SEPM All Que
SEPM All Que
testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Seat No -
Total number of questions : 60
1) All questions are Multiple Choice Questions having single correct option.
7) Use only black/blue ball point pen to darken the appropriate circle.
Q.no 1. Which of the following is not a Software Development Life Cycle Phase?
A : Requirements Gathering
B : Test Closure
C : Coding
D : Testing
A : object-oriented systems
B : architectural design
C : SRS
A : Test Plan
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 1/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
D : Test Log
A : TestNextGeneration
B : TestNewGenerlization
C : TestNewGeneration
D : TestNextGenerations
A : Test Specification
B : Test Planning
C : Test Requirement
D : Test Configuration
Q.no 7. Which of the following is not part of the software reengineering process model?
A : reverse engineering
B : forward engineering
C : inventory analysis
D : prototyping
Q.no 8. Select the method which selects the option at the at the given index
A : selectByIndex()
B : selectIndex()
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 2/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : selectedByIndex()
D : selectByIndexes()
Q.no 9. Which one of the following phases accounts for the maximum effort during development
of a typical software?
A : Coding
B : Testing
C : Designing
D : Specification
Q.no 10. Before handing over the software to the client, which testing is to be done in-house?
A : Alpha
B : Betta
C : Gamma
D : Theta
Q.no 11. Choose the incorrect statement with respect to Non-Functional Requirement(NFR)
B : Process-oriented Approach – Focus on how NFRs can be used in the design process
Q.no 12. Select the tab that shows which command Selenium IDE is currently executing
A : Variable
B : Data
C : Information
D : Info
A : Spiral model.
B : Waterfall model.
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 3/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : Prototyping model
D : Incremental Model.
Q.no 14. What incorporates data, architectural, interface, and procedural representations of the
software?
A : design model
B : user’s model
C : mental image
D : system image
Q.no 15. In case of Selenium IDE, the source view shows your script in
A : DHTML format
B : XML format
C : j2EE format
D : HTML format
Q.no 17. Which of the following is the best type of module coupling?
A : Control Coupling
B : Stamp Coupling
C : Data Coupling
D : Content Coupling
Q.no 18. Which of the following is not a user interface design process?
B : Interface design
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 4/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
D : Interface validation
Q.no 19. First graphical user interface used commercially was introduced in
A : 1975
B : 1966
C : 1977
D : 1967
Q.no 20. Consider the following partial description of the IIT security software. “A camera at the
main gate should detect an incoming vehicle, and the gate should be opened for registered
vehicles.” Which one of the following types of requirements is this?
A : Functional requirement
B : Non-Functional requirement
C : Design requirement
D : Design constraint
D:0
Q.no 22. When users are involved in complex tasks, the demand on __________ can be significant
A : short-term memory
B : shortcuts
Q.no 23. In software development life cycle , who is the best person to catch a defect?
A : Software Tester
B : Customers
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 5/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : Designer
D : Business Analyst
Q.no 24. Java packages and Fortran subroutine are examples of__________
A : Functions
B : Modules
C : Classes
D : Sub procedures
A : Google Chrome
B : Opera Mini
C : Mozilla Firefox
D : Internet Explorer
A : Big-bang
B : Bottom-up
C : Design based
D : Top-down
Q.no 28. Which of the following is not real-time architectural patterns that are commonly used?
A : Asynchronous communication
C : Environmental Control
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 6/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
D : Process Pipeline
Q.no 29. E-Commerce software testing follows different approach than gaming software testing.
Which testing principle implies this?
A : Pareto principle
D : Absence of errors-fallacy
B : Component testing
D : Maintenance testing
Q.no 31. Three statements are given below regarding the User Interface Design: 1) Place the user
in Control. 2) Reduce user's memory load. 3) Make the interface consistent. These rules are
called as __________.
A : Governed Rule
B : Golden Rule
C : User Rule
D : Thumb Rule
Q.no 32. Software testing are most effective if applied immediately after
A : Requirement Specification
B : Design
C : Coding
D : Integration
Q.no 33. Systems that involve interaction with a shared database can be considered as.
A : software-based
B : transaction-based
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 7/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : server-based
D : client-based
Q.no 34. Which of the following is not a software testing generic characteristics?
C : Testing and debugging are different activities, but debugging must be accommodated in any testing
strategy
B : Test Type
C : SDLC Model
D : Test Level
C : Integration testing
D : Unit testing
C : Coupling among the client will lessen the effect of data center architecture
A : Object modules
B : Hardware modules
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 8/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : Functional modules
A : Requirements Gathering
B : Test Planning
C : Test Closure
D : Test Design
Q.no 40. Which of the following is not a state of a defect in defect life cycle:
A : Verified
B : New
C : Critical
D : Deferred
Q.no 41. Which architectural style goal is to achieve Modifiability with Scalability?
A : Memory leaks
Q.no 44. What are the criteria to decide the testing efforts?1. Time and budget
2. Size of development team
3. Size of testers
4. Risk associated with project
A : a. 1, 3, 4
B : b. 1, 2, 3
C : c. 1, 4
D : d. 1, 3
Q.no 45. Test wares are handed over to maintenance team during which phase?
Q.no 46. Which of the following risk is the failure of a purchased component to perform as
expected
A : Product risk
B : Business risk
C : Programming risk
D : Project risk
A : White box
B : Grey box
C : Black box
D : Combination of all
Q.no 48. Software tester focuses more on complex part of the software. Which of the following
testing principle implies this?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 10/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
B : Pesticide paradox
D : Defect Clustering
Q.no 49. The modification of the software to match changes in the ever changing environment,
falls under which category of software maintenance?
A : Adaptive
B : Corrective
C : perfective
D : preventive
Q.no 50. Regression testing is a major part of which of the life cycle?
A : Waterfall model
B : V model
C : Iterative model
D : Agile model
B : During designing
C : During coding
D : During testing
Q.no 52. What determines how information is stored in the repository, how data can be accessed
by tools and viewed by software engineers, how well data security and integrity can be
maintained, and how easily the existing model can be extended to accommodate new needs.
A : Data model
B : Meta model
C : Configuration model
D : Test model
Q.no 53. Risk mitigation is a risk ___________activity. Risk monitoring is a ___________ activity
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 11/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
D : Random, Tracking.
A : Bottom up
B : Top down
C : Big-bang
D : Functional incrimination
Q.no 55. The __________ enables the software engineer to develop models of the information
domain and functional domain at the same time
C : Control specification
D : Activity diagram
Q.no 56. The order in which test levels are performed is:
Q.no 57. The main focus of ______ is to reduce defects and variations in the processes.
A : QA
B : QC
C : Six Sigma
D : tracking
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 12/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : BS7925-2
B : IEEE 829
C : BS7925-1
D : IEEE 610
Q.no 60. Which of the following is likely to benefit most from the use of test tools providing test
capture and replay facilities?
A : Integration testing
B : Regression testing
C : System testing
A : Developer
B : Designer
C : Tester
D : QA Team
Q.no 2. Which one of the following statements most accurately identifies the stakeholders in a
software development project?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 13/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : The main technique for achieving portable software is to isolate system dependency
B : The main technique for achieving portable software is to increase the overall performance
C : The main technique for achieving portable software is to have independent platform dependency
D : The main technique for achieving portable software is to have independent platform dependency
and to increase accuracy
Q.no 4. The operation phase of the waterfall model is a synonym for which one of the following
phases?
C : Maintenance phase
D : Design phase
A : Behavioral testing
Q.no 7. Select the command which is used to pause execution until the page is loaded completely
A : waitForPageToLoad
B : waitForElementPresent
C : waitForPage
D : waitForLoad
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 14/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : Architectural style is a description of component types and a pattern of run-time control with a set
of constraints on architecture
Q.no 9. The implementation phase of the waterfall model is a synonym for which one of the
following phases?
C : Maintenance phase
D : Design phase
Q.no 10. Which of these does not represent object oriented design?
C : Central model represents class diagrams that show the classes comprising a program and their
relationships to one another
A : always possible
B : practically possible
Q.no 12. Select the command that will not wait for the new page to load before moving on to the
next command
A : clickAndWait
B : typeAndWait
C : selectAndWait
D : selectAndType
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 15/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : Corrective maintainence
B : adaptive maintainence
C : perfective maintainence
D : predetermined maintainence
Q.no 14. Which of the following model put much more emphasis on testing?
A : waterfall model
B : agile model
C : spiral model
D : v-v model
A : Quality risk
B : Performance risk
C : Cost risk
D : Support risk
Q.no 16. Which one of the following most accurately reflects agile software development?
A : Incremental development
B : Iterative development
C : Linear development
Q.no 17. Which lines depict that architecture defines constraints on an implementation?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 16/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 18. Select the command in SeleniumIDE used to open a web page using theURL
A : OpenRecord
B : Open
C : OpenText
D : OpenTable
Q.no 19. Unit testing is carried out during which phase of the waterfall model?
A : Implementation phase
B : Testing phase
C : Maintenance phase
D : Design phase
Q.no 20. Select the name which is not the type of locators
A : ID
B : Name
C : Password
D : Link Text
Q.no 21. Select the method which performs a context-click at the curent mouse location
A : click_Context()
B : context.Click()
C : contextClick()
D : context_Click()
A : Ad-hoc testing
B : Monkey testing
C : Fuzz testing
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 17/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
D : End-to-End testing
Q.no 23. Consider the following requirement for a word processor software: " The software
should provide facility to import an existing image available as a jpeg file into the document
being created.". Which one of the following types of requirements is this?
A : Functional requirement
B : Non-functional requirement
D : Goal of implementation
Q.no 24. Test cases are designed during which of the following stages?
A : Test recording
B : Test configuration
C : Test planning
D : Test specification
Q.no 25. Select the language which is not supported by the Selenium RC
A : ASP
B : Java
C : C#
D : PHP
Q.no 26. Which of the following pattern is the basis of interaction management in many web-
based systems?
A : model-view-controller
B : repository pattern
C : architecture
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 18/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 28. What effect does achievement of quality attribute will have?
D : The achievement of quality attribute will have a positive as well as negative effect
Q.no 29. Which granularity level of testing checks the behavior of module cooperation?
A : Unit Testing
B : Integration Testing
C : Acceptance Testing
D : Regression Testing
A : Developer’s end
B : User’s end
Q.no 31. Which of the following items would not come under Configuration Management?
A : Operating systems
B : Live data
C : Test documentation
Q.no 32. ______provide the mechanisms for assembling SCIs into a version-specific
configuration.
A : Repository
B : versioning
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 19/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : modeling
D : assembling
A : product risk
B : project risk
C : business risk
D : management rsik
Q.no 35. What combines procedures and tools to manage different versions of configuration
objects that are created during the software process?
A : Versioning
B : Audit trails
C : Change control
D : SCI
C : supported everywhere
A : Database Testing
B : Security Testing
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 20/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : Statement Testing
D : Functional Testing
Q.no 38. What describes how a set of interacting components can share data?
A : model-view-controller
B : repository pattern
C : architecture
Q.no 39. which of the following is the highest level in the reverse engineering process
A : testing level
B : abstraction level
C : design level
D : maintainence level
A : Author
B : Moderator
C : Reviewer
D : Scribe
Q.no 41. In a simple risk table the risks are categorized into
A : PS, BU , CU
B : TU ,DE ,ST
C : BE ,CU ,ST
D : SU , TE ,CU ,PS
Q.no 42. What allows different projects to use the same source files at the same time?
A : Version Control
B : Access control
C : CM Process
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 21/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 43. The nature of Software Application can be characterized by their information
A : Determinacy
B : Content
C : Complexity
C : cIncorporation of planning function that in effect results in runtime determination of the translation
B : a make facility that enables you to collect all relevant configuration objects and construct a specific
version of the software.
C : If the central database is corrupted, the entire history remains safe and secured
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 22/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : Incorporation of planning function that in effect results in runtime determination of the translation
Q.no 48. Which of the following is not a Software Configuration Management Activity?
B : Risk management
C : Release management
D : Branch management
Q.no 50. A set of tools coupled within a file management system that enables access to and
management of each software configuration item is known as
A : component element
B : process element
C : construction element
D : human elements
Q.no 51. The ability to identify which requirement generated any given work product is known
as
A : forward tracing
B : backward tracing
C : Dependency tracking
D : Change management
Q.no 52. Which model describes the static structure of the system using object classes and their
relationships?
A : Structural model
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 23/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
B : Dynamic model
C : Subsystem model
D : Sequence model
Q.no 53. which of the following impact of the risk drivers on risk components is also called as
disastrous impact
A : critical impact
B : catastrophic impact
C : marginal impact
D : Destructive impact
Q.no 54. What combines the outward manifestation of the computer-based system , coupled with
all supporting information that describe system syntax and semantics?
A : design model
B : user’s model
C : mental image
D : system image
Q.no 55. when SCM is a formal activity the software configuration audit is conducted by
A : testing specialists
B : development team
C : senior managers
Q.no 56. which control helps to ensure that parallel changes, performed by two different people,
don’t overwrite one another.
A : version control
B : synchronization control
C : access control
D : configuration control
Q.no 57. What mechanism is used to apprise others of changes that are made?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 24/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : Configuration management
B : Requirementss tracing
C : Reporting
D : Change control
Q.no 58. A chronological record of relevant details about the execution of tests is called as, a
_______
A : Test suite
B : Test procedure
C : Test data
D : Test log
Q.no 59. Which of the following type of maintenance takes the maximum chunk of the total
maintenance effort in a typical life cycle of a software product ?
A : Adaptive maintenance
B : Corrective maintenance
C : Preventive maintenance
D : Perfective maintenance
Q.no 60. A __________ executes the loop task first, then tests a condition and repeats the task
until the condition fails.
A : repeat until
B : condition
C : do while tests
D : if then-else
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 25/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : Black box
B : White box
C : Grey box
D : Glass box
Q.no 4. Which one of the following is not a standard software development process model?
A : Waterfall Model
B : Recursive Model
C : RAD Model
D : V Model
Q.no 5. A ________ view shows the system hardware and how software components are
distributed across the processors in the system.
A : physical
B : logical
C : process
A : Risk expense
B : Related expense
C : Risk exposure
D : Risk evaluation
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 26/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 7. Which one of the following may be experienced by a software development team when it
adopts a systematic development process model in preference to a build-and-fix style of
development?
C : Decreased maintainability
D:0
C : Alpha Testing
D : Beta testing
Q.no 10. In order to control cost, defects should ideally be detected in which phase:
A : Coding
B : Design
C : Implementation
D : Requirements Gathering
A : Customer
B : Investor
C : Developer
D : Project team
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 27/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 13. Which of the following statements explains portability in non-functional requirements?
A : It is a degree to which software running on one platform can easily be converted to run on another
platform
B : It cannot be enhanced by using languages, OS’ and tools that are universally available and
standardized
C : The ability of the system to behave consistently in a user-acceptable manner when operating within
the environment for which the system was intended
Q.no 14. Select the operating system which is not supported by Selenium IDE
A : Unix
B : Linux
C : Windows
D : Solaries
Q.no 15. Which of the following is the best type of module coupling?
A : Control Coupling
B : Stamp Coupling
C : Data Coupling
D : Content Coupling
Q.no 16. Select the method which clears all selected entries in Web Driver Selenium
A : dselectAll()
B : deselect_Al()
C : dselect_Al()
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 28/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
D : deselectAll()
A : Unit testing
B : Regression testing
C : Adhoc testing
Q.no 19. A collection of actions and tasks that define an effective approach to change
management is known as
A : component element
B : process element
C : construction element
D : human elements
A : Large
B : Small
C : Difficult to write
D : Difficult to test
Q.no 21. What does “Every software system has an architecture” implies?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 29/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : design model
B : user’s model
C : mental image
D : system image
D : Implements all requirements in the analysis model and provide a complete picture of the software
D : Glass box
A : Requirement Design
B : Requirement Elicitation
C : Requirement Analysis
D : Requirement Documentation
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 30/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : Retesting
B : Sanity testing
D : Confirmation testing
Q.no 29. The defect cluster change over time. Which of the following testing principle implies
this?
B : Pesticide paradox
D : Defect Clustering
C : Coupling among the client will lessen the effect of data center architecture
Q.no 31. Which architectural style goal is to achieve Modifiability with Reuse?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 31/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 32. Which of the following is not an issue to consider when reverse engineering?
A : directionality
B : connectivity
C : completeness
D : abstraction level
A : Memory leaks
Q.no 34. which of the following risk is a potential threat to every software project
A : generic risk
B : project risk
C : product risk
D : business risk
Q.no 35. Three statements are given below regarding the User Interface Design: 1) Place the user
in Control. 2) Reduce user's memory load. 3) Make the interface consistent. These rules are
called as __________.
A : Governed Rule
B : Golden Rule
C : User Rule
D : Thumb Rule
Q.no 36. Which of the following is/are commonly used architectural pattern(s)?
A : Model-View-Controller
B : Layered Architecture
C : Client–server
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 32/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 38. Test wares are handed over to maintenance team during which phase?
Q.no 39. Webapp configuration object can be managed in much the same way as conventional
software configuration objects except for
A : content items
B : graphic items
C : functional items
D : user items
A : Requirements Gathering
B : Test Planning
C : Test Closure
D : Test Design
B : Component testing
D : Maintenance testing
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 33/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 42. Systems that involve interaction with a shared database can be considered as.
A : software-based
B : transaction-based
C : server-based
D : client-based
Q.no 43. Which of the following testing method is normally used as acceptance test for a software
system?
A : Regression testing
B : Integration testing
C : Unit testing
D : Functional testing
C : Incorporation of planning function that in effect results in runtime determination of the translation
Q.no 45. Software tester focuses more on complex part of the software. Which of the following
testing principle implies this?
B : Pesticide paradox
D : Defect Clustering
Q.no 46. Which architectural style goal is to achieve Modifiability with Scalability?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 34/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A:PxC
B:PxM
C:MxC
D:PxS
Q.no 48. A set of tools that automate the construction of software by ensuring that the proper set
of validated components have been assembled are known as
A : component element
B : process element
C : construction element
D : human elements
Q.no 49. After occurence of the risk ,the developement team members do some rapid actions to
overcome the problem called as
Q.no 50. What are the criteria to decide the testing efforts?1. Time and budget
2. Size of development team
3. Size of testers
4. Risk associated with project
A : a. 1, 3, 4
B : b. 1, 2, 3
C : c. 1, 4
D : d. 1, 3
Q.no 51. Which one of these belongs to integration testing in the OO context?
A : Unit testing
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 35/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
B : Regression testing
C : Sandwich testing
D : Thread-based testing
Q.no 52. Which of the following is not a design principle that allow the user to maintain control?
D : Design for direct interaction with objects that appear on the screen
Q.no 53. The __________ contains a state transition diagram that is a sequential specification of
behavior.
C : Control specification
D : Activity diagram
A : Structural model
B : Dynamic model
C : Subsystem model
D : Sequence model
B : During designing
C : During coding
D : During testing
Q.no 56. The __________ enables the software engineer to develop models of the information
domain and functional domain at the same time
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 36/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : Control specification
D : Activity diagram
Q.no 57. Three factors that affect the consequences that are likely to happen if a risk does occur:
A : its nature,
its scope, and its intensity.
B : its nature,
its scope, and its timing.
C : its nature,
its scope, and its durability.
D : its nature,
its limit, and its timing.
Q.no 59. Which of the following is not needed to develop a system design from concept to detailed
object-oriented design?
C : Specifying interfaces
Q.no 60. Risk mitigation is a risk ___________activity. Risk monitoring is a ___________ activity
D : Random, Tracking.
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 37/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : elicitation
B : design
C : analysis
D : documentation
Q.no 2. Which one of the following is a requirement that fits in a developer’s module ?
A : Availability
B : Testability
C : Usability
D : Flexibility
A : In each increment, get something “quick and dirty” delivered and thereby save time
C : In each increment, get something of business-value delivered as quickly as possible, consistent with
the right level of quality
D : In each increment, get something delivered once it has been fully documented and the
documentation has been signed off as complete
A : Coverage analysis
B : Code inspection
C : Usability assessment
D : Installation test
A : Test Plan
D : Test Log
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 38/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 7. The importance of software design can be summarized in a single word which is:
A : Efficiency
B : Accuracy
C : Quality
D : Complexity
Q.no 9. Which of the following model put much more emphasis on testing?
A : waterfall model
B : agile model
C : spiral model
D : v-v model
Q.no 10. select the variation which locates elements by the value of their "id" attribute in Web
Driver Selenium
A : By.id
B : By.idno
C : By.id_no
D : By.tag_id
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 39/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : Architecture
B : Data
C : Interface
Q.no 12. When users are involved in complex tasks, the demand on __________ can be significant
A : short-term memory
B : shortcuts
A : always possible
C : practically possible
Q.no 14. Select the command which is used to compare the actual page title with an expected
value
A : verifyTitle
B : verifiedTitle
C : verifyTitles
D : verifiedTitles
Q.no 15. A software requirements specification (SRS) document should avoid discussing which
one of the following?
A : Functional requirements
B : Non-functional requirements
C : Design specification
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 40/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 16. Select the command which is used to print a string value of a variable in Selenium IDE
A : Google Chrome
B : Opera Mini
C : Mozilla Firefox
D : Internet Explorer
A : During testing
B : During execution
C : During review
D : Throughout life-cycle
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 41/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 21. Which one of the following is not a requirements gathering technique
A : Task analysis
B : Scenario analysis
C : Form analysis
A : Users
B : Developers
C : Customers
Q.no 25. A software process model represents which one of the following?
C : Incorporation of planning function that in effect results in runtime determination of the translation
Q.no 27. Which of the following is not a state of a defect in defect life cycle:
A : Verified
B : New
C : Critical
D : Deferred
A : Developer’s end
B : User’s end
Q.no 29. What describes how a set of interacting components can share data?
A : model-view-controller
B : repository pattern
C : architecture
Q.no 30. Which of the following is not a Software Configuration Management Activity?
B : Risk management
C : Release management
D : Branch management
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 43/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 32. The nature of Software Application can be characterized by their information
A : Determinacy
B : Content
C : Complexity
Q.no 33. Which of the following is not real-time architectural patterns that are commonly used?
A : Asynchronous communication
C : Environmental Control
D : Process Pipeline
Q.no 34. E-Commerce software testing follows different approach than gaming software testing.
Which testing principle implies this?
A : Pareto principle
D : Absence of errors-fallacy
Q.no 35. What effect does achievement of quality attribute will have?
