355/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

A : An architecture is foremost an abstraction of a system that suppresses details of the components


that do not affect how they are used

B : An architecture is not dependable on requirements

C : An architecture may or may not defines components

D : An architecture is foremost an abstraction of a system that suppresses details of the components


that always affect how they are used

Q.no 18. Which of these truly defines Software design?

A : Software design is an activity subjected to constraints

B : Software Design specifies nature and composition of software product

C : Software Design satisfies client needs and desires

D : Software design is an activity subjected to constraints specifies nature and composition of software
product which satisfies client needs and desires

Q.no 19. Which of the following is golden rule for interface design?

A : Place the user in control

B : Reduce the user’s memory load

C : Make the interface consistent

D : All of the mentioned

Q.no 20. Select the command in SeleniumIDE used to open a web page using theURL

A : OpenRecord

B : Open

C : OpenText

D : OpenTable

Q.no 21. Risk management is responsibility of the

A : Customer

B : Investor

C : Developer

D : Project team

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 356/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

Q.no 22. Which of these does not represent object oriented design?

A : Programs are thought of collection of objects

B : It follows regular procedural decomposition in favor of class and object decomposition

C : Central model represents class diagrams that show the classes comprising a program and their
relationships to one another

D : Object-oriented methods incorporates Structural methods

Q.no 23. Which one of the following feedback paths is not present in an iterative waterfall
model?

A : Design phase to feasibility study phase

B : Implementation phase to design phase

C : Implementation phase to requirements specification phase

D : Design phase to requirements specification phase.

Q.no 24. Which testing is performed with Planning and Documentation?

A : Ad-hoc testing

B : Monkey testing

C : Fuzz testing

D : End-to-End testing

Q.no 25. Software risk always involves two characteristics. What are those characteristics?

A : Uncertainity & loss

B : Certainity & Profit

C : Staff size and budget

D : Project Deadline and budget

Q.no 26. Which of the following testing method is normally used as acceptance test for a software
system?

A : Regression testing

B : Integration testing

C : Unit testing

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 357/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

D : Functional testing

Q.no 27. Requirement Engineering is not concern with ____________.

A : Requirement Design

B : Requirement Elicitation

C : Requirement Analysis

D : Requirement Documentation

Q.no 28. Which of the following truly describes Bridges?

A : Encapsulation whereby some components is encased within an alternative abstraction

B : Translation between assumptions of an arbitrary component to some provides assumptions of some


other arbitrary components

C : Incorporation of planning function that in effect results in runtime determination of the translation

D : Repair those cases you have detected by adapting the components

Q.no 29. A software reengineeering process model consists of:

A : code restructuring

B : back engineering

C : document engineerinhg

D : implementation engineering

Q.no 30. Bug status is set to postpone due to ________.

A : Priority of that bug may low.

B : Lack of time for the release.

C : The bug may not be the major effect in the software.

D : Data may be unavailable.

Q.no 31. Regression testing is a major part of which of the life cycle?

A : Waterfall model

B : V model

C : Iterative model

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 358/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

D : Agile model

Q.no 32. What can static analysis NOT find?

A : Memory leaks

B : Unreachable (“dead”) code

C : The use of a variable before it has been defined

D : Array bound violations

Q.no 33. Software testing are most effective if applied immediately after

A : Requirement Specification

B : Design

C : Coding

D : Integration

Q.no 34. The modification of the software to match changes in the ever changing environment,
falls under which category of software maintenance?

A : Adaptive

B : Corrective

C : perfective

D : preventive

Q.no 35. which of the following risk is a potential threat to every software project

A : generic risk

B : project risk

C : product risk

D : business risk

Q.no 36. Which is not a SQA activity?

A : Black box testing

B : White box testing

C : Integration testing

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 359/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

D : Unit testing

Q.no 37. What describes how a set of interacting components can share data?

A : model-view-controller

B : repository pattern

C : architecture

D : different operating system

Q.no 38. ETL stands for

A : Data Extraction Transformation & Loading

B : Data Execution Transformation & Loading

C : Extraction Transformation & Loading

D : Execution Transformation & Loading

Q.no 39. Who leads a formal review process?