D : The achievement of quality attribute will have a positive as well as negative effect
Q.no 36. The modification of the software to match changes in the ever changing environment,
falls under which category of software maintenance?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 44/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : Adaptive
B : Corrective
C : perfective
D : preventive
Q.no 37. Which of the following is not a software testing generic characteristics?
C : Testing and debugging are different activities, but debugging must be accommodated in any testing
strategy
A : White box
B : Grey box
C : Black box
D : Combination of all
A : product risk
B : project risk
C : business risk
D : management rsik
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 45/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : cIncorporation of planning function that in effect results in runtime determination of the translation
Q.no 42. Which granularity level of testing checks the behavior of module cooperation?
A : Unit Testing
B : Integration Testing
C : Acceptance Testing
D : Regression Testing
Q.no 45. ______provide the mechanisms for assembling SCIs into a version-specific
configuration.
A : Repository
B : versioning
C : modeling
D : assembling
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 46/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : code restructuring
B : back engineering
C : document engineerinhg
D : implementation engineering
Q.no 47. Which of the following pattern is the basis of interaction management in many web-
based systems?
A : model-view-controller
B : repository pattern
C : architecture
A : Database Testing
B : Security Testing
C : Statement Testing
D : Functional Testing
A : Object modules
B : Hardware modules
C : Functional modules
Q.no 51. Which of the following is likely to benefit most from the use of test tools providing test
capture and replay facilities?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 47/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : Integration testing
B : Regression testing
C : System testing
Q.no 52. which control helps to ensure that parallel changes, performed by two different people,
don’t overwrite one another.
A : version control
B : synchronization control
C : access control
D : configuration control
Q.no 53. A _________ is a graphical representation that depicts information flow and the
transforms that are applied as data moves from input to output.
C : Control specification
D : Activity diagram
A : BS7925-2
B : IEEE 829
C : BS7925-1
D : IEEE 610
Q.no 55. when SCM is a formal activity the software configuration audit is conducted by
A : testing specialists
B : development team
C : senior managers
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 48/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : Bottom up
B : Top down
C : Big-bang
D : Functional incrimination
Q.no 57. What determines how information is stored in the repository, how data can be accessed
by tools and viewed by software engineers, how well data security and integrity can be
maintained, and how easily the existing model can be extended to accommodate new needs.
A : Data model
B : Meta model
C : Configuration model
D : Test model
Q.no 58. The ability to identify which requirement generated any given work product is known
as
A : forward tracing
B : backward tracing
C : Dependency tracking
D : Change management
Q.no 59. A chronological record of relevant details about the execution of tests is called as, a
_______
A : Test suite
B : Test procedure
C : Test data
D : Test log
Q.no 60. which of the following impact of the risk drivers on risk components is also called as
disastrous impact
A : critical impact
B : catastrophic impact
C : marginal impact
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 49/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
D : Destructive impact
Q.no 1. When an expected result is not specified in test case template then ___________.
Q.no 2. Before handing over the software to the client, which testing is to be done in-house?
A : Alpha
B : Betta
C : Gamma
D : Theta
A : Selenium IDE
B : Selenium RC
C : SeleniumGrid
D : Selenium Web
A : Mouse
B : keyboard
C : cpu
D : monitor
D:0
Q.no 7. Test cases are designed during which of the following stages?
A : Test recording
B : Test configuration
C : Test planning
D : Test specification
A : Product
B : Process
C : Design
D : Testing
A : 1975
B : 1966
C : 1977
D : 1967
Q.no 10. What is the main technique for achieving portable software?
A : The main technique for achieving portable software is to isolate system dependency
B : The main technique for achieving portable software is to increase the overall performance
C : The main technique for achieving portable software is to have independent platform dependency
D : The main technique for achieving portable software is to have independent platform dependency
and to increase accuracy
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 51/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 11. Which one of the following activities spans all stages of a software development life cycle
A : Coding
B : Testing
C : Project management
D : Design
A : Quality risk
B : Performance risk
C : Cost risk
D : Support risk
Q.no 13. Consider the following requirement for a word processor software: " The software
should provide facility to import an existing image available as a jpeg file into the document
being created.". Which one of the following types of requirements is this?
A : Functional requirement
B : Non-functional requirement
D : Goal of implementation
A : TestNextGeneration
B : TestNewGenerlization
C : TestNewGeneration
D : TestNextGenerations
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 52/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 17. Testing of software with actual data and in actual environment is known as?
A : Regression testing
B : Beta testing
C : Alpha testing
A : Selenium Generator
B : Selenium IDE
C : Selenium WebDriver
D:0
Q.no 19. In software development life cycle , who is the best person to catch a defect?
A : Software Tester
B : Customers
C : Designer
D : Business Analyst
Q.no 20. Select the command in SeleniumIDE used to open a web page using theURL
A : OpenRecord
B : Open
C : OpenText
D : OpenTable
Q.no 21. Which one of the following most accurately reflects agile software development?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 53/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : Incremental development
B : Iterative development
C : Linear development
Q.no 22. Which component of Selenium can create customized test results ?
A : Web Driver
B : Selenium RC
C : Selenium IDE
D : Selenium Grid
C : Dynamic testing
D : Static testing
B : Solution mode
C : Uncertain mode
D : Perfect mode
Q.no 26. Systems that involve interaction with a shared database can be considered as.
A : software-based
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 54/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
B : transaction-based
C : server-based
D : client-based
Q.no 27. What combines procedures and tools to manage different versions of configuration
objects that are created during the software process?
A : Versioning
B : Audit trails
C : Change control
D : SCI
Q.no 28. Which of the following testing method is normally used as acceptance test for a software
system?
A : Regression testing
B : Integration testing
C : Unit testing
D : Functional testing
Q.no 29. Webapp configuration object can be managed in much the same way as conventional
software configuration objects except for
A : content items
B : graphic items
C : functional items
D : user items
C : Coupling among the client will lessen the effect of data center architecture
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 55/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : Requirement Design
B : Requirement Elicitation
C : Requirement Analysis
D : Requirement Documentation
Q.no 32. Software testing are most effective if applied immediately after
A : Requirement Specification
B : Design
C : Coding
D : Integration
C : Integration testing
D : Unit testing
Q.no 34. Test wares are handed over to maintenance team during which phase?
Q.no 35. In a simple risk table the risks are categorized into
A : PS, BU , CU
B : TU ,DE ,ST
C : BE ,CU ,ST
D : SU , TE ,CU ,PS
Q.no 36. Software tester focuses more on complex part of the software. Which of the following
testing principle implies this?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 56/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
B : Pesticide paradox
D : Defect Clustering
Q.no 37. Which architectural style goal is to achieve Modifiability with Scalability?
Q.no 38. Which of the following risk is the failure of a purchased component to perform as
expected
A : Product risk
B : Business risk
C : Programming risk
D : Project risk
Q.no 39. Which of the following is not an issue to consider when reverse engineering?
A : directionality
B : connectivity
C : completeness
D : abstraction level
C : Incorporation of planning function that in effect results in runtime determination of the translation
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 57/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : Author
B : Moderator
C : Reviewer
D : Scribe
Q.no 43. which of the following is the highest level in the reverse engineering process
A : testing level
B : abstraction level
C : design level
D : maintainence level
B : a make facility that enables you to collect all relevant configuration objects and construct a specific
version of the software.
C : If the central database is corrupted, the entire history remains safe and secured
A : Memory leaks
Q.no 46. Three statements are given below regarding the User Interface Design: 1) Place the user
in Control. 2) Reduce user's memory load. 3) Make the interface consistent. These rules are
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 58/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
called as __________.
A : Governed Rule
B : Golden Rule
C : User Rule
D : Thumb Rule
A : Big-bang
B : Bottom-up
C : Design based
D : Top-down
Q.no 49. which of the following risk is a potential threat to every software project
A : generic risk
B : project risk
C : product risk
D : business risk
Q.no 50. Regression testing is a major part of which of the life cycle?
A : Waterfall model
B : V model
C : Iterative model
D : Agile model
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 59/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 51. What combines the outward manifestation of the computer-based system , coupled with
all supporting information that describe system syntax and semantics?
A : design model
B : user’s model
C : mental image
D : system image
A : Structural model
B : Dynamic model
C : Subsystem model
D : Sequence model
Q.no 53. The __________ enables the software engineer to develop models of the information
domain and functional domain at the same time
C : Control specification
D : Activity diagram
Q.no 54. Risk mitigation is a risk ___________activity. Risk monitoring is a ___________ activity
D : Random, Tracking.
Q.no 55. The main focus of ______ is to reduce defects and variations in the processes.
A : QA
B : QC
C : Six Sigma
D : tracking
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 60/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
B : During designing
C : During coding
D : During testing
Q.no 57. Which of the following is not needed to develop a system design from concept to detailed
object-oriented design?
C : Specifying interfaces
Q.no 58. Which of the following is not a design principle that allow the user to maintain control?
D : Design for direct interaction with objects that appear on the screen
Q.no 59. The order in which test levels are performed is:
Q.no 60. The __________ contains a state transition diagram that is a sequential specification of
behavior.
C : Control specification
D : Activity diagram
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 61/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
D : reference model mapped onto software components & data flow with comments
Q.no 2. The operation phase of the waterfall model is a synonym for which one of the following
phases?
C : Maintenance phase
D : Design phase
A : Design specification
B : Test specification
C : source code
D : configuration control
Q.no 4. In order to control cost, defects should ideally be detected in which phase:
A : Coding
B : Design
C : Implementation
D : Requirements Gathering
C : Architectural style is a description of component types and a pattern of run-time control with a set
of constraints on architecture
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 62/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 6. When a company plans to develop a generic product, who among the following is usually
the source of the requirements?
B : Project manager
C : Marketing personnel
Q.no 7. Select the command which retrieves the alert message and stores it in a variable that you
will specify
A : storeAlert
B : storedAlert
C : store_Alert
D : storesAlert
Q.no 8. Which of the following is not a design principle that allows the user to maintain control?
D : Design for direct interaction with objects that appear on the screen
Q.no 9. Consider the following partial description of the IIT security software. “A camera at the
main gate should detect an incoming vehicle, and the gate should be opened for registered
vehicles.” Which one of the following types of requirements is this?
A : Functional requirement
B : Non-Functional requirement
C : Design requirement
D : Design constraint
Q.no 10. Select the command which is used to print a string value of a variable in Selenium IDE
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 63/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 11. Members of a Scrum team are not expected to answer which one of the following
questions during a daily Scrum meeting?
C : During a Sprint, customer feedback is continually obtained and the Sprint backlog is accordingly
modified
Q.no 12. The importance of software design can be summarized in a single word which is:
A : Efficiency
B : Accuracy
C : Quality
D : Complexity
Q.no 13. Which one of the following feedback paths is not present in an iterative waterfall
model?
Q.no 14. Which of the following is not a part of a test design document?
A : Test Plan
D : Test Log
Q.no 15. Select the component which is not a type of assertion in Selenium IDE
A : Assert
B : Verify
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 64/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : WaitFor
D : Wait
Q.no 16. Which of the following is the best type of module coupling?
A : Control Coupling
B : Stamp Coupling
C : Data Coupling
D : Content Coupling
Q.no 17. Which of the following is not a Software Development Life Cycle Phase?
A : Requirements Gathering
B : Test Closure
C : Coding
D : Testing
Q.no 19. Which of the following is not a user interface design process?
B : Interface design
D : Interface validation
Q.no 21. Software risk always involves two characteristics. What are those characteristics?
A : Developer
B : Designer
C : Tester
D : QA Team
D : Software design is an activity subjected to constraints specifies nature and composition of software
product which satisfies client needs and desires
B : Path testing
C : Statement testing
Q.no 25. What can be used to test Flex/Flash aplication using Selenium
A : FlexUISelenium
B : FlexUI
C : UIFlexSelenium
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 66/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
D : SeleniumFlex
Q.no 27. Which granularity level of testing checks the behavior of module cooperation?
A : Unit Testing
B : Integration Testing
C : Acceptance Testing
D : Regression Testing
A : Object modules
B : Hardware modules
C : Functional modules
A : code restructuring
B : back engineering
C : document engineerinhg
D : implementation engineering
Q.no 30. Which architectural style goal is to achieve Modifiability with Reuse?
A:PxC
B:PxM
C:MxC
D:PxS
Q.no 32. What allows different projects to use the same source files at the same time?
A : Version Control
B : Access control
C : CM Process
Q.no 33. After occurence of the risk ,the developement team members do some rapid actions to
overcome the problem called as
Q.no 34. A set of tools that automate the construction of software by ensuring that the proper set
of validated components have been assembled are known as
A : component element
B : process element
C : construction element
D : human elements
Q.no 35. Which of the following is/are commonly used architectural pattern(s)?
A : Model-View-Controller
B : Layered Architecture
C : Client–server
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 68/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 36. Which of the following is not a Software Configuration Management Activity?
B : Risk management
C : Release management
D : Branch management
A : Developer’s end
B : User’s end
C : Incorporation of planning function that in effect results in runtime determination of the translation
A : Requirements Gathering
B : Test Planning
C : Test Closure
D : Test Design
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 69/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 41. ______provide the mechanisms for assembling SCIs into a version-specific
configuration.
A : Repository
B : versioning
C : modeling
D : assembling
Q.no 42. A set of tools coupled within a file management system that enables access to and
management of each software configuration item is known as
A : component element
B : process element
C : construction element
D : human elements
Q.no 43. The defect cluster change over time. Which of the following testing principle implies
this?
B : Pesticide paradox
D : Defect Clustering
C : cIncorporation of planning function that in effect results in runtime determination of the translation
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 70/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 47. What effect does achievement of quality attribute will have?
D : The achievement of quality attribute will have a positive as well as negative effect
Q.no 48. E-Commerce software testing follows different approach than gaming software testing.
Which testing principle implies this?
A : Pareto principle
D : Absence of errors-fallacy
C : supported everywhere
Q.no 50. Which of the following items would not come under Configuration Management?
A : Operating systems
B : Live data
C : Test documentation
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 71/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 51. which control helps to ensure that parallel changes, performed by two different people,
don’t overwrite one another.
A : version control
B : synchronization control
C : access control
D : configuration control
Q.no 52. when SCM is a formal activity the software configuration audit is conducted by
A : testing specialists
B : development team
C : senior managers
Q.no 53. Which of the following type of maintenance takes the maximum chunk of the total
maintenance effort in a typical life cycle of a software product ?
A : Adaptive maintenance
B : Corrective maintenance
C : Preventive maintenance
D : Perfective maintenance
Q.no 54. Which one of these belongs to integration testing in the OO context?
A : Unit testing
B : Regression testing
C : Sandwich testing
D : Thread-based testing
Q.no 55. Which of the following is likely to benefit most from the use of test tools providing test
capture and replay facilities?
A : Integration testing
B : Regression testing
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 72/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : System testing
Q.no 56. A chronological record of relevant details about the execution of tests is called as, a
_______
A : Test suite
B : Test procedure
C : Test data
D : Test log
Q.no 57. Three factors that affect the consequences that are likely to happen if a risk does occur:
A : its nature,
its scope, and its intensity.
B : its nature,
its scope, and its timing.
C : its nature,
its scope, and its durability.
D : its nature,
its limit, and its timing.
Q.no 58. Which model describes the static structure of the system using object classes and their
relationships?
A : Structural model
B : Dynamic model
C : Subsystem model
D : Sequence model
A : BS7925-2
B : IEEE 829
C : BS7925-1
D : IEEE 610
Q.no 60. A _________ is a graphical representation that depicts information flow and the
transforms that are applied as data moves from input to output.
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 73/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : Control specification
D : Activity diagram
A : Software Developer
B : End users
C : Testing team
D : Systems engineers
Q.no 2. The risks that are analyzed and managed should be derived from thorough study of
A : people,
product, process, and project.
B : people,
product, process, and management.
C : people,
product, process, and feedback.
D : people,
product, process, and environment.
A : Quality risk
B : Performance risk
C : Cost risk
D : Support risk
A : Selenium Generator
B : Selenium IDE
C : Selenium WebDriver
D:0
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 74/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 5. Testing of software with actual data and in actual environment is known as?
A : Regression testing
B : Beta testing
C : Alpha testing
Q.no 6. In which of the following type of testing, testing is done without planning and
documentation?
A : Unit testing
B : Retesting
C : Ad hoc testing
D : Regression testing
A : Risk expense
B : Related expense
C : Risk exposure
D : Risk evaluation
A : Task analysis
B : Scenario analysis
C : Form analysis
A : Data re-engineering
B : Refactoring
C : Restructuring
D : Repairing
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 75/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : Product
B : Process
C : Design
D : Testing
Q.no 12. Which one of the following is a requirement that fits in a developer’s module ?
A : Availability
B : Testability
C : Usability
D : Flexibility
A : condition-transaction-consequence
B : condition-transfer-consequence
C : condition-transition-consequence
D : condition-transmission-consequence
A : Corrective maintainence
B : adaptive maintainence
C : perfective maintainence
D : predetermined maintainence
D:0
A : Mitigate,Contingency
B : Transfer
D : Ignore
Q.no 18. Select the method which performs a context-click at the curent mouse location
A : click_Context()
B : context.Click()
C : contextClick()
D : context_Click()
Q.no 19. Which one of the following views is implicit in an SRS document?
A : Black box
B : White box
C : Grey box
D : Glass box
Q.no 20. When users are involved in complex tasks, the demand on __________ can be significant
A : short-term memory
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 77/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
B : shortcuts
Q.no 21. Consider a system where, a heat sensor detects an intrusion and alerts the security
company.” What kind of a requirement the system is providing?
A : Functional
B : Non-Functional
C : Known Requirement
A : Large
B : Small
C : Difficult to write
D : Difficult to test
Q.no 24. How many classification schemes have been developed for NFRs ?
A : Two
B : Three
C : Four
D : Five
A : TestNextGeneration
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 78/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
B : TestNewGenerlization
C : TestNewGeneration
D : TestNextGenerations
A : Retesting
B : Sanity testing
D : Confirmation testing
C : Coupling among the client will lessen the effect of data center architecture
Q.no 28. Which architectural style goal is to achieve Modifiability with Scalability?
A : Database Testing
B : Security Testing
C : Statement Testing
D : Functional Testing
Q.no 30. Which of the following testing method is normally used as acceptance test for a software
system?
A : Regression testing
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 79/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
B : Integration testing
C : Unit testing
D : Functional testing
A : Memory leaks
A : product risk
B : project risk
C : business risk
D : management rsik
Q.no 33. Regression testing is a major part of which of the life cycle?
A : Waterfall model
B : V model
C : Iterative model
D : Agile model
Q.no 34. Three statements are given below regarding the User Interface Design: 1) Place the user
in Control. 2) Reduce user's memory load. 3) Make the interface consistent. These rules are
called as __________.
A : Governed Rule
B : Golden Rule
C : User Rule
D : Thumb Rule
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 80/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
B : Test Type
C : SDLC Model
D : Test Level
Q.no 37. The modification of the software to match changes in the ever changing environment,
falls under which category of software maintenance?
A : Adaptive
B : Corrective
C : perfective
D : preventive
Q.no 38. Software testing are most effective if applied immediately after
A : Requirement Specification
B : Design
C : Coding
D : Integration
Q.no 40. What are the criteria to decide the testing efforts?1. Time and budget
2. Size of development team
3. Size of testers
4. Risk associated with project
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 81/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : a. 1, 3, 4
B : b. 1, 2, 3
C : c. 1, 4
D : d. 1, 3
A : Author
B : Moderator
C : Reviewer
D : Scribe
Q.no 43. Webapp configuration object can be managed in much the same way as conventional
software configuration objects except for
A : content items
B : graphic items
C : functional items
D : user items
Q.no 44. Systems that involve interaction with a shared database can be considered as.
A : software-based
B : transaction-based
C : server-based
D : client-based
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 82/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
B : Component testing
D : Maintenance testing
C : Integration testing
D : Unit testing
B : a make facility that enables you to collect all relevant configuration objects and construct a specific
version of the software.
C : If the central database is corrupted, the entire history remains safe and secured
Q.no 49. which of the following is the highest level in the reverse engineering process
A : testing level
B : abstraction level
C : design level
D : maintainence level
Q.no 50. In a simple risk table the risks are categorized into
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 83/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : PS, BU , CU
B : TU ,DE ,ST
C : BE ,CU ,ST
D : SU , TE ,CU ,PS
Q.no 51. Which of the following is not needed to develop a system design from concept to detailed
object-oriented design?
C : Specifying interfaces
Q.no 52. What determines how information is stored in the repository, how data can be accessed
by tools and viewed by software engineers, how well data security and integrity can be
maintained, and how easily the existing model can be extended to accommodate new needs.
A : Data model
B : Meta model
C : Configuration model
D : Test model
Q.no 53. What mechanism is used to apprise others of changes that are made?
A : Configuration management
B : Requirementss tracing
C : Reporting
D : Change control
Q.no 54. Which of the following is not a design principle that allow the user to maintain control?
D : Design for direct interaction with objects that appear on the screen
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 84/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 55. The order in which test levels are performed is:
A : Bottom up
B : Top down
C : Big-bang
D : Functional incrimination
A : Structural model
B : Dynamic model
C : Subsystem model
D : Sequence model
Q.no 58. which of the following impact of the risk drivers on risk components is also called as
disastrous impact
A : critical impact
B : catastrophic impact
C : marginal impact
D : Destructive impact
Q.no 59. A __________ executes the loop task first, then tests a condition and repeats the task
until the condition fails.
A : repeat until
B : condition
C : do while tests
D : if then-else
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 85/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 1. Select the command in SeleniumIDE used to open a web page using theURL
A : OpenRecord
B : Open
C : OpenText
D : OpenTable
A : Spiral model.
B : Waterfall model.
C : Prototyping model
D : Incremental Model.
A : In each increment, get something “quick and dirty” delivered and thereby save time
C : In each increment, get something of business-value delivered as quickly as possible, consistent with
the right level of quality
D : In each increment, get something delivered once it has been fully documented and the
documentation has been signed off as complete
A : Unit testing
B : Regression testing
C : Adhoc testing
A : Maintainability
B : Portability
C : Robustness
Q.no 9. In case of Selenium IDE, the source view shows your script in
A : DHTML format
B : XML format
C : j2EE format
D : HTML format
Q.no 10. The importance of software design can be summarized in a single word which is:
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 87/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : Efficiency
B : Accuracy
C : Quality
D : Complexity
Q.no 11. Which of the following model put much more emphasis on testing?
A : waterfall model
B : agile model
C : spiral model
D : v-v model
A : waitForTitle
B : waitForTextPresent
C : waitForActive
D : waitForAlert
Q.no 13. Which of the following is not a part of a test design document?
A : Test Plan
D : Test Log
Q.no 14. What incorporates data, architectural, interface, and procedural representations of the
software?
A : design model
B : user’s model
C : mental image
D : system image
Q.no 15. Select the language which is supported by the Selenium Web driver
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 88/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : Perl
B : Sql
C : ASP
D : Cobol
Q.no 17. What are the benefits for component based product lines?
A : Being able to take faster advantage of new product and new technology
Q.no 18. Select the method which selects the option at the at the given index
A : selectByIndex()
B : selectIndex()
C : selectedByIndex()
D : selectByIndexes()
Q.no 19. Select the command which is used to print a string value of a variable in Selenium IDE
Q.no 20. Select the command which is used to check the presence of a certain element
A : verifyTable
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 89/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
B : verifyTitlePresent
C : verifyTextPresent
D : verifyElementPresent
Q.no 21. The operation phase of the waterfall model is a synonym for which one of the
following phases?
C : Maintenance phase
D : Design phase
Q.no 22. The implementation phase of the waterfall model is a synonym for which one of the
following phases?
C : Maintenance phase
D : Design phase
Q.no 23. Which one of the following feedback paths is not present in an iterative waterfall
model?
Q.no 24. Select the language which is not supported by the Selenium RC
A : ASP
B : Java
C : C#
D : PHP
Q.no 25. Consider the following partial description of the IIT security software. “A camera at the
main gate should detect an incoming vehicle, and the gate should be opened for registered
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 90/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : Functional requirement
B : Non-Functional requirement
C : Design requirement
D : Design constraint
Q.no 26. E-Commerce software testing follows different approach than gaming software testing.
Which testing principle implies this?
A : Pareto principle
D : Absence of errors-fallacy
Q.no 27. Which of the following is not a Software Configuration Management Activity?
B : Risk management
C : Release management
D : Branch management
Q.no 28. The nature of Software Application can be characterized by their information
A : Determinacy
B : Content
C : Complexity
Q.no 29. Which of the following risk is the failure of a purchased component to perform as
expected
A : Product risk
B : Business risk
C : Programming risk
D : Project risk
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 91/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 30. What effect does achievement of quality attribute will have?
D : The achievement of quality attribute will have a positive as well as negative effect
Q.no 31. A set of tools that automate the construction of software by ensuring that the proper set
of validated components have been assembled are known as
A : component element
B : process element
C : construction element
D : human elements
Q.no 32. What allows different projects to use the same source files at the same time?
A : Version Control
B : Access control
C : CM Process
Q.no 33. After occurence of the risk ,the developement team members do some rapid actions to
overcome the problem called as
A : Developer’s end
B : User’s end
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 92/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : Big-bang
B : Bottom-up
C : Design based
D : Top-down
A:PxC
B:PxM
C:MxC
D:PxS
Q.no 37. Which of the following pattern is the basis of interaction management in many web-
based systems?
A : model-view-controller
B : repository pattern
C : architecture
A : Requirement Design
B : Requirement Elicitation
C : Requirement Analysis
D : Requirement Documentation
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 93/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 40. Which of the following is not a software testing generic characteristics?
C : Testing and debugging are different activities, but debugging must be accommodated in any testing
strategy
Q.no 41. which of the following risk is a potential threat to every software project
A : generic risk
B : project risk
C : product risk
D : business risk
A : code restructuring
B : back engineering
C : document engineerinhg
D : implementation engineering
C : Incorporation of planning function that in effect results in runtime determination of the translation
Q.no 44. A set of tools coupled within a file management system that enables access to and
management of each software configuration item is known as
A : component element
B : process element
C : construction element
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 94/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
D : human elements
A : White box
B : Grey box
C : Black box
D : Combination of all
Q.no 46. Which of the following items would not come under Configuration Management?
A : Operating systems
B : Live data
C : Test documentation
Q.no 48. Which of the following is not an issue to consider when reverse engineering?
A : directionality
B : connectivity
C : completeness
D : abstraction level
Q.no 49. What combines procedures and tools to manage different versions of configuration
objects that are created during the software process?
A : Versioning
B : Audit trails
C : Change control
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 95/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
D : SCI
Q.no 50. Which granularity level of testing checks the behavior of module cooperation?
A : Unit Testing
B : Integration Testing
C : Acceptance Testing
D : Regression Testing
Q.no 51. A chronological record of relevant details about the execution of tests is called as, a
_______
A : Test suite
B : Test procedure
C : Test data
D : Test log
Q.no 52. The __________ enables the software engineer to develop models of the information
domain and functional domain at the same time
C : Control specification
D : Activity diagram
Q.no 53. The main focus of ______ is to reduce defects and variations in the processes.
A : QA
B : QC
C : Six Sigma
D : tracking
Q.no 54. when SCM is a formal activity the software configuration audit is conducted by
A : testing specialists
B : development team
C : senior managers
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 96/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 55. Which of the following type of maintenance takes the maximum chunk of the total
maintenance effort in a typical life cycle of a software product ?
A : Adaptive maintenance
B : Corrective maintenance
C : Preventive maintenance
D : Perfective maintenance
Q.no 56. What combines the outward manifestation of the computer-based system , coupled with
all supporting information that describe system syntax and semantics?
A : design model
B : user’s model
C : mental image
D : system image
Q.no 57. A _________ is a graphical representation that depicts information flow and the
transforms that are applied as data moves from input to output.
C : Control specification
D : Activity diagram
Q.no 58. Which of the following is likely to benefit most from the use of test tools providing test
capture and replay facilities?
A : Integration testing
B : Regression testing
C : System testing
A : BS7925-2
B : IEEE 829
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 97/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : BS7925-1
D : IEEE 610
Q.no 60. The __________ contains a state transition diagram that is a sequential specification of
behavior.
C : Control specification
D : Activity diagram
A : object-oriented systems
B : architectural design
C : SRS
Q.no 3. Which one of the following is not a standard software development process model?
A : Waterfall Model
B : Recursive Model
C : RAD Model
D : V Model
Q.no 4. In software development life cycle , who is the best person to catch a defect?
A : Software Tester
B : Customers
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 98/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : Designer
D : Business Analyst
Q.no 5. Unit testing is carried out during which phase of the waterfall model?
A : Implementation phase
B : Testing phase
C : Maintenance phase
D : Design phase
Q.no 6. Select the component which is not a type of assertion in Selenium IDE
A : Assert
B : Verify
C : WaitFor
D : Wait
Q.no 7. select the variation which locates elements by the value of their "id" attribute in Web
Driver Selenium
A : By.id
B : By.idno
C : By.id_no
D : By.tag_id
A : The main technique for achieving portable software is to isolate system dependency
B : The main technique for achieving portable software is to increase the overall performance
C : The main technique for achieving portable software is to have independent platform dependency
D : The main technique for achieving portable software is to have independent platform dependency
and to increase accuracy
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 99/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 10. Which one of the following most accurately reflects agile software development?
A : Incremental development
B : Iterative development
C : Linear development
A : Data re-engineering
B : Refactoring
C : Restructuring
D : Repairing
A : Test Specification
B : Test Planning
C : Test Requirement
D : Test Configuration
A : design model
B : user’s model
C : mental image
D : system image
Q.no 14. Which of the following is not a user interface design process?
B : Interface design
D : Interface validation
Q.no 15. Select the command which is used to pause execution until the page is loaded completely
A : waitForPageToLoad
B : waitForElementPresent
C : waitForPage
D : waitForLoad
D : Glass box
Q.no 18. Before handing over the software to the client, which testing is to be done in-house?
A : Alpha
B : Betta
C : Gamma
D : Theta
A : Quality risk
B : Performance risk
C : Cost risk
D : Support risk
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 101/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : Google Chrome
B : Opera Mini
C : Mozilla Firefox
D : Internet Explorer
Q.no 21. Consider the following partial requirement for a software: “A web browser should be
used as the front end.” It can be considered to be which one of the following types of
requirements?
A : Functional requirement
B : Non-functional requirement
C : Design constraint
D : External interface
Q.no 22. When users are involved in complex tasks, the demand on __________ can be significant
A : short-term memory
B : shortcuts
Q.no 23. Method which selects the option which displays the text matching the parameter passed
to it
A : selectVisibleText()
B : selectByVisibleText()
C : select_VisibleText()
D : select_ByVisibleText()
Q.no 24. In which of the following type of testing, testing is done without planning and
documentation?
A : Unit testing
B : Retesting
C : Ad hoc testing
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 102/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
D : Regression testing
Q.no 25. Which of the following statements explains portability in non-functional requirements?
A : It is a degree to which software running on one platform can easily be converted to run on another
platform
B : It cannot be enhanced by using languages, OS’ and tools that are universally available and
standardized
C : The ability of the system to behave consistently in a user-acceptable manner when operating within
the environment for which the system was intended
B : Test Type
C : SDLC Model
D : Test Level
A : Retesting
B : Sanity testing
D : Confirmation testing
Q.no 28. Systems that involve interaction with a shared database can be considered as.
A : software-based
B : transaction-based
C : server-based
D : client-based
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 103/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 30. Which architectural style goal is to achieve Modifiability with Reuse?
A : Database Testing
B : Security Testing
C : Statement Testing
D : Functional Testing
Q.no 32. Software testing are most effective if applied immediately after
A : Requirement Specification
B : Design
C : Coding
D : Integration
Q.no 33. Webapp configuration object can be managed in much the same way as conventional
software configuration objects except for
A : content items
B : graphic items
C : functional items
D : user items
Q.no 34. What are the criteria to decide the testing efforts?1. Time and budget
2. Size of development team
3. Size of testers
4. Risk associated with project
A : a. 1, 3, 4
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 104/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
B : b. 1, 2, 3
C : c. 1, 4
D : d. 1, 3
B : Component testing
D : Maintenance testing
C : Incorporation of planning function that in effect results in runtime determination of the translation
Q.no 37. The defect cluster change over time. Which of the following testing principle implies
this?
B : Pesticide paradox
D : Defect Clustering
Q.no 39. What describes how a set of interacting components can share data?
A : model-view-controller
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 105/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
B : repository pattern
C : architecture
Q.no 40. Which of the following is not real-time architectural patterns that are commonly used?
A : Asynchronous communication
C : Environmental Control
D : Process Pipeline
Q.no 43. ______provide the mechanisms for assembling SCIs into a version-specific
configuration.
A : Repository
B : versioning
C : modeling
D : assembling
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 106/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : Integration testing
D : Unit testing
Q.no 45. Which of the following is not a state of a defect in defect life cycle:
A : Verified
B : New
C : Critical
D : Deferred
C : cIncorporation of planning function that in effect results in runtime determination of the translation
A : Object modules
B : Hardware modules
C : Functional modules
Q.no 49. Three statements are given below regarding the User Interface Design: 1) Place the user
in Control. 2) Reduce user's memory load. 3) Make the interface consistent. These rules are
called as __________.
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 107/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : Governed Rule
B : Golden Rule
C : User Rule
D : Thumb Rule
Q.no 50. Which of the following is/are commonly used architectural pattern(s)?
A : Model-View-Controller
B : Layered Architecture
C : Client–server
Q.no 51. Which model describes the static structure of the system using object classes and their
relationships?
A : Structural model
B : Dynamic model
C : Subsystem model
D : Sequence model
Q.no 52. which control helps to ensure that parallel changes, performed by two different people,
don’t overwrite one another.
A : version control
B : synchronization control
C : access control
D : configuration control
Q.no 53. What determines how information is stored in the repository, how data can be accessed
by tools and viewed by software engineers, how well data security and integrity can be
maintained, and how easily the existing model can be extended to accommodate new needs.
A : Data model
B : Meta model
C : Configuration model
D : Test model
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 108/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
B : During designing
C : During coding
D : During testing
Q.no 55. The ability to identify which requirement generated any given work product is known
as
A : forward tracing
B : backward tracing
C : Dependency tracking
D : Change management
Q.no 56. Which of the following is not a design principle that allow the user to maintain control?
D : Design for direct interaction with objects that appear on the screen
A : Bottom up
B : Top down
C : Big-bang
D : Functional incrimination
Q.no 58. Three factors that affect the consequences that are likely to happen if a risk does occur:
A : its nature,
its scope, and its intensity.
B : its nature,
its scope, and its timing.
C : its nature,
its scope, and its durability.
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 109/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
D : its nature,
its limit, and its timing.
Q.no 59. A __________ executes the loop task first, then tests a condition and repeats the task
until the condition fails.
A : repeat until
B : condition
C : do while tests
D : if then-else
Q.no 60. Which one of these belongs to integration testing in the OO context?
A : Unit testing
B : Regression testing
C : Sandwich testing
D : Thread-based testing
A : Large
B : Small
C : Difficult to write
D : Difficult to test
Q.no 3. Consider the following requirement for a word processor software: " The software
should provide facility to import an existing image available as a jpeg file into the document
being created.". Which one of the following types of requirements is this?
A : Functional requirement
B : Non-functional requirement
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 110/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
D : Goal of implementation
D : Software design is an activity subjected to constraints specifies nature and composition of software
product which satisfies client needs and desires
A : Black box
B : White box
C : Grey box
D : Glass box
A : Users
B : Developers
C : Customers
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 111/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
D:0
Q.no 11. Which design model is equivallent to set of detailed drawing for each room of a building
A : Architectural Design
C : Data design
D : Interface design
C : Alpha Testing
D : Beta testing
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 112/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : Architectural style is a description of component types and a pattern of run-time control with a set
of constraints on architecture
A : Software Developer
B : End users
C : Testing team
D : Systems engineers
Q.no 15. Which one of the following is not a step of requirement engineering?
A : elicitation
B : design
C : analysis
D : documentation
Q.no 16. Which lines depict that architecture defines constraints on an implementation?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 113/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : Dynamic testing
D : Static testing
Q.no 19. Which component of Selenium can create customized test results ?
A : Web Driver
B : Selenium RC
C : Selenium IDE
D : Selenium Grid
A : Architecture
B : Data
C : Interface
Q.no 21. Select the operating system which is not supported by Selenium IDE
A : Unix
B : Linux
C : Windows
D : Solaries
Q.no 22. Select the tab which gives feedback and other useful information when executing tests
A : Information
B : Feddback
C : Reference
D : Element
Q.no 23. Which command can be used to enter values onto text boxes ?
A : sendsKey()
B : sendKey()
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 114/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : sendKeys
D : sendKeys()
Q.no 24. Software risk always involves two characteristics. What are those characteristics?
A : Spiral model.
B : Waterfall model.
C : Prototyping model
D : Incremental Model.
Q.no 26. What combines procedures and tools to manage different versions of configuration
objects that are created during the software process?
A : Versioning
B : Audit trails
C : Change control
D : SCI
A : Author
B : Moderator
C : Reviewer
D : Scribe
Q.no 28. Test wares are handed over to maintenance team during which phase?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 115/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 30. which of the following is the highest level in the reverse engineering process
A : testing level
B : abstraction level
C : design level
D : maintainence level
Q.no 31. The nature of Software Application can be characterized by their information
A : Determinacy
B : Content
C : Complexity
C : supported everywhere
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 116/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : Incorporation of planning function that in effect results in runtime determination of the translation
Q.no 34. A set of tools that automate the construction of software by ensuring that the proper set
of validated components have been assembled are known as
A : component element
B : process element
C : construction element
D : human elements
C : Coupling among the client will lessen the effect of data center architecture
A : code restructuring
B : back engineering
C : document engineerinhg
D : implementation engineering
Q.no 38. Regression testing is a major part of which of the life cycle?
A : Waterfall model
B : V model
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 117/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : Iterative model
D : Agile model
A : Requirements Gathering
B : Test Planning
C : Test Closure
D : Test Design
Q.no 40. Which of the following testing method is normally used as acceptance test for a software
system?
A : Regression testing
B : Integration testing
C : Unit testing
D : Functional testing
Q.no 41. Which of the following items would not come under Configuration Management?
A : Operating systems
B : Live data
C : Test documentation
Q.no 42. which of the following risk is a potential threat to every software project
A : generic risk
B : project risk
C : product risk
D : business risk
B : a make facility that enables you to collect all relevant configuration objects and construct a specific
version of the software.
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 118/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : If the central database is corrupted, the entire history remains safe and secured
Q.no 44. A set of tools coupled within a file management system that enables access to and
management of each software configuration item is known as
A : component element
B : process element
C : construction element
D : human elements
A:PxC
B:PxM
C:MxC
D:PxS
A : Developer’s end
B : User’s end
Q.no 47. Which of the following is not a Software Configuration Management Activity?
B : Risk management
C : Release management
D : Branch management
A : product risk
B : project risk
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 119/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : business risk
D : management rsik
Q.no 49. In a simple risk table the risks are categorized into
A : PS, BU , CU
B : TU ,DE ,ST
C : BE ,CU ,ST
D : SU , TE ,CU ,PS
A : Big-bang
B : Bottom-up
C : Design based
D : Top-down
Q.no 51. The __________ enables the software engineer to develop models of the information
domain and functional domain at the same time
C : Control specification
D : Activity diagram
Q.no 52. Risk mitigation is a risk ___________activity. Risk monitoring is a ___________ activity
D : Random, Tracking.
Q.no 53. Which of the following type of maintenance takes the maximum chunk of the total
maintenance effort in a typical life cycle of a software product ?
A : Adaptive maintenance
B : Corrective maintenance
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 120/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : Preventive maintenance
D : Perfective maintenance
Q.no 54. Which of the following is not needed to develop a system design from concept to detailed
object-oriented design?
C : Specifying interfaces
Q.no 55. which of the following impact of the risk drivers on risk components is also called as
disastrous impact
A : critical impact
B : catastrophic impact
C : marginal impact
D : Destructive impact
Q.no 56. A _________ is a graphical representation that depicts information flow and the
transforms that are applied as data moves from input to output.
C : Control specification
D : Activity diagram
A : BS7925-2
B : IEEE 829
C : BS7925-1
D : IEEE 610
Q.no 58. The __________ contains a state transition diagram that is a sequential specification of
behavior.
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 121/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : Control specification
D : Activity diagram
Q.no 59. when SCM is a formal activity the software configuration audit is conducted by
A : testing specialists
B : development team
C : senior managers
Q.no 60. A chronological record of relevant details about the execution of tests is called as, a
_______
A : Test suite
B : Test procedure
C : Test data
D : Test log
A : During testing
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 122/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
B : During execution
C : During review
D : Throughout life-cycle
A : 1975
B : 1966
C : 1977
D : 1967
Q.no 5. Unit testing is carried out during which phase of the waterfall model?
A : Implementation phase
B : Testing phase
C : Maintenance phase
D : Design phase
A : Maintainability
B : Portability
C : Robustness
A : After installation
C : After programming
D : After designing
Q.no 8. Which design model is equivallent to the detailed drawing of accesspoints and external
utilities of a building
A : Architectural Design
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 123/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : Data design
D : Interface design
Q.no 9. Select the method which clears all selected entries in Web Driver Selenium
A : dselectAll()
B : deselect_Al()
C : dselect_Al()
D : deselectAll()
A : Risk expense
B : Related expense
C : Risk exposure
D : Risk evaluation
Q.no 11. Which one of the following problems in the gathered requirements is not the focus of the
requirements analysis task?
A : Inconsistency
B : Ambiguity
C : Incompleteness
D : Unstructuredness
A : TestNextGeneration
B : TestNewGenerlization
C : TestNewGeneration
D : TestNextGenerations
Q.no 13. When users are involved in complex tasks, the demand on __________ can be significant
A : short-term memory
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 124/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
B : shortcuts
Q.no 14. Select the tab that shows which command Selenium IDE is currently executing
A : Variable
B : Data
C : Information
D : Info
A : Selenium Generator
B : Selenium IDE
C : Selenium WebDriver
D:0
A : Top down
B : Bottom up
C : Randon
D : iterative
Q.no 19. Which one of the following may be experienced by a software development team when it
adopts a systematic development process model in preference to a build-and-fix style of
development?
C : Decreased maintainability
Q.no 20. The risks that are analyzed and managed should be derived from thorough study of
A : people,
product, process, and project.
B : people,
product, process, and management.
C : people,
product, process, and feedback.
D : people,
product, process, and environment.
Q.no 21. Select the command which is used to pause execution until the page is loaded completely
A : waitForPageToLoad
B : waitForElementPresent
C : waitForPage
D : waitForLoad
A : Design specification
B : Test specification
C : source code
D : configuration control
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 126/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 24. Which is not the other name for structural testing?
A : Behavioral testing
Q.no 25. In order to control cost, defects should ideally be detected in which phase:
A : Coding
B : Design
C : Implementation
D : Requirements Gathering
A : White box
B : Grey box
C : Black box
D : Combination of all
Q.no 27. ______provide the mechanisms for assembling SCIs into a version-specific
configuration.
A : Repository
B : versioning
C : modeling
D : assembling
Q.no 28. Which architectural style goal is to achieve Modifiability with Scalability?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 127/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 29. What allows different projects to use the same source files at the same time?
A : Version Control
B : Access control
C : CM Process
Q.no 30. Which of the following is not a software testing generic characteristics?
C : Testing and debugging are different activities, but debugging must be accommodated in any testing
strategy
C : cIncorporation of planning function that in effect results in runtime determination of the translation
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 128/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 33. The modification of the software to match changes in the ever changing environment,
falls under which category of software maintenance?
A : Adaptive
B : Corrective
C : perfective
D : preventive
Q.no 34. After occurence of the risk ,the developement team members do some rapid actions to
overcome the problem called as
Q.no 35. What are the criteria to decide the testing efforts?1. Time and budget
2. Size of development team
3. Size of testers
4. Risk associated with project
A : a. 1, 3, 4
B : b. 1, 2, 3
C : c. 1, 4
D : d. 1, 3
Q.no 36. Software tester focuses more on complex part of the software. Which of the following
testing principle implies this?
B : Pesticide paradox
D : Defect Clustering
A : Retesting
B : Sanity testing
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 129/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
D : Confirmation testing
Q.no 38. E-Commerce software testing follows different approach than gaming software testing.
Which testing principle implies this?
A : Pareto principle
D : Absence of errors-fallacy
Q.no 40. Systems that involve interaction with a shared database can be considered as.