A : Author

B : Moderator

C : Reviewer

D : Scribe

Q.no 40. Webapp configuration object can be managed in much the same way as conventional
software configuration objects except for

A : content items

B : graphic items

C : functional items

D : user items

Q.no 41. What is Fault Masking?

A : Creating a test case which does not reveal a fault

B : Error condition hiding another error condition

C : Masking a fault by developer

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 360/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

D : Masking a fault by a tester

Q.no 42. Test wares are handed over to maintenance team during which phase?

A : Test implementation and execution

B : Test closure activity

C : Evaluating exit criteria and reporting

D : Test analysis and design

Q.no 43. Which of the following is not real-time architectural patterns that are commonly used?

A : Asynchronous communication

B : Observe and React

C : Environmental Control

D : Process Pipeline

Q.no 44. Which of the following is not a Software Configuration Management Activity?

A : Configuration item identification

B : Risk management

C : Release management

D : Branch management

Q.no 45. After occurence of the risk ,the developement team members do some rapid actions to
overcome the problem called as

A : reactive risk mode

B : proactive risk mode

C : fire fighting mode

D : quick rectification mode

Q.no 46. Which architectural style goal is to achieve Modifiability with Scalability?

A : Data Flow Architecture

B : Call and Return Architecture

C : Data Centered Architectures

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 361/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

D : Virtual Machine Architecture

Q.no 47. Which of the following is not a state of a defect in defect life cycle:

A : Verified

B : New

C : Critical

D : Deferred

Q.no 48. Which of the following is not a software testing generic characteristics?

A : Different testing techniques are appropriate at different points in time

B : Testing is conducted by the developer of the software or an independent test group

C : Testing and debugging are different activities, but debugging must be accommodated in any testing
strategy

D : None of the mentioned

Q.no 49. Static analysis can be best described as:

A : The reviewing of test plans

B : The analysis of batch programs

C : The use of black box testing

D : The analysis of program code

Q.no 50. Version control is not capable of doing

A : enables any version to be constructed using differences from past versions

B : a make facility that enables you to collect all relevant configuration objects and construct a specific
version of the software.

C : If the central database is corrupted, the entire history remains safe and secured

D : a project database repository that stores all relevant configuration objects

Q.no 51. Which one of these belongs to integration testing in the OO context?

A : Unit testing

B : Regression testing

C : Sandwich testing

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 362/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

D : Thread-based testing

Q.no 52. Which of the following is the component test standard?

A : BS7925-2

B : IEEE 829

C : BS7925-1

D : IEEE 610

Q.no 53. The __________ enables the software engineer to develop models of the information
domain and functional domain at the same time

A : Data flow diagram

B : State transition diagram

C : Control specification

D : Activity diagram

Q.no 54. Which of the following is not a design principle that allow the user to maintain control?

A : Provide for flexible interaction

B : Allow user interaction to be interrupt-able and undo-able

C : Show technical internals from the casual user

D : Design for direct interaction with objects that appear on the screen

Q.no 55. Which model describes the static structure of the system using object classes and their
relationships?

A : Structural model

B : Dynamic model

C : Subsystem model

D : Sequence model

Q.no 56. which of the following impact of the risk drivers on risk components is also called as
disastrous impact

A : critical impact

B : catastrophic impact

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 363/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30

C : marginal impact

D : Destructive impact

Q.no 57. A chronological record of relevant details about the execution of tests is called as, a
_______

A : Test suite

B : Test procedure

C : Test data

D : Test log

Q.no 58. A product is re-engineered when

A : system crashes frequently

B : tools to support restructuring are disabled

C : hardware or software support becomes obsolete

D : subsystems of a larger system require few maintenance

Q.no 59. A _________ is a graphical representation that depicts information flow and the
transforms that are applied as data moves from input to output.

A : Data flow diagram

B : State transition diagram

C : Control specification

D : Activity diagram

Q.no 60. Three factors that affect the consequences that are likely to happen if a risk does occur:

A : its nature,
its scope, and its intensity.

B : its nature,
its scope, and its timing.

C : its nature,
its scope, and its durability.

D : its nature,
its limit, and its timing.

https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 364/364

You might also like