A : software-based
B : transaction-based
C : server-based
D : client-based
Q.no 41. Software testing are most effective if applied immediately after
A : Requirement Specification
B : Design
C : Coding
D : Integration
Q.no 42. Which of the following is not an issue to consider when reverse engineering?
A : directionality
B : connectivity
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 130/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : completeness
D : abstraction level
C : Incorporation of planning function that in effect results in runtime determination of the translation
A : Database Testing
B : Security Testing
C : Statement Testing
D : Functional Testing
A : Object modules
B : Hardware modules
C : Functional modules
Q.no 46. Which of the following is/are commonly used architectural pattern(s)?
A : Model-View-Controller
B : Layered Architecture
C : Client–server
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 131/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : Integration testing
D : Unit testing
A : Memory leaks
Q.no 49. Which of the following is not real-time architectural patterns that are commonly used?
A : Asynchronous communication
C : Environmental Control
D : Process Pipeline
Q.no 51. Which model describes the static structure of the system using object classes and their
relationships?
A : Structural model
B : Dynamic model
C : Subsystem model
D : Sequence model
Q.no 52. What combines the outward manifestation of the computer-based system , coupled with
all supporting information that describe system syntax and semantics?
A : design model
B : user’s model
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 132/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : mental image
D : system image
B : During designing
C : During coding
D : During testing
Q.no 54. What determines how information is stored in the repository, how data can be accessed
by tools and viewed by software engineers, how well data security and integrity can be
maintained, and how easily the existing model can be extended to accommodate new needs.
A : Data model
B : Meta model
C : Configuration model
D : Test model
Q.no 55. The main focus of ______ is to reduce defects and variations in the processes.
A : QA
B : QC
C : Six Sigma
D : tracking
Q.no 56. The ability to identify which requirement generated any given work product is known
as
A : forward tracing
B : backward tracing
C : Dependency tracking
D : Change management
A : Bottom up
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 133/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
B : Top down
C : Big-bang
D : Functional incrimination
Q.no 58. The order in which test levels are performed is:
Q.no 59. Which of the following is likely to benefit most from the use of test tools providing test
capture and replay facilities?
A : Integration testing
B : Regression testing
C : System testing
Q.no 1. Test cases are designed during which of the following stages?
A : Test recording
B : Test configuration
C : Test planning
D : Test specification
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 134/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 3. Which one of the following phases accounts for the maximum effort during development
of a typical software?
A : Coding
B : Testing
C : Designing
D : Specification
Q.no 4. When a company plans to develop a generic product, who among the following is usually
the source of the requirements?
B : Project manager
C : Marketing personnel
D : Implements all requirements in the analysis model and provide a complete picture of the software
Q.no 6. Select the tab which gives feedback and other useful information when executing tests
A : Information
B : Feddback
C : Reference
D : Element
A : Developer
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 135/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
B : Designer
C : Tester
D : QA Team
A : Software Developer
B : End users
C : Testing team
D : Systems engineers
A : always possible
C : practically possible
Q.no 10. Java packages and Fortran subroutine are examples of__________
A : Functions
B : Modules
C : Classes
D : Sub procedures
Q.no 11. Consider the following partial requirement for a software: “A web browser should be
used as the front end.” It can be considered to be which one of the following types of
requirements?
A : Functional requirement
B : Non-functional requirement
C : Design constraint
D : External interface
Q.no 12. Select the name which is not the type of locators
A : ID
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 136/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
B : Name
C : Password
D : Link Text
Q.no 13. Which of the following is not a design principle that allows the user to maintain control?
D : Design for direct interaction with objects that appear on the screen
B : Path testing
C : Statement testing
A : Coverage analysis
B : Code inspection
C : Usability assessment
D : Installation test
A : always possible
B : practically possible
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 137/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 19. Which of the following is the best type of module coupling?
A : Control Coupling
B : Stamp Coupling
C : Data Coupling
D : Content Coupling
Q.no 20. Select the command in SeleniumIDE used to open a web page using theURL
A : OpenRecord
B : Open
C : OpenText
D : OpenTable
Q.no 21. A ________ view shows the system hardware and how software components are
distributed across the processors in the system.
A : physical
B : logical
C : process
Q.no 22. Which one of the following is not a standard software development process model?
A : Waterfall Model
B : Recursive Model
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 138/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : RAD Model
D : V Model
Q.no 23. The implementation phase of the waterfall model is a synonym for which one of the
following phases?
C : Maintenance phase
D : Design phase
A : condition-transaction-consequence
B : condition-transfer-consequence
C : condition-transition-consequence
D : condition-transmission-consequence
Q.no 25. Which one of the following is a requirement that fits in a developer’s module ?
A : Availability
B : Testability
C : Usability
D : Flexibility
A : code restructuring
B : back engineering
C : document engineerinhg
D : implementation engineering
Q.no 27. What combines procedures and tools to manage different versions of configuration
objects that are created during the software process?
A : Versioning
B : Audit trails
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 139/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : Change control
D : SCI
Q.no 28. Which architectural style goal is to achieve Modifiability with Reuse?
Q.no 29. Which of the following testing method is normally used as acceptance test for a software
system?
A : Regression testing
B : Integration testing
C : Unit testing
D : Functional testing
Q.no 30. What describes how a set of interacting components can share data?
A : model-view-controller
B : repository pattern
C : architecture
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 140/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : Requirements Gathering
B : Test Planning
C : Test Closure
D : Test Design
Q.no 34. Which of the following is not a state of a defect in defect life cycle:
A : Verified
B : New
C : Critical
D : Deferred
A:PxC
B:PxM
C:MxC
D:PxS
Q.no 37. Which of the following pattern is the basis of interaction management in many web-
based systems?
A : model-view-controller
B : repository pattern
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 141/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : architecture
Q.no 38. which of the following is the highest level in the reverse engineering process
A : testing level
B : abstraction level
C : design level
D : maintainence level
Q.no 39. What effect does achievement of quality attribute will have?
D : The achievement of quality attribute will have a positive as well as negative effect
A : Developer’s end
B : User’s end
Q.no 42. Webapp configuration object can be managed in much the same way as conventional
software configuration objects except for
A : content items
B : graphic items
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 142/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : functional items
D : user items
B : Test Type
C : SDLC Model
D : Test Level
A : Requirement Design
B : Requirement Elicitation
C : Requirement Analysis
D : Requirement Documentation
A : Author
B : Moderator
C : Reviewer
D : Scribe
Q.no 47. The defect cluster change over time. Which of the following testing principle implies
this?
B : Pesticide paradox
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 143/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
D : Defect Clustering
Q.no 48. Three statements are given below regarding the User Interface Design: 1) Place the user
in Control. 2) Reduce user's memory load. 3) Make the interface consistent. These rules are
called as __________.
A : Governed Rule
B : Golden Rule
C : User Rule
D : Thumb Rule
Q.no 49. Which of the following items would not come under Configuration Management?
A : Operating systems
B : Live data
C : Test documentation
A : Big-bang
B : Bottom-up
C : Design based
D : Top-down
Q.no 51. The __________ enables the software engineer to develop models of the information
domain and functional domain at the same time
C : Control specification
D : Activity diagram
Q.no 52. when SCM is a formal activity the software configuration audit is conducted by
A : testing specialists
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 144/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
B : development team
C : senior managers
A : Structural model
B : Dynamic model
C : Subsystem model
D : Sequence model
Q.no 54. What mechanism is used to apprise others of changes that are made?
A : Configuration management
B : Requirementss tracing
C : Reporting
D : Change control
Q.no 55. Which of the following is not a design principle that allow the user to maintain control?
D : Design for direct interaction with objects that appear on the screen
Q.no 56. Which one of these belongs to integration testing in the OO context?
A : Unit testing
B : Regression testing
C : Sandwich testing
D : Thread-based testing
Q.no 57. which control helps to ensure that parallel changes, performed by two different people,
don’t overwrite one another.
A : version control
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 145/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
B : synchronization control
C : access control
D : configuration control
Q.no 58. A chronological record of relevant details about the execution of tests is called as, a
_______
A : Test suite
B : Test procedure
C : Test data
D : Test log
A : BS7925-2
B : IEEE 829
C : BS7925-1
D : IEEE 610
Q.no 60. Which of the following is not needed to develop a system design from concept to detailed
object-oriented design?
C : Specifying interfaces
Q.no 1. Consider a system where, a heat sensor detects an intrusion and alerts the security
company.” What kind of a requirement the system is providing?
A : Functional
B : Non-Functional
C : Known Requirement
Q.no 2. In case of Selenium IDE, the source view shows your script in
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 146/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : DHTML format
B : XML format
C : j2EE format
D : HTML format
C : Central model represents class diagrams that show the classes comprising a program and their
relationships to one another
Q.no 4. Select the command which retrieves the alert message and stores it in a variable that you
will specify
A : storeAlert
B : storedAlert
C : store_Alert
D : storesAlert
Q.no 5. In software development life cycle , who is the best person to catch a defect?
A : Software Tester
B : Customers
C : Designer
D : Business Analyst
B : Process-oriented Approach – Focus on how NFRs can be used in the design process
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 147/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : elicitation
B : design
C : analysis
D : documentation
A : Mouse
B : keyboard
C : cpu
D : monitor
C : Dynamic testing
D : Static testing
Q.no 12. What incorporates data, architectural, interface, and procedural representations of the
software?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 148/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : design model
B : user’s model
C : mental image
D : system image
Q.no 13. Members of a Scrum team are not expected to answer which one of the following
questions during a daily Scrum meeting?
C : During a Sprint, customer feedback is continually obtained and the Sprint backlog is accordingly
modified
Q.no 15. Select the component which is not a type of assertion in Selenium IDE
A : Assert
B : Verify
C : WaitFor
D : Wait
A : Selenium Generator
B : Selenium IDE
C : Selenium WebDriver
D:0
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 149/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : Unit testing
B : Regression testing
C : Adhoc testing
A : Quality risk
B : Performance risk
C : Cost risk
D : Support risk
Q.no 20. The importance of software design can be summarized in a single word which is:
A : Efficiency
B : Accuracy
C : Quality
D : Complexity
Q.no 23. Select the command which is used to compare the actual page title with an expected
value
A : verifyTitle
B : verifiedTitle
C : verifyTitles
D : verifiedTitles
Q.no 24. Select the method which performs a context-click at the curent mouse location
A : click_Context()
B : context.Click()
C : contextClick()
D : context_Click()
Q.no 25. Method which selects the option which displays the text matching the parameter passed
to it
A : selectVisibleText()
B : selectByVisibleText()
C : select_VisibleText()
D : select_ByVisibleText()
Q.no 26. After occurence of the risk ,the developement team members do some rapid actions to
overcome the problem called as
Q.no 27. A set of tools coupled within a file management system that enables access to and
management of each software configuration item is known as
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 151/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : component element
B : process element
C : construction element
D : human elements
Q.no 28. The modification of the software to match changes in the ever changing environment,
falls under which category of software maintenance?
A : Adaptive
B : Corrective
C : perfective
D : preventive
Q.no 29. Which of the following is not real-time architectural patterns that are commonly used?
A : Asynchronous communication
C : Environmental Control
D : Process Pipeline
Q.no 30. Which of the following is not a Software Configuration Management Activity?
B : Risk management
C : Release management
D : Branch management
A : Object modules
B : Hardware modules
C : Functional modules
Q.no 32. Which of the following is not an issue to consider when reverse engineering?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 152/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : directionality
B : connectivity
C : completeness
D : abstraction level
A : Retesting
B : Sanity testing
D : Confirmation testing
A : product risk
B : project risk
C : business risk
D : management rsik
C : cIncorporation of planning function that in effect results in runtime determination of the translation
Q.no 37. Which of the following is/are commonly used architectural pattern(s)?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 153/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : Model-View-Controller
B : Layered Architecture
C : Client–server
B : a make facility that enables you to collect all relevant configuration objects and construct a specific
version of the software.
C : If the central database is corrupted, the entire history remains safe and secured
Q.no 39. What are the criteria to decide the testing efforts?1. Time and budget
2. Size of development team
3. Size of testers
4. Risk associated with project
A : a. 1, 3, 4
B : b. 1, 2, 3
C : c. 1, 4
D : d. 1, 3
Q.no 40. E-Commerce software testing follows different approach than gaming software testing.
Which testing principle implies this?
A : Pareto principle
D : Absence of errors-fallacy
C : Incorporation of planning function that in effect results in runtime determination of the translation
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 154/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : Integration testing
D : Unit testing
Q.no 43. Which architectural style goal is to achieve Modifiability with Scalability?
Q.no 44. In a simple risk table the risks are categorized into
A : PS, BU , CU
B : TU ,DE ,ST
C : BE ,CU ,ST
D : SU , TE ,CU ,PS
C : Incorporation of planning function that in effect results in runtime determination of the translation
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 155/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 47. Systems that involve interaction with a shared database can be considered as.
A : software-based
B : transaction-based
C : server-based
D : client-based
B : Component testing
D : Maintenance testing
Q.no 49. Which granularity level of testing checks the behavior of module cooperation?
A : Unit Testing
B : Integration Testing
C : Acceptance Testing
D : Regression Testing
Q.no 50. which of the following risk is a potential threat to every software project
A : generic risk
B : project risk
C : product risk
D : business risk
Q.no 51. Which of the following is likely to benefit most from the use of test tools providing test
capture and replay facilities?
A : Integration testing
B : Regression testing
C : System testing
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 156/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 52. Which model describes the static structure of the system using object classes and their
relationships?
A : Structural model
B : Dynamic model
C : Subsystem model
D : Sequence model
Q.no 53. What combines the outward manifestation of the computer-based system , coupled with
all supporting information that describe system syntax and semantics?
A : design model
B : user’s model
C : mental image
D : system image
Q.no 54. The main focus of ______ is to reduce defects and variations in the processes.
A : QA
B : QC
C : Six Sigma
D : tracking
Q.no 55. Risk mitigation is a risk ___________activity. Risk monitoring is a ___________ activity
D : Random, Tracking.
Q.no 56. Which of the following type of maintenance takes the maximum chunk of the total
maintenance effort in a typical life cycle of a software product ?
A : Adaptive maintenance
B : Corrective maintenance
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 157/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : Preventive maintenance
D : Perfective maintenance
Q.no 57. A __________ executes the loop task first, then tests a condition and repeats the task
until the condition fails.
A : repeat until
B : condition
C : do while tests
D : if then-else
Q.no 58. A _________ is a graphical representation that depicts information flow and the
transforms that are applied as data moves from input to output.
C : Control specification
D : Activity diagram
Q.no 59. which of the following impact of the risk drivers on risk components is also called as
disastrous impact
A : critical impact
B : catastrophic impact
C : marginal impact
D : Destructive impact
Q.no 1. When an expected result is not specified in test case template then ___________.
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 158/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : object-oriented systems
B : architectural design
C : SRS
A : During testing
B : During execution
C : During review
D : Throughout life-cycle
Q.no 4. Select the command in SeleniumIDE used to open a web page using theURL
A : OpenRecord
B : Open
C : OpenText
D : OpenTable
Q.no 5. The risks that are analyzed and managed should be derived from thorough study of
A : people,
product, process, and project.
B : people,
product, process, and management.
C : people,
product, process, and feedback.
D : people,
product, process, and environment.
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 159/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : It is a degree to which software running on one platform can easily be converted to run on another
platform
B : It cannot be enhanced by using languages, OS’ and tools that are universally available and
standardized
C : The ability of the system to behave consistently in a user-acceptable manner when operating within
the environment for which the system was intended
A : Test Plan
D : Test Log
Q.no 9. The implementation phase of the waterfall model is a synonym for which one of the
following phases?
C : Maintenance phase
D : Design phase
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 160/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
D : Software design is an activity subjected to constraints specifies nature and composition of software
product which satisfies client needs and desires
Q.no 12. Unit testing is carried out during which phase of the waterfall model?
A : Implementation phase
B : Testing phase
C : Maintenance phase
D : Design phase
Q.no 13. What is the main technique for achieving portable software?
A : The main technique for achieving portable software is to isolate system dependency
B : The main technique for achieving portable software is to increase the overall performance
C : The main technique for achieving portable software is to have independent platform dependency
D : The main technique for achieving portable software is to have independent platform dependency
and to increase accuracy
Q.no 14. Which component of Selenium can create customized test results ?
A : Web Driver
B : Selenium RC
C : Selenium IDE
D : Selenium Grid
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 161/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : Google Chrome
B : Opera Mini
C : Mozilla Firefox
D : Internet Explorer
A : Users
B : Developers
C : Customers
Q.no 19. Which one of the following feedback paths is not present in an iterative waterfall
model?
Q.no 20. In which of the following type of testing, testing is done without planning and
documentation?
A : Unit testing
B : Retesting
C : Ad hoc testing
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 162/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
D : Regression testing
Q.no 21. What can be used to test Flex/Flash aplication using Selenium
A : FlexUISelenium
B : FlexUI
C : UIFlexSelenium
D : SeleniumFlex
A : Risk expense
B : Related expense
C : Risk exposure
D : Risk evaluation
Q.no 23. Which of the following is not a Software Development Life Cycle Phase?
A : Requirements Gathering
B : Test Closure
C : Coding
D : Testing
A : Top down
B : Bottom up
C : Randon
D : iterative
A : Author
B : Moderator
C : Reviewer
D : Scribe
Q.no 27. What describes how a set of interacting components can share data?
A : model-view-controller
B : repository pattern
C : architecture
Q.no 28. The defect cluster change over time. Which of the following testing principle implies
this?
B : Pesticide paradox
D : Defect Clustering
Q.no 29. Software testing are most effective if applied immediately after
A : Requirement Specification
B : Design
C : Coding
D : Integration
Q.no 30. which of the following is the highest level in the reverse engineering process
A : testing level
B : abstraction level
C : design level
D : maintainence level
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 164/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 31. The nature of Software Application can be characterized by their information
A : Determinacy
B : Content
C : Complexity
Q.no 33. Software tester focuses more on complex part of the software. Which of the following
testing principle implies this?
B : Pesticide paradox
D : Defect Clustering
A : Developer’s end
B : User’s end
Q.no 35. Which of the following testing method is normally used as acceptance test for a software
system?
A : Regression testing
B : Integration testing
C : Unit testing
D : Functional testing
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 165/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 36. ______provide the mechanisms for assembling SCIs into a version-specific
configuration.
A : Repository
B : versioning
C : modeling
D : assembling
Q.no 37. Which of the following items would not come under Configuration Management?
A : Operating systems
B : Live data
C : Test documentation
Q.no 38. A set of tools that automate the construction of software by ensuring that the proper set
of validated components have been assembled are known as
A : component element
B : process element
C : construction element
D : human elements
A : Big-bang
B : Bottom-up
C : Design based
D : Top-down
Q.no 40. What allows different projects to use the same source files at the same time?
A : Version Control
B : Access control
C : CM Process
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 166/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : Coupling among the client will lessen the effect of data center architecture
C : supported everywhere
Q.no 44. Test wares are handed over to maintenance team during which phase?
A : Memory leaks
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 167/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 46. Webapp configuration object can be managed in much the same way as conventional
software configuration objects except for
A : content items
B : graphic items
C : functional items
D : user items
Q.no 47. What combines procedures and tools to manage different versions of configuration
objects that are created during the software process?
A : Versioning
B : Audit trails
C : Change control
D : SCI
A : Requirements Gathering
B : Test Planning
C : Test Closure
D : Test Design
A : Database Testing
B : Security Testing
C : Statement Testing
D : Functional Testing
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 168/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 51. Three factors that affect the consequences that are likely to happen if a risk does occur:
A : its nature,
its scope, and its intensity.
B : its nature,
its scope, and its timing.
C : its nature,
its scope, and its durability.
D : its nature,
its limit, and its timing.
Q.no 52. Which one of these belongs to integration testing in the OO context?
A : Unit testing
B : Regression testing
C : Sandwich testing
D : Thread-based testing
Q.no 53. which control helps to ensure that parallel changes, performed by two different people,
don’t overwrite one another.
A : version control
B : synchronization control
C : access control
D : configuration control
Q.no 54. when SCM is a formal activity the software configuration audit is conducted by
A : testing specialists
B : development team
C : senior managers
Q.no 55. The __________ contains a state transition diagram that is a sequential specification of
behavior.
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 169/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : Control specification
D : Activity diagram
Q.no 56. Which of the following is not a design principle that allow the user to maintain control?
D : Design for direct interaction with objects that appear on the screen
Q.no 57. The order in which test levels are performed is:
A : Bottom up
B : Top down
C : Big-bang
D : Functional incrimination
B : During designing
C : During coding
D : During testing
A : BS7925-2
B : IEEE 829
C : BS7925-1
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 170/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
D : IEEE 610
Q.no 2. Select the method which selects the option at the at the given index
A : selectByIndex()
B : selectIndex()
C : selectedByIndex()
D : selectByIndexes()
A : Functions
B : Modules
C : Classes
D : Sub procedures
Q.no 4. Which one of the following activities spans all stages of a software development life cycle
A : Coding
B : Testing
C : Project management
D : Design
A : Design specification
B : Test specification
C : source code
D : configuration control
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 171/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : Alpha Testing
D : Beta testing
Q.no 7. Which one of the following most accurately reflects agile software development?
A : Incremental development
B : Iterative development
C : Linear development
D : Implements all requirements in the analysis model and provide a complete picture of the software
A : Test Specification
B : Test Planning
C : Test Requirement
D : Test Configuration
Q.no 10. Consider the following partial description of the IIT security software. “A camera at the
main gate should detect an incoming vehicle, and the gate should be opened for registered
vehicles.” Which one of the following types of requirements is this?
A : Functional requirement
B : Non-Functional requirement
C : Design requirement
D : Design constraint
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 172/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 11. Select the method which clears all selected entries in Web Driver Selenium
A : dselectAll()
B : deselect_Al()
C : dselect_Al()
D : deselectAll()
Q.no 14. When users are involved in complex tasks, the demand on __________ can be significant
A : short-term memory
B : shortcuts
A : Data re-engineering
B : Refactoring
C : Restructuring
D : Repairing
Q.no 17. Which one of the following problems in the gathered requirements is not the focus of the
requirements analysis task?
A : Inconsistency
B : Ambiguity
C : Incompleteness
D : Unstructuredness
Q.no 18. A collection of actions and tasks that define an effective approach to change
management is known as
A : component element
B : process element
C : construction element
D : human elements
D : reference model mapped onto software components & data flow with comments
A : Spiral model.
B : Waterfall model.
C : Prototyping model
D : Incremental Model.
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 174/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 22. Software risk always involves two characteristics. What are those characteristics?
D : Glass box
A : After installation
C : After programming
D : After designing
B : Path testing
C : Statement testing
B : Test Type
C : SDLC Model
D : Test Level
Q.no 27. Which of the following is not a Software Configuration Management Activity?
B : Risk management
C : Release management
D : Branch management
Q.no 28. Which architectural style goal is to achieve Modifiability with Scalability?
B : a make facility that enables you to collect all relevant configuration objects and construct a specific
version of the software.
C : If the central database is corrupted, the entire history remains safe and secured
Q.no 31. Three statements are given below regarding the User Interface Design: 1) Place the user
in Control. 2) Reduce user's memory load. 3) Make the interface consistent. These rules are
called as __________.
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 176/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : Governed Rule
B : Golden Rule
C : User Rule
D : Thumb Rule
Q.no 32. The modification of the software to match changes in the ever changing environment,
falls under which category of software maintenance?
A : Adaptive
B : Corrective
C : perfective
D : preventive
C : Integration testing
D : Unit testing
Q.no 34. What effect does achievement of quality attribute will have?
D : The achievement of quality attribute will have a positive as well as negative effect
C : cIncorporation of planning function that in effect results in runtime determination of the translation
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 177/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A:PxC
B:PxM
C:MxC
D:PxS
C : Incorporation of planning function that in effect results in runtime determination of the translation
A : White box
B : Grey box
C : Black box
D : Combination of all
Q.no 40. A set of tools coupled within a file management system that enables access to and
management of each software configuration item is known as
A : component element
B : process element
C : construction element
D : human elements
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 178/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 41. Which of the following pattern is the basis of interaction management in many web-
based systems?
A : model-view-controller
B : repository pattern
C : architecture
Q.no 42. In a simple risk table the risks are categorized into
A : PS, BU , CU
B : TU ,DE ,ST
C : BE ,CU ,ST
D : SU , TE ,CU ,PS
Q.no 43. Which of the following is not real-time architectural patterns that are commonly used?
A : Asynchronous communication
C : Environmental Control
D : Process Pipeline
A : Requirement Design
B : Requirement Elicitation
C : Requirement Analysis
D : Requirement Documentation
A : Retesting
B : Sanity testing
D : Confirmation testing
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 179/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 47. Regression testing is a major part of which of the life cycle?
A : Waterfall model
B : V model
C : Iterative model
D : Agile model
Q.no 49. Systems that involve interaction with a shared database can be considered as.
A : software-based
B : transaction-based
C : server-based
D : client-based
B : Component testing
D : Maintenance testing
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 180/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 51. A chronological record of relevant details about the execution of tests is called as, a
_______
A : Test suite
B : Test procedure
C : Test data
D : Test log
Q.no 52. The ability to identify which requirement generated any given work product is known
as
A : forward tracing
B : backward tracing
C : Dependency tracking
D : Change management
Q.no 53. What mechanism is used to apprise others of changes that are made?
A : Configuration management
B : Requirementss tracing
C : Reporting
D : Change control
A : Structural model
B : Dynamic model
C : Subsystem model
D : Sequence model
Q.no 55. Which of the following is likely to benefit most from the use of test tools providing test
capture and replay facilities?
A : Integration testing
B : Regression testing
C : System testing
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 181/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 56. Which model describes the static structure of the system using object classes and their
relationships?
A : Structural model
B : Dynamic model
C : Subsystem model
D : Sequence model
Q.no 57. A __________ executes the loop task first, then tests a condition and repeats the task
until the condition fails.
A : repeat until
B : condition
C : do while tests
D : if then-else
Q.no 58. What determines how information is stored in the repository, how data can be accessed
by tools and viewed by software engineers, how well data security and integrity can be
maintained, and how easily the existing model can be extended to accommodate new needs.
A : Data model
B : Meta model
C : Configuration model
D : Test model
Q.no 59. Which of the following is not needed to develop a system design from concept to detailed
object-oriented design?
C : Specifying interfaces
Q.no 60. Risk mitigation is a risk ___________activity. Risk monitoring is a ___________ activity
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 182/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
D : Random, Tracking.
A : Customer
B : Investor
C : Developer
D : Project team
A : Selenium Generator
B : Selenium IDE
C : Selenium WebDriver
D:0
B : Interface design
D : Interface validation
Q.no 5. Which of the following is not a design principle that allows the user to maintain control?
D : Design for direct interaction with objects that appear on the screen
Q.no 6. Select the tab which gives feedback and other useful information when executing tests
A : Information
B : Feddback
C : Reference
D : Element
C : Dynamic testing
D : Static testing
A : During testing
B : During execution
C : During review
D : Throughout life-cycle
A : TestNextGeneration
B : TestNewGenerlization
C : TestNewGeneration
D : TestNextGenerations
Q.no 10. Which of the following is not part of the software reengineering process model?
A : reverse engineering
B : forward engineering
C : inventory analysis
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 184/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
D : prototyping
A : Product
B : Process
C : Design
D : Testing
D:0
Q.no 13. Testing of software with actual data and in actual environment is known as?
A : Regression testing
B : Beta testing
C : Alpha testing
Q.no 14. Select the command which is used to print a string value of a variable in Selenium IDE
Q.no 15. Select the language which is not supported by the Selenium RC
A : ASP
B : Java
C : C#
D : PHP
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 185/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 16. Method which selects the option which displays the text matching the parameter passed
to it
A : selectVisibleText()
B : selectByVisibleText()
C : select_VisibleText()
D : select_ByVisibleText()
A : waitForTitle
B : waitForTextPresent
C : waitForActive
D : waitForAlert
A : Developer
B : Designer
C : Tester
D : QA Team
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 186/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 21. Which lines depict that architecture defines constraints on an implementation?
A : condition-transaction-consequence
B : condition-transfer-consequence
C : condition-transition-consequence
D : condition-transmission-consequence
Q.no 23. A software requirements specification (SRS) document should avoid discussing which
one of the following?
A : Functional requirements
B : Non-functional requirements
C : Design specification
Q.no 24. Which of the following model put much more emphasis on testing?
A : waterfall model
B : agile model
C : spiral model
D : v-v model
Q.no 25. A ________ view shows the system hardware and how software components are
distributed across the processors in the system.
A : physical
B : logical
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 187/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : process
A : Memory leaks
A : Object modules
B : Hardware modules
C : Functional modules
Q.no 28. Which of the following is/are commonly used architectural pattern(s)?
A : Model-View-Controller
B : Layered Architecture
C : Client–server
Q.no 30. Which of the following testing method is normally used as acceptance test for a software
system?
A : Regression testing
B : Integration testing
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 188/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : Unit testing
D : Functional testing
Q.no 31. What describes how a set of interacting components can share data?
A : model-view-controller
B : repository pattern
C : architecture
Q.no 32. Which architectural style goal is to achieve Modifiability with Reuse?
A : product risk
B : project risk
C : business risk
D : management rsik
Q.no 35. Test wares are handed over to maintenance team during which phase?
Q.no 36. What combines procedures and tools to manage different versions of configuration
objects that are created during the software process?
A : Versioning
B : Audit trails
C : Change control
D : SCI
Q.no 38. The defect cluster change over time. Which of the following testing principle implies
this?
B : Pesticide paradox
D : Defect Clustering
A : Requirements Gathering
B : Test Planning
C : Test Closure
D : Test Design
Q.no 40. ______provide the mechanisms for assembling SCIs into a version-specific
configuration.
A : Repository
B : versioning
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 190/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : modeling
D : assembling
C : Coupling among the client will lessen the effect of data center architecture
Q.no 42. which of the following risk is a potential threat to every software project
A : generic risk
B : project risk
C : product risk
D : business risk
Q.no 43. Webapp configuration object can be managed in much the same way as conventional
software configuration objects except for
A : content items
B : graphic items
C : functional items
D : user items
Q.no 44. Which of the following is not an issue to consider when reverse engineering?
A : directionality
B : connectivity
C : completeness
D : abstraction level
Q.no 45. Which of the following is not a software testing generic characteristics?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 191/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : Testing and debugging are different activities, but debugging must be accommodated in any testing
strategy
Q.no 46. E-Commerce software testing follows different approach than gaming software testing.
Which testing principle implies this?
A : Pareto principle
D : Absence of errors-fallacy
Q.no 47. The nature of Software Application can be characterized by their information
A : Determinacy
B : Content
C : Complexity
A : Developer’s end
B : User’s end
A : Big-bang
B : Bottom-up
C : Design based
D : Top-down
Q.no 50. After occurence of the risk ,the developement team members do some rapid actions to
overcome the problem called as
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 192/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 51. A _________ is a graphical representation that depicts information flow and the
transforms that are applied as data moves from input to output.
C : Control specification
D : Activity diagram
Q.no 52. which of the following impact of the risk drivers on risk components is also called as
disastrous impact
A : critical impact
B : catastrophic impact
C : marginal impact
D : Destructive impact
Q.no 53. Which one of these belongs to integration testing in the OO context?
A : Unit testing
B : Regression testing
C : Sandwich testing
D : Thread-based testing
Q.no 54. when SCM is a formal activity the software configuration audit is conducted by
A : testing specialists
B : development team
C : senior managers
Q.no 55. Three factors that affect the consequences that are likely to happen if a risk does occur:
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 193/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : its nature,
its scope, and its intensity.
B : its nature,
its scope, and its timing.
C : its nature,
its scope, and its durability.
D : its nature,
its limit, and its timing.
Q.no 56. The main focus of ______ is to reduce defects and variations in the processes.
A : QA
B : QC
C : Six Sigma
D : tracking
Q.no 57. which control helps to ensure that parallel changes, performed by two different people,
don’t overwrite one another.
A : version control
B : synchronization control
C : access control
D : configuration control
Q.no 58. What combines the outward manifestation of the computer-based system , coupled with
all supporting information that describe system syntax and semantics?
A : design model
B : user’s model
C : mental image
D : system image
Q.no 59. Which of the following type of maintenance takes the maximum chunk of the total
maintenance effort in a typical life cycle of a software product ?
A : Adaptive maintenance
B : Corrective maintenance
C : Preventive maintenance
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 194/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
D : Perfective maintenance
Q.no 1. Software risk always involves two characteristics. What are those characteristics?
A : Coverage analysis
B : Code inspection
C : Usability assessment
D : Installation test
Q.no 3. Which command can be used to enter values onto text boxes ?
A : sendsKey()
B : sendKey()
C : sendKeys
D : sendKeys()
A : Ad-hoc testing
B : Monkey testing
C : Fuzz testing
D : End-to-End testing
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 195/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 5. Select the command which is used to pause execution until the page is loaded completely
A : waitForPageToLoad
B : waitForElementPresent
C : waitForPage
D : waitForLoad
Q.no 6. Members of a Scrum team are not expected to answer which one of the following
questions during a daily Scrum meeting?
C : During a Sprint, customer feedback is continually obtained and the Sprint backlog is accordingly
modified
Q.no 7. The operation phase of the waterfall model is a synonym for which one of the following
phases?
C : Maintenance phase
D : Design phase
B : Path testing
C : Statement testing
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 196/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
D:0
Q.no 11. Which one of the following views is implicit in an SRS document?
A : Black box
B : White box
C : Grey box
D : Glass box
A : Software Developer
B : End users
C : Testing team
D : Systems engineers
Q.no 15. Select the method which selects the option at the at the given index
A : selectByIndex()
B : selectIndex()
C : selectedByIndex()
D : selectByIndexes()
Q.no 16. Unit testing is carried out during which phase of the waterfall model?
A : Implementation phase
B : Testing phase
C : Maintenance phase
D : Design phase
Q.no 17. Which one of the following activities spans all stages of a software development life cycle
A : Coding
B : Testing
C : Project management
D : Design
Q.no 19. In which of the following type of testing, testing is done without planning and
documentation?
A : Unit testing
B : Retesting
C : Ad hoc testing
D : Regression testing
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 198/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 20. Choose the incorrect statement with respect to Non-Functional Requirement(NFR)
B : Process-oriented Approach – Focus on how NFRs can be used in the design process
Q.no 23. The importance of software design can be summarized in a single word which is:
A : Efficiency
B : Accuracy
C : Quality
D : Complexity
Q.no 24. Select the language which is supported by the Selenium Web driver
A : Perl
B : Sql
C : ASP
D : Cobol
Q.no 25. Select the operating system which is not supported by Selenium IDE
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 199/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : Unix
B : Linux
C : Windows
D : Solaries
A : Author
B : Moderator
C : Reviewer
D : Scribe
Q.no 27. Three statements are given below regarding the User Interface Design: 1) Place the user
in Control. 2) Reduce user's memory load. 3) Make the interface consistent. These rules are
called as __________.
A : Governed Rule
B : Golden Rule
C : User Rule
D : Thumb Rule
A : Database Testing
B : Security Testing
C : Statement Testing
D : Functional Testing
A : Retesting
B : Sanity testing
D : Confirmation testing
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 200/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : Requirement Design
B : Requirement Elicitation
C : Requirement Analysis
D : Requirement Documentation
C : Integration testing
D : Unit testing
B : Component testing
D : Maintenance testing
Q.no 34. In a simple risk table the risks are categorized into
A : PS, BU , CU
B : TU ,DE ,ST
C : BE ,CU ,ST
D : SU , TE ,CU ,PS
Q.no 35. Software testing are most effective if applied immediately after
A : Requirement Specification
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 201/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
B : Design
C : Coding
D : Integration
C : Incorporation of planning function that in effect results in runtime determination of the translation
Q.no 37. What are the criteria to decide the testing efforts?1. Time and budget
2. Size of development team
3. Size of testers
4. Risk associated with project
A : a. 1, 3, 4
B : b. 1, 2, 3
C : c. 1, 4
D : d. 1, 3
Q.no 38. Which of the following risk is the failure of a purchased component to perform as
expected
A : Product risk
B : Business risk
C : Programming risk
D : Project risk
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 202/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 40. The modification of the software to match changes in the ever changing environment,
falls under which category of software maintenance?
A : Adaptive
B : Corrective
C : perfective
D : preventive
Q.no 41. Regression testing is a major part of which of the life cycle?
A : Waterfall model
B : V model
C : Iterative model
D : Agile model
C : supported everywhere
Q.no 44. Software tester focuses more on complex part of the software. Which of the following
testing principle implies this?
B : Pesticide paradox
D : Defect Clustering
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 203/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 45. Systems that involve interaction with a shared database can be considered as.
A : software-based
B : transaction-based
C : server-based
D : client-based
Q.no 46. What allows different projects to use the same source files at the same time?
A : Version Control
B : Access control
C : CM Process
C : Incorporation of planning function that in effect results in runtime determination of the translation
C : cIncorporation of planning function that in effect results in runtime determination of the translation
Q.no 49. Which of the following is not a state of a defect in defect life cycle:
A : Verified
B : New
C : Critical
D : Deferred
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 204/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : code restructuring
B : back engineering
C : document engineerinhg
D : implementation engineering
Q.no 51. Risk mitigation is a risk ___________activity. Risk monitoring is a ___________ activity
D : Random, Tracking.
Q.no 52. Which of the following is not a design principle that allow the user to maintain control?
D : Design for direct interaction with objects that appear on the screen
Q.no 53. The __________ enables the software engineer to develop models of the information
domain and functional domain at the same time
C : Control specification
D : Activity diagram
Q.no 54. Which model describes the static structure of the system using object classes and their
relationships?
A : Structural model
B : Dynamic model
C : Subsystem model
D : Sequence model
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 205/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 55. The order in which test levels are performed is:
Q.no 56. A __________ executes the loop task first, then tests a condition and repeats the task
until the condition fails.
A : repeat until
B : condition
C : do while tests
D : if then-else
A : Bottom up
B : Top down
C : Big-bang
D : Functional incrimination
Q.no 58. Which of the following is not needed to develop a system design from concept to detailed
object-oriented design?
C : Specifying interfaces
A : BS7925-2
B : IEEE 829
C : BS7925-1
D : IEEE 610
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 206/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 60. The ability to identify which requirement generated any given work product is known
as
A : forward tracing
B : backward tracing
C : Dependency tracking
D : Change management
Q.no 1. Which one of the following is not a standard software development process model?
A : Waterfall Model
B : Recursive Model
C : RAD Model
D : V Model
B : Interface design
D : Interface validation
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 207/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 6. Which one of the following is a requirement that fits in a developer’s module ?
A : Availability
B : Testability
C : Usability
D : Flexibility
Q.no 7. Which one of the following may be experienced by a software development team when it
adopts a systematic development process model in preference to a build-and-fix style of
development?
C : Decreased maintainability
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 208/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
D : Glass box
Q.no 10. Select the command which is used to check the presence of a certain element
A : verifyTable
B : verifyTitlePresent
C : verifyTextPresent
D : verifyElementPresent
A : Mouse
B : keyboard
C : cpu
D : monitor
Q.no 14. Agile model advocates which one of the following approaches?
A : In each increment, get something “quick and dirty” delivered and thereby save time
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 209/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : In each increment, get something of business-value delivered as quickly as possible, consistent with
the right level of quality
D : In each increment, get something delivered once it has been fully documented and the
documentation has been signed off as complete
Q.no 15. Select the command which retrieves the alert message and stores it in a variable that
you will specify
A : storeAlert
B : storedAlert
C : store_Alert
D : storesAlert
Q.no 16. In software development life cycle , who is the best person to catch a defect?
A : Software Tester
B : Customers
C : Designer
D : Business Analyst
Q.no 17. A ________ view shows the system hardware and how software components are
distributed across the processors in the system.
A : physical
B : logical
C : process
Q.no 18. Which of the following is not a part of a test design document?
A : Test Plan
D : Test Log
Q.no 19. Select the command which is used to compare the actual page title with an expected
value
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 210/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : verifyTitle
B : verifiedTitle
C : verifyTitles
D : verifiedTitles
Q.no 20. Which is not the other name for structural testing?
A : Behavioral testing
Q.no 21. Select the language which is not supported by the Selenium RC
A : ASP
B : Java
C : C#
D : PHP
Q.no 22. What incorporates data, architectural, interface, and procedural representations of the
software?
A : design model
B : user’s model
C : mental image
D : system image
Q.no 23. Select the method which clears all selected entries in Web Driver Selenium
A : dselectAll()
B : deselect_Al()
C : dselect_Al()
D : deselectAll()
Q.no 24. Which one of the following is not a step of requirement engineering?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 211/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : elicitation
B : design
C : analysis
D : documentation
A : Maintainability
B : Portability
C : Robustness
B : a make facility that enables you to collect all relevant configuration objects and construct a specific
version of the software.
C : If the central database is corrupted, the entire history remains safe and secured
A : Requirements Gathering
B : Test Planning
C : Test Closure
D : Test Design
A : Big-bang
B : Bottom-up
C : Design based
D : Top-down
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 212/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : product risk
B : project risk
C : business risk
D : management rsik
Q.no 30. which of the following is the highest level in the reverse engineering process
A : testing level
B : abstraction level
C : design level
D : maintainence level
A : Memory leaks
Q.no 32. Which of the following is not real-time architectural patterns that are commonly used?
A : Asynchronous communication
C : Environmental Control
D : Process Pipeline
A:PxC
B:PxM
C:MxC
D:PxS
Q.no 34. Test wares are handed over to maintenance team during which phase?
A : White box
B : Grey box
C : Black box
D : Combination of all
B : Test Type
C : SDLC Model
D : Test Level
Q.no 39. Which granularity level of testing checks the behavior of module cooperation?
A : Unit Testing
B : Integration Testing
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 214/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : Acceptance Testing
D : Regression Testing
Q.no 40. Which of the following testing method is normally used as acceptance test for a software
system?
A : Regression testing
B : Integration testing
C : Unit testing
D : Functional testing
Q.no 41. The defect cluster change over time. Which of the following testing principle implies
this?
B : Pesticide paradox
D : Defect Clustering
C : Coupling among the client will lessen the effect of data center architecture
Q.no 43. The nature of Software Application can be characterized by their information
A : Determinacy
B : Content
C : Complexity
Q.no 44. Which of the following is not a software testing generic characteristics?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 215/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : Testing and debugging are different activities, but debugging must be accommodated in any testing
strategy
Q.no 45. A set of tools coupled within a file management system that enables access to and
management of each software configuration item is known as
A : component element
B : process element
C : construction element
D : human elements
A : Developer’s end
B : User’s end
Q.no 47. A set of tools that automate the construction of software by ensuring that the proper set
of validated components have been assembled are known as
A : component element
B : process element
C : construction element
D : human elements
Q.no 48. What combines procedures and tools to manage different versions of configuration
objects that are created during the software process?
A : Versioning
B : Audit trails
C : Change control
D : SCI
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 216/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 51. which control helps to ensure that parallel changes, performed by two different people,
don’t overwrite one another.
A : version control
B : synchronization control
C : access control
D : configuration control
B : During designing
C : During coding
D : During testing
Q.no 53. Which one of these belongs to integration testing in the OO context?
A : Unit testing
B : Regression testing
C : Sandwich testing
D : Thread-based testing
Q.no 54. when SCM is a formal activity the software configuration audit is conducted by
A : testing specialists
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 217/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
B : development team
C : senior managers
Q.no 55. The __________ contains a state transition diagram that is a sequential specification of
behavior.
C : Control specification
D : Activity diagram
Q.no 57. A chronological record of relevant details about the execution of tests is called as, a
_______
A : Test suite
B : Test procedure
C : Test data
D : Test log
Q.no 58. What mechanism is used to apprise others of changes that are made?
A : Configuration management
B : Requirementss tracing
C : Reporting
D : Change control
Q.no 59. which of the following impact of the risk drivers on risk components is also called as
disastrous impact
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 218/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : critical impact
B : catastrophic impact
C : marginal impact
D : Destructive impact
Q.no 60. What determines how information is stored in the repository, how data can be accessed
by tools and viewed by software engineers, how well data security and integrity can be
maintained, and how easily the existing model can be extended to accommodate new needs.
A : Data model
B : Meta model
C : Configuration model
D : Test model
A : Ad-hoc testing
B : Monkey testing
C : Fuzz testing
D : End-to-End testing
Q.no 2. Test cases are designed during which of the following stages?
A : Test recording
B : Test configuration
C : Test planning
D : Test specification
Q.no 4. The risks that are analyzed and managed should be derived from thorough study of
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 219/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : people,
product, process, and project.
B : people,
product, process, and management.
C : people,
product, process, and feedback.
D : people,
product, process, and environment.
Q.no 7. Select the operating system which is not supported by Selenium IDE
A : Unix
B : Linux
C : Windows
D : Solaries
A : Product
B : Process
C : Design
D : Testing
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 220/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 9. In order to control cost, defects should ideally be detected in which phase:
A : Coding
B : Design
C : Implementation
D : Requirements Gathering
D:0
D : Implements all requirements in the analysis model and provide a complete picture of the software
Q.no 13. Which of the following model put much more emphasis on testing?
A : waterfall model
B : agile model
C : spiral model
D : v-v model
A : Top down
B : Bottom up
C : Randon
D : iterative
Q.no 15. Select the component which is not part of Selenium Suite
A : Selenium IDE
B : Selenium RC
C : SeleniumGrid
D : Selenium Web
A : Quality risk
B : Performance risk
C : Cost risk
D : Support risk
A : Google Chrome
B : Opera Mini
C : Mozilla Firefox
D : Internet Explorer
Q.no 18. Consider the following requirement for a word processor software: " The software
should provide facility to import an existing image available as a jpeg file into the document
being created.". Which one of the following types of requirements is this?
A : Functional requirement
B : Non-functional requirement
D : Goal of implementation
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 222/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 19. A software requirements specification (SRS) document should avoid discussing which
one of the following?
A : Functional requirements
B : Non-functional requirements
C : Design specification
Q.no 21. Before handing over the software to the client, which testing is to be done in-house?
A : Alpha
B : Betta
C : Gamma
D : Theta
D : Software design is an activity subjected to constraints specifies nature and composition of software
product which satisfies client needs and desires
Q.no 23. Select the method which performs a context-click at the curent mouse location
A : click_Context()
B : context.Click()
C : contextClick()
D : context_Click()
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 223/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : Test Specification
B : Test Planning
C : Test Requirement
D : Test Configuration
Q.no 25. Which of these does not represent object oriented design?
C : Central model represents class diagrams that show the classes comprising a program and their
relationships to one another
Q.no 26. Software tester focuses more on complex part of the software. Which of the following
testing principle implies this?
B : Pesticide paradox
D : Defect Clustering
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 224/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : Author
B : Moderator
C : Reviewer
D : Scribe
Q.no 30. The modification of the software to match changes in the ever changing environment,
falls under which category of software maintenance?
A : Adaptive
B : Corrective
C : perfective
D : preventive
A : Database Testing
B : Security Testing
C : Statement Testing
D : Functional Testing
Q.no 32. Systems that involve interaction with a shared database can be considered as.
A : software-based
B : transaction-based
C : server-based
D : client-based
C : Incorporation of planning function that in effect results in runtime determination of the translation
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 225/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 34. After occurence of the risk ,the developement team members do some rapid actions to
overcome the problem called as
Q.no 35. Webapp configuration object can be managed in much the same way as conventional
software configuration objects except for
A : content items
B : graphic items
C : functional items
D : user items
Q.no 36. Which of the following is not a state of a defect in defect life cycle:
A : Verified
B : New
C : Critical
D : Deferred
Q.no 37. Which of the following risk is the failure of a purchased component to perform as
expected
A : Product risk
B : Business risk
C : Programming risk
D : Project risk
A : code restructuring
B : back engineering
C : document engineerinhg
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 226/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
D : implementation engineering
C : cIncorporation of planning function that in effect results in runtime determination of the translation
Q.no 40. Regression testing is a major part of which of the life cycle?
A : Waterfall model
B : V model
C : Iterative model
D : Agile model
A : Retesting
B : Sanity testing
D : Confirmation testing
Q.no 42. Which of the following is not a Software Configuration Management Activity?
B : Risk management
C : Release management
D : Branch management
Q.no 43. What allows different projects to use the same source files at the same time?
A : Version Control
B : Access control
C : CM Process
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 227/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 44. What effect does achievement of quality attribute will have?
D : The achievement of quality attribute will have a positive as well as negative effect
Q.no 45. Which of the following items would not come under Configuration Management?
A : Operating systems
B : Live data
C : Test documentation
Q.no 46. ______provide the mechanisms for assembling SCIs into a version-specific
configuration.
A : Repository
B : versioning
C : modeling
D : assembling
Q.no 47. Which of the following is not an issue to consider when reverse engineering?
A : directionality
B : connectivity
C : completeness
D : abstraction level
Q.no 48. Which of the following pattern is the basis of interaction management in many web-
based systems?
A : model-view-controller
B : repository pattern
C : architecture
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 228/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : Integration testing
D : Unit testing
Q.no 51. The ability to identify which requirement generated any given work product is known
as
A : forward tracing
B : backward tracing
C : Dependency tracking
D : Change management
Q.no 52. What combines the outward manifestation of the computer-based system , coupled with
all supporting information that describe system syntax and semantics?
A : design model
B : user’s model
C : mental image
D : system image
Q.no 53. Three factors that affect the consequences that are likely to happen if a risk does occur:
A : its nature,
its scope, and its intensity.
B : its nature,
its scope, and its timing.
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 229/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : its nature,
its scope, and its durability.
D : its nature,
its limit, and its timing.
A : BS7925-2
B : IEEE 829
C : BS7925-1
D : IEEE 610
Q.no 55. Risk mitigation is a risk ___________activity. Risk monitoring is a ___________ activity
D : Random, Tracking.
Q.no 56. Which model describes the static structure of the system using object classes and their
relationships?
A : Structural model
B : Dynamic model
C : Subsystem model
D : Sequence model
Q.no 57. Which of the following type of maintenance takes the maximum chunk of the total
maintenance effort in a typical life cycle of a software product ?
A : Adaptive maintenance
B : Corrective maintenance
C : Preventive maintenance
D : Perfective maintenance
Q.no 58. The __________ enables the software engineer to develop models of the information
domain and functional domain at the same time
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 230/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : Control specification
D : Activity diagram
Q.no 59. A __________ executes the loop task first, then tests a condition and repeats the task
until the condition fails.
A : repeat until
B : condition
C : do while tests
D : if then-else
Q.no 60. Which of the following is not needed to develop a system design from concept to detailed
object-oriented design?
C : Specifying interfaces
A : It is a degree to which software running on one platform can easily be converted to run on another
platform
B : It cannot be enhanced by using languages, OS’ and tools that are universally available and
standardized
C : The ability of the system to behave consistently in a user-acceptable manner when operating within
the environment for which the system was intended
A : Coverage analysis
B : Code inspection
C : Usability assessment
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 231/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
D : Installation test
Q.no 3. Select the component which is not a type of assertion in Selenium IDE
A : Assert
B : Verify
C : WaitFor
D : Wait
Q.no 4. Which design model is equivallent to the detailed drawing of accesspoints and external
utilities of a building
A : Architectural Design
C : Data design
D : Interface design
A : Functions
B : Modules
C : Classes
D : Sub procedures
Q.no 6. How many classification schemes have been developed for NFRs ?
A : Two
B : Three
C : Four
D : Five
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 232/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 8. Which one of the following most accurately reflects agile software development?
A : Incremental development
B : Iterative development
C : Linear development
A : Test Plan
D : Test Log
A : Customer
B : Investor
C : Developer
D : Project team
A : During testing
B : During execution
C : During review
D : Throughout life-cycle
Q.no 13. What can be used to test Flex/Flash aplication using Selenium
A : FlexUISelenium
B : FlexUI
C : UIFlexSelenium
D : SeleniumFlex
A : Risk expense
B : Related expense
C : Risk exposure
D : Risk evaluation
Q.no 16. Select the command which is used to check the presence of a certain element
A : verifyTable
B : verifyTitlePresent
C : verifyTextPresent
D : verifyElementPresent
D : Glass box
C : Alpha Testing
D : Beta testing
A : Design specification
B : Test specification
C : source code
D : configuration control
A : Unit testing
B : Regression testing
C : Adhoc testing
A : Mitigate,Contingency
B : Transfer
D : Ignore
Q.no 22. Select the tab which gives feedback and other useful information when executing tests
A : Information
B : Feddback
C : Reference
D : Element
A : Users
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 235/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
B : Developers
C : Customers
Q.no 24. Select the command which retrieves the alert message and stores it in a variable that
you will specify
A : storeAlert
B : storedAlert
C : store_Alert
D : storesAlert
Q.no 25. Which one of the following is not a standard software development process model?
A : Waterfall Model
B : Recursive Model
C : RAD Model
D : V Model
B : Test Type
C : SDLC Model
D : Test Level
Q.no 27. Three statements are given below regarding the User Interface Design: 1) Place the user
in Control. 2) Reduce user's memory load. 3) Make the interface consistent. These rules are
called as __________.
A : Governed Rule
B : Golden Rule
C : User Rule
D : Thumb Rule
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 236/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : Requirement Design
B : Requirement Elicitation
C : Requirement Analysis
D : Requirement Documentation
A : Memory leaks
Q.no 31. A set of tools that automate the construction of software by ensuring that the proper set
of validated components have been assembled are known as
A : component element
B : process element
C : construction element
D : human elements
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 237/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : Object modules
B : Hardware modules
C : Functional modules
Q.no 35. What are the criteria to decide the testing efforts?1. Time and budget
2. Size of development team
3. Size of testers
4. Risk associated with project
A : a. 1, 3, 4
B : b. 1, 2, 3
C : c. 1, 4
D : d. 1, 3
Q.no 36. Which of the following testing method is normally used as acceptance test for a software
system?
A : Regression testing
B : Integration testing
C : Unit testing
D : Functional testing
Q.no 37. In a simple risk table the risks are categorized into
A : PS, BU , CU
B : TU ,DE ,ST
C : BE ,CU ,ST
D : SU , TE ,CU ,PS
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 238/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
B : Component testing
D : Maintenance testing
A : Developer’s end
B : User’s end
Q.no 41. Which architectural style goal is to achieve Modifiability with Reuse?
Q.no 42. Which architectural style goal is to achieve Modifiability with Scalability?
A:PxC
B:PxM
C:MxC
D:PxS
Q.no 44. The defect cluster change over time. Which of the following testing principle implies
this?
B : Pesticide paradox
D : Defect Clustering
Q.no 45. Which granularity level of testing checks the behavior of module cooperation?
A : Unit Testing
B : Integration Testing
C : Acceptance Testing
D : Regression Testing
Q.no 46. What combines procedures and tools to manage different versions of configuration
objects that are created during the software process?
A : Versioning
B : Audit trails
C : Change control
D : SCI
A : Big-bang
B : Bottom-up
C : Design based
D : Top-down
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 240/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : Incorporation of planning function that in effect results in runtime determination of the translation
Q.no 49. Which of the following is not real-time architectural patterns that are commonly used?
A : Asynchronous communication
C : Environmental Control
D : Process Pipeline
Q.no 50. E-Commerce software testing follows different approach than gaming software testing.
Which testing principle implies this?
A : Pareto principle
D : Absence of errors-fallacy
Q.no 51. Which of the following is not a design principle that allow the user to maintain control?
D : Design for direct interaction with objects that appear on the screen
Q.no 52. Which one of these belongs to integration testing in the OO context?
A : Unit testing
B : Regression testing
C : Sandwich testing
D : Thread-based testing
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 241/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 53. Which of the following is likely to benefit most from the use of test tools providing test
capture and replay facilities?
A : Integration testing
B : Regression testing
C : System testing
Q.no 54. The main focus of ______ is to reduce defects and variations in the processes.
A : QA
B : QC
C : Six Sigma
D : tracking
A : Structural model
B : Dynamic model
C : Subsystem model
D : Sequence model
Q.no 56. which of the following impact of the risk drivers on risk components is also called as
disastrous impact
A : critical impact
B : catastrophic impact
C : marginal impact
D : Destructive impact
A : Bottom up
B : Top down
C : Big-bang
D : Functional incrimination
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 242/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 58. The order in which test levels are performed is:
Q.no 59. What determines how information is stored in the repository, how data can be accessed
by tools and viewed by software engineers, how well data security and integrity can be
maintained, and how easily the existing model can be extended to accommodate new needs.
A : Data model
B : Meta model
C : Configuration model
D : Test model
Q.no 60. A chronological record of relevant details about the execution of tests is called as, a
_______
A : Test suite
B : Test procedure
C : Test data
D : Test log
A : TestNextGeneration
B : TestNewGenerlization
C : TestNewGeneration
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 243/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
D : TestNextGenerations
A : The main technique for achieving portable software is to isolate system dependency
B : The main technique for achieving portable software is to increase the overall performance
C : The main technique for achieving portable software is to have independent platform dependency
D : The main technique for achieving portable software is to have independent platform dependency
and to increase accuracy
Q.no 4. Which command can be used to enter values onto text boxes ?
A : sendsKey()
B : sendKey()
C : sendKeys
D : sendKeys()
Q.no 5. Which one of the following activities spans all stages of a software development life cycle
A : Coding
B : Testing
C : Project management
D : Design
Q.no 6. In software development life cycle , who is the best person to catch a defect?
A : Software Tester
B : Customers
C : Designer
D : Business Analyst
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 244/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : ID
B : Name
C : Password
D : Link Text
Q.no 10. Consider the following requirement for a word processor software: " The software
should provide facility to import an existing image available as a jpeg file into the document
being created.". Which one of the following types of requirements is this?
A : Functional requirement
B : Non-functional requirement
D : Goal of implementation
Q.no 11. Which one of the following may be experienced by a software development team when it
adopts a systematic development process model in preference to a build-and-fix style of
development?
C : Decreased maintainability
Q.no 12. When an expected result is not specified in test case template then ___________.
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 245/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : condition-transaction-consequence
B : condition-transfer-consequence
C : condition-transition-consequence
D : condition-transmission-consequence
Q.no 14. Method which selects the option which displays the text matching the parameter passed
to it
A : selectVisibleText()
B : selectByVisibleText()
C : select_VisibleText()
D : select_ByVisibleText()
Q.no 15. What are the benefits for component based product lines?
A : Being able to take faster advantage of new product and new technology
Q.no 16. Unit testing is carried out during which phase of the waterfall model?
A : Implementation phase
B : Testing phase
C : Maintenance phase
D : Design phase
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 246/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
D : Implements all requirements in the analysis model and provide a complete picture of the software
Q.no 18. When users are involved in complex tasks, the demand on __________ can be significant
A : short-term memory
B : shortcuts
Q.no 19. The importance of software design can be summarized in a single word which is:
A : Efficiency
B : Accuracy
C : Quality
D : Complexity
A : always possible
B : practically possible
Q.no 21. Which one of the following statements most accurately identifies the stakeholders in a
software development project?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 247/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 23. In which of the following type of testing, testing is done without planning and
documentation?
A : Unit testing
B : Retesting
C : Ad hoc testing
D : Regression testing
A : Data re-engineering
B : Refactoring
C : Restructuring
D : Repairing
Q.no 26. A set of tools coupled within a file management system that enables access to and
management of each software configuration item is known as
A : component element
B : process element
C : construction element
D : human elements
Q.no 27. ______provide the mechanisms for assembling SCIs into a version-specific
configuration.
A : Repository
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 248/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
B : versioning
C : modeling
D : assembling
Q.no 28. The nature of Software Application can be characterized by their information
A : Determinacy
B : Content
C : Complexity
Q.no 29. Which of the following is/are commonly used architectural pattern(s)?
A : Model-View-Controller
B : Layered Architecture
C : Client–server
Q.no 30. Systems that involve interaction with a shared database can be considered as.
A : software-based
B : transaction-based
C : server-based
D : client-based
Q.no 31. Test wares are handed over to maintenance team during which phase?
Q.no 32. Webapp configuration object can be managed in much the same way as conventional
software configuration objects except for
A : content items
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 249/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
B : graphic items
C : functional items
D : user items
Q.no 33. which of the following risk is a potential threat to every software project
A : generic risk
B : project risk
C : product risk
D : business risk
A : Requirements Gathering
B : Test Planning
C : Test Closure
D : Test Design
A : Retesting
B : Sanity testing
D : Confirmation testing
Q.no 36. Regression testing is a major part of which of the life cycle?
A : Waterfall model
B : V model
C : Iterative model
D : Agile model
C : Coupling among the client will lessen the effect of data center architecture
A : code restructuring
B : back engineering
C : document engineerinhg
D : implementation engineering
Q.no 41. Which of the following is not an issue to consider when reverse engineering?
A : directionality
B : connectivity
C : completeness
D : abstraction level
Q.no 42. Which of the following pattern is the basis of interaction management in many web-
based systems?
A : model-view-controller
B : repository pattern
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 251/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : architecture
A : White box
B : Grey box
C : Black box
D : Combination of all
C : Integration testing
D : Unit testing
Q.no 46. What allows different projects to use the same source files at the same time?
A : Version Control
B : Access control
C : CM Process
Q.no 47. Which of the following is not a software testing generic characteristics?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 252/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : Testing and debugging are different activities, but debugging must be accommodated in any testing
strategy
Q.no 48. What describes how a set of interacting components can share data?
A : model-view-controller
B : repository pattern
C : architecture
A : Database Testing
B : Security Testing
C : Statement Testing
D : Functional Testing
Q.no 50. which of the following is the highest level in the reverse engineering process
A : testing level
B : abstraction level
C : design level
D : maintainence level
Q.no 51. What combines the outward manifestation of the computer-based system , coupled with
all supporting information that describe system syntax and semantics?
A : design model
B : user’s model
C : mental image
D : system image
Q.no 52. The __________ contains a state transition diagram that is a sequential specification of
behavior.
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 253/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : Control specification
D : Activity diagram
Q.no 53. when SCM is a formal activity the software configuration audit is conducted by
A : testing specialists
B : development team
C : senior managers
Q.no 54. Three factors that affect the consequences that are likely to happen if a risk does occur:
A : its nature,
its scope, and its intensity.
B : its nature,
its scope, and its timing.
C : its nature,
its scope, and its durability.
D : its nature,
its limit, and its timing.
Q.no 55. What mechanism is used to apprise others of changes that are made?
A : Configuration management
B : Requirementss tracing
C : Reporting
D : Change control
Q.no 56. Risk mitigation is a risk ___________activity. Risk monitoring is a ___________ activity
D : Random, Tracking.
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 254/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : BS7925-2
B : IEEE 829
C : BS7925-1
D : IEEE 610
Q.no 58. The ability to identify which requirement generated any given work product is known
as
A : forward tracing
B : backward tracing
C : Dependency tracking
D : Change management
Q.no 59. The __________ enables the software engineer to develop models of the information
domain and functional domain at the same time
C : Control specification
D : Activity diagram
Q.no 60. A _________ is a graphical representation that depicts information flow and the
transforms that are applied as data moves from input to output.
C : Control specification
D : Activity diagram
Q.no 1. Select the command which is used to print a string value of a variable in Selenium IDE
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 255/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 2. Select the method which performs a context-click at the curent mouse location
A : click_Context()
B : context.Click()
C : contextClick()
D : context_Click()
Q.no 3. Which design model is equivallent to the detailed drawing of accesspoints and external
utilities of a building
A : Architectural Design
C : Data design
D : Interface design
B : Solution mode
C : Uncertain mode
D : Perfect mode
Q.no 6. Software risk always involves two characteristics. What are those characteristics?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 256/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : Test Plan
D : Test Log
A : 1975
B : 1966
C : 1977
D : 1967
Q.no 10. Select the component which is not a type of assertion in Selenium IDE
A : Assert
B : Verify
C : WaitFor
D : Wait
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 257/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 14. In order to control cost, defects should ideally be detected in which phase:
A : Coding
B : Design
C : Implementation
D : Requirements Gathering
Q.no 15. Select the tab that shows which command Selenium IDE is currently executing
A : Variable
B : Data
C : Information
D : Info
Q.no 16. Which of the following is not a Software Development Life Cycle Phase?
A : Requirements Gathering
B : Test Closure
C : Coding
D : Testing
Q.no 17. Which one of the following is not a requirements gathering technique
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 258/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : Task analysis
B : Scenario analysis
C : Form analysis
Q.no 18. Select the tab which gives feedback and other useful information when executing tests
A : Information
B : Feddback
C : Reference
D : Element
D:0
Q.no 20. Which component of Selenium can create customized test results ?
A : Web Driver
B : Selenium RC
C : Selenium IDE
D : Selenium Grid
Q.no 21. Which one of the following feedback paths is not present in an iterative waterfall
model?
Q.no 22. Select the language which is supported by the Selenium Web driver
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 259/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : Perl
B : Sql
C : ASP
D : Cobol
Q.no 23. What incorporates data, architectural, interface, and procedural representations of the
software?
A : design model
B : user’s model
C : mental image
D : system image
A : Top down
B : Bottom up
C : Randon
D : iterative
A : Unit testing
B : Regression testing
C : Adhoc testing
A : Developer’s end
B : User’s end
Q.no 27. Which of the following is not real-time architectural patterns that are commonly used?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 260/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : Asynchronous communication
C : Environmental Control
D : Process Pipeline
Q.no 28. A set of tools that automate the construction of software by ensuring that the proper set
of validated components have been assembled are known as
A : component element
B : process element
C : construction element
D : human elements
A : product risk
B : project risk
C : business risk
D : management rsik
C : cIncorporation of planning function that in effect results in runtime determination of the translation
Q.no 31. Software tester focuses more on complex part of the software. Which of the following
testing principle implies this?
B : Pesticide paradox
D : Defect Clustering
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 261/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : Incorporation of planning function that in effect results in runtime determination of the translation
Q.no 33. What effect does achievement of quality attribute will have?
D : The achievement of quality attribute will have a positive as well as negative effect
A : Object modules
B : Hardware modules
C : Functional modules
Q.no 36. E-Commerce software testing follows different approach than gaming software testing.
Which testing principle implies this?
A : Pareto principle
D : Absence of errors-fallacy
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 262/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 38. The modification of the software to match changes in the ever changing environment,
falls under which category of software maintenance?
A : Adaptive
B : Corrective
C : perfective
D : preventive
B : Test Type
C : SDLC Model
D : Test Level
Q.no 40. What combines procedures and tools to manage different versions of configuration
objects that are created during the software process?
A : Versioning
B : Audit trails
C : Change control
D : SCI
Q.no 41. Which architectural style goal is to achieve Modifiability with Reuse?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 263/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : Requirement Design
B : Requirement Elicitation
C : Requirement Analysis
D : Requirement Documentation
B : Component testing
D : Maintenance testing
Q.no 44. Which of the following is not a Software Configuration Management Activity?
B : Risk management
C : Release management
D : Branch management
A:PxC
B:PxM
C:MxC
D:PxS
Q.no 46. Which of the following items would not come under Configuration Management?
A : Operating systems
B : Live data
C : Test documentation
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 264/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 47. Which of the following risk is the failure of a purchased component to perform as
expected
A : Product risk
B : Business risk
C : Programming risk
D : Project risk
B : a make facility that enables you to collect all relevant configuration objects and construct a specific
version of the software.
C : If the central database is corrupted, the entire history remains safe and secured
Q.no 50. The defect cluster change over time. Which of the following testing principle implies
this?
B : Pesticide paradox
D : Defect Clustering
A : Structural model
B : Dynamic model
C : Subsystem model
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 265/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
D : Sequence model
B : During designing
C : During coding
D : During testing
Q.no 53. Which one of these belongs to integration testing in the OO context?
A : Unit testing
B : Regression testing
C : Sandwich testing
D : Thread-based testing
Q.no 54. A __________ executes the loop task first, then tests a condition and repeats the task
until the condition fails.
A : repeat until
B : condition
C : do while tests
D : if then-else
Q.no 55. Which model describes the static structure of the system using object classes and their
relationships?
A : Structural model
B : Dynamic model
C : Subsystem model
D : Sequence model
Q.no 56. Which of the following is likely to benefit most from the use of test tools providing test
capture and replay facilities?
A : Integration testing
B : Regression testing
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 266/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : System testing
Q.no 57. The order in which test levels are performed is:
Q.no 58. which of the following impact of the risk drivers on risk components is also called as
disastrous impact
A : critical impact
B : catastrophic impact
C : marginal impact
D : Destructive impact
A : Bottom up
B : Top down
C : Big-bang
D : Functional incrimination
Q.no 60. Which of the following type of maintenance takes the maximum chunk of the total
maintenance effort in a typical life cycle of a software product ?
A : Adaptive maintenance
B : Corrective maintenance
C : Preventive maintenance
D : Perfective maintenance
A : Developer
B : Designer
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 267/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : Tester
D : QA Team
A : Risk expense
B : Related expense
C : Risk exposure
D : Risk evaluation
Q.no 3. Select the command which is used to compare the actual page title with an expected value
A : verifyTitle
B : verifiedTitle
C : verifyTitles
D : verifiedTitles
A : In each increment, get something “quick and dirty” delivered and thereby save time
C : In each increment, get something of business-value delivered as quickly as possible, consistent with
the right level of quality
D : In each increment, get something delivered once it has been fully documented and the
documentation has been signed off as complete
Q.no 6. select the variation which locates elements by the value of their "id" attribute in Web
Driver Selenium
A : By.id
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 268/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
B : By.idno
C : By.id_no
D : By.tag_id
Q.no 7. The operation phase of the waterfall model is a synonym for which one of the following
phases?
C : Maintenance phase
D : Design phase
Q.no 8. In which of the following type of testing, testing is done without planning and
documentation?
A : Unit testing
B : Retesting
C : Ad hoc testing
D : Regression testing
C : Central model represents class diagrams that show the classes comprising a program and their
relationships to one another
Q.no 10. Java packages and Fortran subroutine are examples of__________
A : Functions
B : Modules
C : Classes
D : Sub procedures
Q.no 11. What does “Every software system has an architecture” implies?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 269/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 12. Which one of the following statements most accurately identifies the stakeholders in a
software development project?
A : object-oriented systems
B : architectural design
C : SRS
Q.no 14. Consider the following partial description of the IIT security software. “A camera at the
main gate should detect an incoming vehicle, and the gate should be opened for registered
vehicles.” Which one of the following types of requirements is this?
A : Functional requirement
B : Non-Functional requirement
C : Design requirement
D : Design constraint
Q.no 15. Which of the following is not a user interface design process?
B : Interface design
D : Interface validation
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 270/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 16. A software requirements specification (SRS) document should avoid discussing which
one of the following?
A : Functional requirements
B : Non-functional requirements
C : Design specification
A : Large
B : Small
C : Difficult to write
D : Difficult to test
A : waitForTitle
B : waitForTextPresent
C : waitForActive
D : waitForAlert
Q.no 19. Choose the incorrect statement with respect to Non-Functional Requirement(NFR)
B : Process-oriented Approach – Focus on how NFRs can be used in the design process
Q.no 20. What can be used to test Flex/Flash aplication using Selenium
A : FlexUISelenium
B : FlexUI
C : UIFlexSelenium
D : SeleniumFlex
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 271/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
D:0
Q.no 22. Which of the following statements explains portability in non-functional requirements?
A : It is a degree to which software running on one platform can easily be converted to run on another
platform
B : It cannot be enhanced by using languages, OS’ and tools that are universally available and
standardized
C : The ability of the system to behave consistently in a user-acceptable manner when operating within
the environment for which the system was intended
Q.no 23. Which of the following model put much more emphasis on testing?
A : waterfall model
B : agile model
C : spiral model
D : v-v model
A : Maintainability
B : Portability
C : Robustness
Q.no 25. Select the command in SeleniumIDE used to open a web page using theURL
A : OpenRecord
B : Open
C : OpenText
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 272/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
D : OpenTable
A : Memory leaks
C : Incorporation of planning function that in effect results in runtime determination of the translation
Q.no 28. What describes how a set of interacting components can share data?
A : model-view-controller
B : repository pattern
C : architecture
Q.no 29. Three statements are given below regarding the User Interface Design: 1) Place the user
in Control. 2) Reduce user's memory load. 3) Make the interface consistent. These rules are
called as __________.
A : Governed Rule
B : Golden Rule
C : User Rule
D : Thumb Rule
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 273/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : supported everywhere
Q.no 33. What are the criteria to decide the testing efforts?1. Time and budget
2. Size of development team
3. Size of testers
4. Risk associated with project
A : a. 1, 3, 4
B : b. 1, 2, 3
C : c. 1, 4
D : d. 1, 3
C : Coupling among the client will lessen the effect of data center architecture
Q.no 35. which of the following is the highest level in the reverse engineering process
A : testing level
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 274/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
B : abstraction level
C : design level
D : maintainence level
Q.no 36. Regression testing is a major part of which of the life cycle?
A : Waterfall model
B : V model
C : Iterative model
D : Agile model
C : Integration testing
D : Unit testing
Q.no 39. Which of the following pattern is the basis of interaction management in many web-
based systems?
A : model-view-controller
B : repository pattern
C : architecture
Q.no 40. Systems that involve interaction with a shared database can be considered as.
A : software-based
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 275/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
B : transaction-based
C : server-based
D : client-based
Q.no 41. Which of the following is not an issue to consider when reverse engineering?
A : directionality
B : connectivity
C : completeness
D : abstraction level
Q.no 42. Which of the following testing method is normally used as acceptance test for a software
system?
A : Regression testing
B : Integration testing
C : Unit testing
D : Functional testing
Q.no 43. Which architectural style goal is to achieve Modifiability with Scalability?
Q.no 44. Software testing are most effective if applied immediately after
A : Requirement Specification
B : Design
C : Coding
D : Integration
A : Database Testing
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 276/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
B : Security Testing
C : Statement Testing
D : Functional Testing
Q.no 46. After occurence of the risk ,the developement team members do some rapid actions to
overcome the problem called as
A : Author
B : Moderator
C : Reviewer
D : Scribe
Q.no 48. which of the following risk is a potential threat to every software project
A : generic risk
B : project risk
C : product risk
D : business risk
Q.no 49. Which of the following is/are commonly used architectural pattern(s)?
A : Model-View-Controller
B : Layered Architecture
C : Client–server
A : Big-bang
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 277/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
B : Bottom-up
C : Design based
D : Top-down
Q.no 51. Risk mitigation is a risk ___________activity. Risk monitoring is a ___________ activity
D : Random, Tracking.
Q.no 52. What determines how information is stored in the repository, how data can be accessed
by tools and viewed by software engineers, how well data security and integrity can be
maintained, and how easily the existing model can be extended to accommodate new needs.
A : Data model
B : Meta model
C : Configuration model
D : Test model
Q.no 53. The __________ contains a state transition diagram that is a sequential specification of
behavior.
C : Control specification
D : Activity diagram
Q.no 55. Which of the following is not a design principle that allow the user to maintain control?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 278/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
D : Design for direct interaction with objects that appear on the screen
Q.no 56. A chronological record of relevant details about the execution of tests is called as, a
_______
A : Test suite
B : Test procedure
C : Test data
D : Test log
Q.no 57. which control helps to ensure that parallel changes, performed by two different people,
don’t overwrite one another.
A : version control
B : synchronization control
C : access control
D : configuration control
Q.no 58. The __________ enables the software engineer to develop models of the information
domain and functional domain at the same time
C : Control specification
D : Activity diagram
Q.no 59. The ability to identify which requirement generated any given work product is known
as
A : forward tracing
B : backward tracing
C : Dependency tracking
D : Change management
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 279/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 60. What mechanism is used to apprise others of changes that are made?
A : Configuration management
B : Requirementss tracing
C : Reporting
D : Change control
A : always possible
B : practically possible
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 280/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
D : Implements all requirements in the analysis model and provide a complete picture of the software
Q.no 5. A ________ view shows the system hardware and how software components are
distributed across the processors in the system.
A : physical
B : logical
C : process
Q.no 6. Which one of the following phases accounts for the maximum effort during development
of a typical software?
A : Coding
B : Testing
C : Designing
D : Specification
Q.no 7. The implementation phase of the waterfall model is a synonym for which one of the
following phases?
C : Maintenance phase
D : Design phase
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 281/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
D : Glass box
A : Mitigate,Contingency
B : Transfer
D : Ignore
Q.no 11. Select the method which clears all selected entries in Web Driver Selenium
A : dselectAll()
B : deselect_Al()
C : dselect_Al()
D : deselectAll()
Q.no 13. Which design model is equivallent to set of detailed drawing for each room of a building
A : Architectural Design
C : Data design
D : Interface design
Q.no 14. First graphical user interface used commercially was introduced in
A : 1975
B : 1966
C : 1977
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 282/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
D : 1967
Q.no 15. Which is not the other name for structural testing?
A : Behavioral testing
Q.no 16. Which one of the following activities spans all stages of a software development life cycle
A : Coding
B : Testing
C : Project management
D : Design
C : Dynamic testing
D : Static testing
Q.no 18. Which one of the following feedback paths is not present in an iterative waterfall
model?
A : Product
B : Process
C : Design
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 283/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
D : Testing
Q.no 20. Which of the following is golden rule for interface design?
Q.no 21. In case of Selenium IDE, the source view shows your script in
A : DHTML format
B : XML format
C : j2EE format
D : HTML format
Q.no 22. What is the main technique for achieving portable software?
A : The main technique for achieving portable software is to isolate system dependency
B : The main technique for achieving portable software is to increase the overall performance
C : The main technique for achieving portable software is to have independent platform dependency
D : The main technique for achieving portable software is to have independent platform dependency
and to increase accuracy
Q.no 23. Which one of the following is not a step of requirement engineering?
A : elicitation
B : design
C : analysis
D : documentation
A : Spiral model.
B : Waterfall model.
C : Prototyping model
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 284/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
D : Incremental Model.
Q.no 25. Software risk always involves two characteristics. What are those characteristics?
B : Test Type
C : SDLC Model
D : Test Level
Q.no 27. The modification of the software to match changes in the ever changing environment,
falls under which category of software maintenance?
A : Adaptive
B : Corrective
C : perfective
D : preventive
A : Retesting
B : Sanity testing
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 285/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
D : Confirmation testing
Q.no 30. Which granularity level of testing checks the behavior of module cooperation?
A : Unit Testing
B : Integration Testing
C : Acceptance Testing
D : Regression Testing
C : cIncorporation of planning function that in effect results in runtime determination of the translation
Q.no 32. A set of tools that automate the construction of software by ensuring that the proper set
of validated components have been assembled are known as
A : component element
B : process element
C : construction element
D : human elements
Q.no 33. The defect cluster change over time. Which of the following testing principle implies
this?
B : Pesticide paradox
D : Defect Clustering
Q.no 34. Which of the following is not a Software Configuration Management Activity?
B : Risk management
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 286/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : Release management
D : Branch management
Q.no 35. Which of the following risk is the failure of a purchased component to perform as
expected
A : Product risk
B : Business risk
C : Programming risk
D : Project risk
Q.no 38. Which of the following is not a state of a defect in defect life cycle:
A : Verified
B : New
C : Critical
D : Deferred
Q.no 39. ______provide the mechanisms for assembling SCIs into a version-specific
configuration.
A : Repository
B : versioning
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 287/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : modeling
D : assembling
Q.no 40. What allows different projects to use the same source files at the same time?
A : Version Control
B : Access control
C : CM Process
Q.no 41. A set of tools coupled within a file management system that enables access to and
management of each software configuration item is known as
A : component element
B : process element
C : construction element
D : human elements
Q.no 42. Which of the following items would not come under Configuration Management?
A : Operating systems
B : Live data
C : Test documentation
Q.no 43. What effect does achievement of quality attribute will have?
D : The achievement of quality attribute will have a positive as well as negative effect
Q.no 44. In a simple risk table the risks are categorized into
A : PS, BU , CU
B : TU ,DE ,ST
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 288/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : BE ,CU ,ST
D : SU , TE ,CU ,PS
Q.no 45. Which of the following is not real-time architectural patterns that are commonly used?
A : Asynchronous communication
C : Environmental Control
D : Process Pipeline
Q.no 46. What combines procedures and tools to manage different versions of configuration
objects that are created during the software process?
A : Versioning
B : Audit trails
C : Change control
D : SCI
B : a make facility that enables you to collect all relevant configuration objects and construct a specific
version of the software.
C : If the central database is corrupted, the entire history remains safe and secured
A : product risk
B : project risk
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 289/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : business risk
D : management rsik
Q.no 50. Which of the following is not a software testing generic characteristics?
C : Testing and debugging are different activities, but debugging must be accommodated in any testing
strategy
Q.no 51. Which of the following type of maintenance takes the maximum chunk of the total
maintenance effort in a typical life cycle of a software product ?
A : Adaptive maintenance
B : Corrective maintenance
C : Preventive maintenance
D : Perfective maintenance
B : During designing
C : During coding
D : During testing
Q.no 53. What combines the outward manifestation of the computer-based system , coupled with
all supporting information that describe system syntax and semantics?
A : design model
B : user’s model
C : mental image
D : system image
Q.no 54. The order in which test levels are performed is:
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 290/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : Bottom up
B : Top down
C : Big-bang
D : Functional incrimination
Q.no 56. Three factors that affect the consequences that are likely to happen if a risk does occur:
A : its nature,
its scope, and its intensity.
B : its nature,
its scope, and its timing.
C : its nature,
its scope, and its durability.
D : its nature,
its limit, and its timing.
Q.no 57. The main focus of ______ is to reduce defects and variations in the processes.
A : QA
B : QC
C : Six Sigma
D : tracking
Q.no 58. Which of the following is likely to benefit most from the use of test tools providing test
capture and replay facilities?
A : Integration testing
B : Regression testing
C : System testing
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 291/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 59. Which one of these belongs to integration testing in the OO context?
A : Unit testing
B : Regression testing
C : Sandwich testing
D : Thread-based testing
Q.no 60. A _________ is a graphical representation that depicts information flow and the
transforms that are applied as data moves from input to output.
C : Control specification
D : Activity diagram
Q.no 1. Select the method which selects the option at the at the given index
A : selectByIndex()
B : selectIndex()
C : selectedByIndex()
D : selectByIndexes()
A : condition-transaction-consequence
B : condition-transfer-consequence
C : condition-transition-consequence
D : condition-transmission-consequence
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 292/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 6. Which of the following is not a design principle that allows the user to maintain control?
D : Design for direct interaction with objects that appear on the screen
A : Task analysis
B : Scenario analysis
C : Form analysis
Q.no 8. Which one of the following is a requirement that fits in a developer’s module ?
A : Availability
B : Testability
C : Usability
D : Flexibility
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 293/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 9. Select the command that will not wait for the new page to load before moving on to the
next command
A : clickAndWait
B : typeAndWait
C : selectAndWait
D : selectAndType
A : Coverage analysis
B : Code inspection
C : Usability assessment
D : Installation test
Q.no 12. When a company plans to develop a generic product, who among the following is
usually the source of the requirements?
B : Project manager
C : Marketing personnel
Q.no 13. Select the command which is used to pause execution until the page is loaded completely
A : waitForPageToLoad
B : waitForElementPresent
C : waitForPage
D : waitForLoad
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 294/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 14. Testing of software with actual data and in actual environment is known as?
A : Regression testing
B : Beta testing
C : Alpha testing
A : Selenium Generator
B : Selenium IDE
C : Selenium WebDriver
D:0
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 295/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 19. Select the component which is not part of Selenium Suite
A : Selenium IDE
B : Selenium RC
C : SeleniumGrid
D : Selenium Web
A : After installation
C : After programming
D : After designing
A : Product
B : Process
C : Design
D : Testing
Q.no 23. A software requirements specification (SRS) document should avoid discussing which
one of the following?
A : Functional requirements
B : Non-functional requirements
C : Design specification
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 296/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : Design specification
B : Test specification
C : source code
D : configuration control
C : Incorporation of planning function that in effect results in runtime determination of the translation
Q.no 27. which of the following risk is a potential threat to every software project
A : generic risk
B : project risk
C : product risk
D : business risk
C : Integration testing
D : Unit testing
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 297/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : White box
B : Grey box
C : Black box
D : Combination of all
C : supported everywhere
A : Requirements Gathering
B : Test Planning
C : Test Closure
D : Test Design
A : Author
B : Moderator
C : Reviewer
D : Scribe
C : Coupling among the client will lessen the effect of data center architecture
Q.no 34. which of the following is the highest level in the reverse engineering process
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 298/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : testing level
B : abstraction level
C : design level
D : maintainence level
C : Incorporation of planning function that in effect results in runtime determination of the translation
Q.no 36. Webapp configuration object can be managed in much the same way as conventional
software configuration objects except for
A : content items
B : graphic items
C : functional items
D : user items
A : Developer’s end
B : User’s end
A : Object modules
B : Hardware modules
C : Functional modules
Q.no 39. What describes how a set of interacting components can share data?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 299/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : model-view-controller
B : repository pattern
C : architecture
A:PxC
B:PxM
C:MxC
D:PxS
A : Memory leaks
Q.no 42. Software tester focuses more on complex part of the software. Which of the following
testing principle implies this?
B : Pesticide paradox
D : Defect Clustering
Q.no 43. Which of the following pattern is the basis of interaction management in many web-
based systems?
A : model-view-controller
B : repository pattern
C : architecture
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 300/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
B : Component testing
D : Maintenance testing
A : code restructuring
B : back engineering
C : document engineerinhg
D : implementation engineering
Q.no 46. Which of the following is/are commonly used architectural pattern(s)?
A : Model-View-Controller
B : Layered Architecture
C : Client–server
Q.no 47. Which of the following is not an issue to consider when reverse engineering?
A : directionality
B : connectivity
C : completeness
D : abstraction level
A : Requirement Design
B : Requirement Elicitation
C : Requirement Analysis
D : Requirement Documentation
Q.no 51. Which model describes the static structure of the system using object classes and their
relationships?
A : Structural model
B : Dynamic model
C : Subsystem model
D : Sequence model
Q.no 52. Which of the following is not needed to develop a system design from concept to detailed
object-oriented design?
C : Specifying interfaces
A : Structural model
B : Dynamic model
C : Subsystem model
D : Sequence model
Q.no 54. What mechanism is used to apprise others of changes that are made?
A : Configuration management
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 302/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
B : Requirementss tracing
C : Reporting
D : Change control
Q.no 55. when SCM is a formal activity the software configuration audit is conducted by
A : testing specialists
B : development team
C : senior managers
Q.no 56. A __________ executes the loop task first, then tests a condition and repeats the task
until the condition fails.
A : repeat until
B : condition
C : do while tests
D : if then-else
Q.no 57. Which of the following is not a design principle that allow the user to maintain control?
D : Design for direct interaction with objects that appear on the screen
Q.no 58. The ability to identify which requirement generated any given work product is known
as
A : forward tracing
B : backward tracing
C : Dependency tracking
D : Change management
A : BS7925-2
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 303/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
B : IEEE 829
C : BS7925-1
D : IEEE 610
Q.no 60. which control helps to ensure that parallel changes, performed by two different people,
don’t overwrite one another.
A : version control
B : synchronization control
C : access control
D : configuration control
Q.no 1. The risks that are analyzed and managed should be derived from thorough study of
A : people,
product, process, and project.
B : people,
product, process, and management.
C : people,
product, process, and feedback.
D : people,
product, process, and environment.
A : Test Specification
B : Test Planning
C : Test Requirement
D : Test Configuration
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 304/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 5. Members of a Scrum team are not expected to answer which one of the following
questions during a daily Scrum meeting?
C : During a Sprint, customer feedback is continually obtained and the Sprint backlog is accordingly
modified
A : During testing
B : During execution
C : During review
D : Throughout life-cycle
Q.no 7. Consider the following partial requirement for a software: “A web browser should be
used as the front end.” It can be considered to be which one of the following types of
requirements?
A : Functional requirement
B : Non-functional requirement
C : Design constraint
D : External interface
A : Unit testing
B : Regression testing
C : Adhoc testing
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 305/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : Maintainability
B : Portability
C : Robustness
Q.no 10. Which design model is equivallent to set of detailed drawing for each room of a building
A : Architectural Design
C : Data design
D : Interface design
Q.no 11. A software process model represents which one of the following?
Q.no 12. Select the operating system which is not supported by Selenium IDE
A : Unix
B : Linux
C : Windows
D : Solaries
Q.no 13. Before handing over the software to the client, which testing is to be done in-house?
A : Alpha
B : Betta
C : Gamma
D : Theta
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 306/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : Quality risk
B : Performance risk
C : Cost risk
D : Support risk
A : Product
B : Process
C : Design
D : Testing
A : waitForTitle
B : waitForTextPresent
C : waitForActive
D : waitForAlert
Q.no 18. Which of the following is not part of the software reengineering process model?
A : reverse engineering
B : forward engineering
C : inventory analysis
D : prototyping
A : design model
B : user’s model
C : mental image
D : system image
Q.no 20. Which one of the following most accurately reflects agile software development?
A : Incremental development
B : Iterative development
C : Linear development
Q.no 21. Which of the following is not a Software Development Life Cycle Phase?
A : Requirements Gathering
B : Test Closure
C : Coding
D : Testing
Q.no 22. Which one of the following problems in the gathered requirements is not the focus of the
requirements analysis task?
A : Inconsistency
B : Ambiguity
C : Incompleteness
D : Unstructuredness
C : Alpha Testing
D : Beta testing
Q.no 24. Which one of the following activities spans all stages of a software development life cycle
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 308/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : Coding
B : Testing
C : Project management
D : Design
Q.no 25. Choose the incorrect statement with respect to Non-Functional Requirement(NFR)
B : Process-oriented Approach – Focus on how NFRs can be used in the design process
Q.no 26. Systems that involve interaction with a shared database can be considered as.
A : software-based
B : transaction-based
C : server-based
D : client-based
Q.no 28. What effect does achievement of quality attribute will have?
D : The achievement of quality attribute will have a positive as well as negative effect
Q.no 29. Software testing are most effective if applied immediately after
A : Requirement Specification
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 309/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
B : Design
C : Coding
D : Integration
Q.no 30. Which of the following is not a Software Configuration Management Activity?
B : Risk management
C : Release management
D : Branch management
Q.no 31. Regression testing is a major part of which of the life cycle?
A : Waterfall model
B : V model
C : Iterative model
D : Agile model
Q.no 33. The defect cluster change over time. Which of the following testing principle implies
this?
B : Pesticide paradox
D : Defect Clustering
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 310/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : Database Testing
B : Security Testing
C : Statement Testing
D : Functional Testing
Q.no 36. Which of the following risk is the failure of a purchased component to perform as
expected
A : Product risk
B : Business risk
C : Programming risk
D : Project risk
Q.no 37. Which of the following is not a software testing generic characteristics?
C : Testing and debugging are different activities, but debugging must be accommodated in any testing
strategy
Q.no 38. What are the criteria to decide the testing efforts?1. Time and budget
2. Size of development team
3. Size of testers
4. Risk associated with project
A : a. 1, 3, 4
B : b. 1, 2, 3
C : c. 1, 4
D : d. 1, 3
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 311/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 40. Test wares are handed over to maintenance team during which phase?
Q.no 41. A set of tools coupled within a file management system that enables access to and
management of each software configuration item is known as
A : component element
B : process element
C : construction element
D : human elements
Q.no 42. ______provide the mechanisms for assembling SCIs into a version-specific
configuration.
A : Repository
B : versioning
C : modeling
D : assembling
Q.no 43. Which architectural style goal is to achieve Modifiability with Reuse?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 312/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 44. What combines procedures and tools to manage different versions of configuration
objects that are created during the software process?
A : Versioning
B : Audit trails
C : Change control
D : SCI
Q.no 45. Which of the following is not real-time architectural patterns that are commonly used?
A : Asynchronous communication
C : Environmental Control
D : Process Pipeline
Q.no 46. The modification of the software to match changes in the ever changing environment,
falls under which category of software maintenance?
A : Adaptive
B : Corrective
C : perfective
D : preventive
Q.no 47. Which of the following is not a state of a defect in defect life cycle:
A : Verified
B : New
C : Critical
D : Deferred
B : Test Type
C : SDLC Model
D : Test Level
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 313/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : Big-bang
B : Bottom-up
C : Design based
D : Top-down
Q.no 50. Three statements are given below regarding the User Interface Design: 1) Place the user
in Control. 2) Reduce user's memory load. 3) Make the interface consistent. These rules are
called as __________.
A : Governed Rule
B : Golden Rule
C : User Rule
D : Thumb Rule
Q.no 51. A _________ is a graphical representation that depicts information flow and the
transforms that are applied as data moves from input to output.
C : Control specification
D : Activity diagram
Q.no 52. What combines the outward manifestation of the computer-based system , coupled with
all supporting information that describe system syntax and semantics?
A : design model
B : user’s model
C : mental image
D : system image
B : During designing
C : During coding
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 314/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
D : During testing
Q.no 55. What determines how information is stored in the repository, how data can be accessed
by tools and viewed by software engineers, how well data security and integrity can be
maintained, and how easily the existing model can be extended to accommodate new needs.
A : Data model
B : Meta model
C : Configuration model
D : Test model
Q.no 56. The order in which test levels are performed is:
Q.no 57. The __________ enables the software engineer to develop models of the information
domain and functional domain at the same time
C : Control specification
D : Activity diagram
Q.no 58. which of the following impact of the risk drivers on risk components is also called as
disastrous impact
A : critical impact
B : catastrophic impact
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 315/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : marginal impact
D : Destructive impact
Q.no 59. Which one of these belongs to integration testing in the OO context?
A : Unit testing
B : Regression testing
C : Sandwich testing
D : Thread-based testing
Q.no 60. Risk mitigation is a risk ___________activity. Risk monitoring is a ___________ activity
D : Random, Tracking.
Q.no 1. Method which selects the option which displays the text matching the parameter passed
to it
A : selectVisibleText()
B : selectByVisibleText()
C : select_VisibleText()
D : select_ByVisibleText()
A : Large
B : Small
C : Difficult to write
D : Difficult to test
Q.no 3. How many classification schemes have been developed for NFRs ?
A : Two
B : Three
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 316/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : Four
D : Five
A : Spiral model.
B : Waterfall model.
C : Prototyping model
D : Incremental Model.
Q.no 5. In case of Selenium IDE, the source view shows your script in
A : DHTML format
B : XML format
C : j2EE format
D : HTML format
A : Black box
B : White box
C : Grey box
D : Glass box
Q.no 7. Testing of software with actual data and in actual environment is known as?
A : Regression testing
B : Beta testing
C : Alpha testing
A : Product
B : Process
C : Design
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 317/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
D : Testing
D : Software design is an activity subjected to constraints specifies nature and composition of software
product which satisfies client needs and desires
Q.no 10. Select the command which is used to check the presence of a certain element
A : verifyTable
B : verifyTitlePresent
C : verifyTextPresent
D : verifyElementPresent
Q.no 11. Which of the following is not a design principle that allows the user to maintain control?
D : Design for direct interaction with objects that appear on the screen
Q.no 12. When a company plans to develop a generic product, who among the following is
usually the source of the requirements?
B : Project manager
C : Marketing personnel
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 318/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 14. Select the name which is not the type of locators
A : ID
B : Name
C : Password
D : Link Text
Q.no 15. What does “Every software system has an architecture” implies?
Q.no 17. Agile model advocates which one of the following approaches?
A : In each increment, get something “quick and dirty” delivered and thereby save time
C : In each increment, get something of business-value delivered as quickly as possible, consistent with
the right level of quality
D : In each increment, get something delivered once it has been fully documented and the
documentation has been signed off as complete
Q.no 18. Select the method which selects the option at the at the given index
A : selectByIndex()
B : selectIndex()
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 319/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : selectedByIndex()
D : selectByIndexes()
Q.no 19. Java packages and Fortran subroutine are examples of__________
A : Functions
B : Modules
C : Classes
D : Sub procedures
Q.no 20. In order to control cost, defects should ideally be detected in which phase:
A : Coding
B : Design
C : Implementation
D : Requirements Gathering
Q.no 21. Test cases are designed during which of the following stages?
A : Test recording
B : Test configuration
C : Test planning
D : Test specification
Q.no 22. The implementation phase of the waterfall model is a synonym for which one of the
following phases?
C : Maintenance phase
D : Design phase
Q.no 23. Consider the following requirement for a word processor software: " The software
should provide facility to import an existing image available as a jpeg file into the document
being created.". Which one of the following types of requirements is this?
A : Functional requirement
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 320/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
B : Non-functional requirement
D : Goal of implementation
A : Retesting
B : Sanity testing
D : Confirmation testing
Q.no 27. Which of the following pattern is the basis of interaction management in many web-
based systems?
A : model-view-controller
B : repository pattern
C : architecture
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 321/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : Incorporation of planning function that in effect results in runtime determination of the translation
A : Requirements Gathering
B : Test Planning
C : Test Closure
D : Test Design
Q.no 30. A set of tools that automate the construction of software by ensuring that the proper set
of validated components have been assembled are known as
A : component element
B : process element
C : construction element
D : human elements
Q.no 31. Which of the following is/are commonly used architectural pattern(s)?
A : Model-View-Controller
B : Layered Architecture
C : Client–server
Q.no 33. After occurence of the risk ,the developement team members do some rapid actions to
overcome the problem called as
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 322/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 34. What allows different projects to use the same source files at the same time?
A : Version Control
B : Access control
C : CM Process
A:PxC
B:PxM
C:MxC
D:PxS
Q.no 36. E-Commerce software testing follows different approach than gaming software testing.
Which testing principle implies this?
A : Pareto principle
D : Absence of errors-fallacy
C : cIncorporation of planning function that in effect results in runtime determination of the translation
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 323/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : product risk
B : project risk
C : business risk
D : management rsik
A : Developer’s end
B : User’s end
A : Requirement Design
B : Requirement Elicitation
C : Requirement Analysis
D : Requirement Documentation
Q.no 41. Which of the following testing method is normally used as acceptance test for a software
system?
A : Regression testing
B : Integration testing
C : Unit testing
D : Functional testing
A : White box
B : Grey box
C : Black box
D : Combination of all
Q.no 43. Which granularity level of testing checks the behavior of module cooperation?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 324/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : Unit Testing
B : Integration Testing
C : Acceptance Testing
D : Regression Testing
C : Coupling among the client will lessen the effect of data center architecture
C : supported everywhere
B : a make facility that enables you to collect all relevant configuration objects and construct a specific
version of the software.
C : If the central database is corrupted, the entire history remains safe and secured
Q.no 47. which of the following is the highest level in the reverse engineering process
A : testing level
B : abstraction level
C : design level
D : maintainence level
Q.no 48. Webapp configuration object can be managed in much the same way as conventional
software configuration objects except for
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 325/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : content items
B : graphic items
C : functional items
D : user items
C : Integration testing
D : Unit testing
Q.no 50. Which architectural style goal is to achieve Modifiability with Scalability?
Q.no 51. Which of the following is likely to benefit most from the use of test tools providing test
capture and replay facilities?
A : Integration testing
B : Regression testing
C : System testing
Q.no 52. The __________ contains a state transition diagram that is a sequential specification of
behavior.
C : Control specification
D : Activity diagram
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 326/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : Bottom up
B : Top down
C : Big-bang
D : Functional incrimination
Q.no 54. when SCM is a formal activity the software configuration audit is conducted by
A : testing specialists
B : development team
C : senior managers
Q.no 55. Which of the following type of maintenance takes the maximum chunk of the total
maintenance effort in a typical life cycle of a software product ?
A : Adaptive maintenance
B : Corrective maintenance
C : Preventive maintenance
D : Perfective maintenance
Q.no 56. which control helps to ensure that parallel changes, performed by two different people,
don’t overwrite one another.
A : version control
B : synchronization control
C : access control
D : configuration control
Q.no 57. A chronological record of relevant details about the execution of tests is called as, a
_______
A : Test suite
B : Test procedure
C : Test data
D : Test log
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 327/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 58. The main focus of ______ is to reduce defects and variations in the processes.
A : QA
B : QC
C : Six Sigma
D : tracking
Q.no 59. Which model describes the static structure of the system using object classes and their
relationships?
A : Structural model
B : Dynamic model
C : Subsystem model
D : Sequence model
Q.no 60. which of the following impact of the risk drivers on risk components is also called as
disastrous impact
A : critical impact
B : catastrophic impact
C : marginal impact
D : Destructive impact
C : Dynamic testing
D : Static testing
B : Solution mode
C : Uncertain mode
D : Perfect mode
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 328/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : FlexUISelenium
B : FlexUI
C : UIFlexSelenium
D : SeleniumFlex
D : Implements all requirements in the analysis model and provide a complete picture of the software
A : Test Specification
B : Test Planning
C : Test Requirement
D : Test Configuration
A : Mouse
B : keyboard
C : cpu
D : monitor
Q.no 9. Select the command which is used to compare the actual page title with an expected value
A : verifyTitle
B : verifiedTitle
C : verifyTitles
D : verifiedTitles
A : always possible
C : practically possible
Q.no 11. Select the method which performs a context-click at the curent mouse location
A : click_Context()
B : context.Click()
C : contextClick()
D : context_Click()
A : TestNextGeneration
B : TestNewGenerlization
C : TestNewGeneration
D : TestNextGenerations
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 330/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 13. What is the main technique for achieving portable software?
A : The main technique for achieving portable software is to isolate system dependency
B : The main technique for achieving portable software is to increase the overall performance
C : The main technique for achieving portable software is to have independent platform dependency
D : The main technique for achieving portable software is to have independent platform dependency
and to increase accuracy
A : design model
B : user’s model
C : mental image
D : system image
Q.no 15. Select the language which is supported by the Selenium Web driver
A : Perl
B : Sql
C : ASP
D : Cobol
A : Corrective maintainence
B : adaptive maintainence
C : perfective maintainence
D : predetermined maintainence
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 331/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
D:0
Q.no 19. Which of the following is not a part of a test design document?
A : Test Plan
D : Test Log
Q.no 20. Which component of Selenium can create customized test results ?
A : Web Driver
B : Selenium RC
C : Selenium IDE
D : Selenium Grid
Q.no 22. Which one of the following statements most accurately identifies the stakeholders in a
software development project?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 332/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 23. Which of the following is not a Software Development Life Cycle Phase?
A : Requirements Gathering
B : Test Closure
C : Coding
D : Testing
Q.no 24. Choose the incorrect statement with respect to Non-Functional Requirement(NFR)
B : Process-oriented Approach – Focus on how NFRs can be used in the design process
Q.no 25. A software requirements specification (SRS) document should avoid discussing which
one of the following?
A : Functional requirements
B : Non-functional requirements
C : Design specification
Q.no 27. What combines procedures and tools to manage different versions of configuration
objects that are created during the software process?
A : Versioning
B : Audit trails
C : Change control
D : SCI
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 333/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : Memory leaks
Q.no 29. Which of the following is not an issue to consider when reverse engineering?
A : directionality
B : connectivity
C : completeness
D : abstraction level
Q.no 30. A set of tools coupled within a file management system that enables access to and
management of each software configuration item is known as
A : component element
B : process element
C : construction element
D : human elements
Q.no 32. Software testing are most effective if applied immediately after
A : Requirement Specification
B : Design
C : Coding
D : Integration
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 334/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
B : Component testing
D : Maintenance testing
Q.no 35. ______provide the mechanisms for assembling SCIs into a version-specific
configuration.
A : Repository
B : versioning
C : modeling
D : assembling
Q.no 36. Software tester focuses more on complex part of the software. Which of the following
testing principle implies this?
B : Pesticide paradox
D : Defect Clustering
A : Author
B : Moderator
C : Reviewer
D : Scribe
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 335/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : code restructuring
B : back engineering
C : document engineerinhg
D : implementation engineering
Q.no 41. Which of the following is not a Software Configuration Management Activity?
B : Risk management
C : Release management
D : Branch management
Q.no 42. Which of the following is not a software testing generic characteristics?
C : Testing and debugging are different activities, but debugging must be accommodated in any testing
strategy
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 336/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 43. Regression testing is a major part of which of the life cycle?
A : Waterfall model
B : V model
C : Iterative model
D : Agile model
Q.no 44. which of the following risk is a potential threat to every software project
A : generic risk
B : project risk
C : product risk
D : business risk
Q.no 45. Which of the following is not a state of a defect in defect life cycle:
A : Verified
B : New
C : Critical
D : Deferred
Q.no 46. The modification of the software to match changes in the ever changing environment,
falls under which category of software maintenance?
A : Adaptive
B : Corrective
C : perfective
D : preventive
A : Database Testing
B : Security Testing
C : Statement Testing
D : Functional Testing
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 337/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 48. Which of the following is not real-time architectural patterns that are commonly used?
A : Asynchronous communication
C : Environmental Control
D : Process Pipeline
A : Object modules
B : Hardware modules
C : Functional modules
Q.no 52. Which of the following is likely to benefit most from the use of test tools providing test
capture and replay facilities?
A : Integration testing
B : Regression testing
C : System testing
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 338/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 53. The __________ enables the software engineer to develop models of the information
domain and functional domain at the same time
C : Control specification
D : Activity diagram
Q.no 54. The __________ contains a state transition diagram that is a sequential specification of
behavior.
C : Control specification
D : Activity diagram
Q.no 55. Which of the following is not a design principle that allow the user to maintain control?
D : Design for direct interaction with objects that appear on the screen
Q.no 56. The ability to identify which requirement generated any given work product is known
as
A : forward tracing
B : backward tracing
C : Dependency tracking
D : Change management
Q.no 57. Which one of these belongs to integration testing in the OO context?
A : Unit testing
B : Regression testing
C : Sandwich testing
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 339/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
D : Thread-based testing
Q.no 58. A _________ is a graphical representation that depicts information flow and the
transforms that are applied as data moves from input to output.
C : Control specification
D : Activity diagram
Q.no 59. Three factors that affect the consequences that are likely to happen if a risk does occur:
A : its nature,
its scope, and its intensity.
B : its nature,
its scope, and its timing.
C : its nature,
its scope, and its durability.
D : its nature,
its limit, and its timing.
Q.no 60. What combines the outward manifestation of the computer-based system , coupled with
all supporting information that describe system syntax and semantics?
A : design model
B : user’s model
C : mental image
D : system image
A : Quality risk
B : Performance risk
C : Cost risk
D : Support risk
A : Google Chrome
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 340/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
B : Opera Mini
C : Mozilla Firefox
D : Internet Explorer
Q.no 3. Which one of the following most accurately reflects agile software development?
A : Incremental development
B : Iterative development
C : Linear development
A : After installation
C : After programming
D : After designing
Q.no 5. Select the command which is used to pause execution until the page is loaded completely
A : waitForPageToLoad
B : waitForElementPresent
C : waitForPage
D : waitForLoad
Q.no 6. What are the benefits for component based product lines?
A : Being able to take faster advantage of new product and new technology
A : Task analysis
B : Scenario analysis
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 341/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : Form analysis
Q.no 8. Which one of the following may be experienced by a software development team when it
adopts a systematic development process model in preference to a build-and-fix style of
development?
C : Decreased maintainability
Q.no 9. Select the command which retrieves the alert message and stores it in a variable that you
will specify
A : storeAlert
B : storedAlert
C : store_Alert
D : storesAlert
Q.no 10. Method which selects the option which displays the text matching the parameter passed
to it
A : selectVisibleText()
B : selectByVisibleText()
C : select_VisibleText()
D : select_ByVisibleText()
A : object-oriented systems
B : architectural design
C : SRS
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 342/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : Coverage analysis
B : Code inspection
C : Usability assessment
D : Installation test
D : reference model mapped onto software components & data flow with comments
A : Software Developer
B : End users
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 343/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : Testing team
D : Systems engineers
Q.no 18. Consider the following partial description of the IIT security software. “A camera at the
main gate should detect an incoming vehicle, and the gate should be opened for registered
vehicles.” Which one of the following types of requirements is this?
A : Functional requirement
B : Non-Functional requirement
C : Design requirement
D : Design constraint
Q.no 19. The operation phase of the waterfall model is a synonym for which one of the
following phases?
C : Maintenance phase
D : Design phase
Q.no 20. Which one of the following is a requirement that fits in a developer’s module ?
A : Availability
B : Testability
C : Usability
D : Flexibility
Q.no 21. Select the method which clears all selected entries in Web Driver Selenium
A : dselectAll()
B : deselect_Al()
C : dselect_Al()
D : deselectAll()
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 344/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : Spiral model.
B : Waterfall model.
C : Prototyping model
D : Incremental Model.
Q.no 24. Agile model advocates which one of the following approaches?
A : In each increment, get something “quick and dirty” delivered and thereby save time
C : In each increment, get something of business-value delivered as quickly as possible, consistent with
the right level of quality
D : In each increment, get something delivered once it has been fully documented and the
documentation has been signed off as complete
A : Maintainability
B : Portability
C : Robustness
Q.no 26. The nature of Software Application can be characterized by their information
A : Determinacy
B : Content
C : Complexity
A : Requirements Gathering
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 345/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
B : Test Planning
C : Test Closure
D : Test Design
Q.no 28. In a simple risk table the risks are categorized into
A : PS, BU , CU
B : TU ,DE ,ST
C : BE ,CU ,ST
D : SU , TE ,CU ,PS
Q.no 29. Which of the following items would not come under Configuration Management?
A : Operating systems
B : Live data
C : Test documentation
C : Incorporation of planning function that in effect results in runtime determination of the translation
Q.no 31. Three statements are given below regarding the User Interface Design: 1) Place the user
in Control. 2) Reduce user's memory load. 3) Make the interface consistent. These rules are
called as __________.
A : Governed Rule
B : Golden Rule
C : User Rule
D : Thumb Rule
Q.no 32. which of the following is the highest level in the reverse engineering process
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 346/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : testing level
B : abstraction level
C : design level
D : maintainence level
Q.no 33. E-Commerce software testing follows different approach than gaming software testing.
Which testing principle implies this?
A : Pareto principle
D : Absence of errors-fallacy
Q.no 34. Systems that involve interaction with a shared database can be considered as.
A : software-based
B : transaction-based
C : server-based
D : client-based
A : Big-bang
B : Bottom-up
C : Design based
D : Top-down
Q.no 37. What are the criteria to decide the testing efforts?1. Time and budget
2. Size of development team
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 347/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
3. Size of testers
4. Risk associated with project
A : a. 1, 3, 4
B : b. 1, 2, 3
C : c. 1, 4
D : d. 1, 3
A:PxC
B:PxM
C:MxC
D:PxS
Q.no 39. What allows different projects to use the same source files at the same time?
A : Version Control
B : Access control
C : CM Process
Q.no 40. Which architectural style goal is to achieve Modifiability with Reuse?
C : Coupling among the client will lessen the effect of data center architecture
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 348/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 43. Which of the following risk is the failure of a purchased component to perform as
expected
A : Product risk
B : Business risk
C : Programming risk
D : Project risk
C : supported everywhere
A : Developer’s end
B : User’s end
A : Retesting
B : Sanity testing
D : Confirmation testing
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 349/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
B : Test Type
C : SDLC Model
D : Test Level
Q.no 48. The defect cluster change over time. Which of the following testing principle implies
this?
B : Pesticide paradox
D : Defect Clustering
Q.no 49. Which granularity level of testing checks the behavior of module cooperation?
A : Unit Testing
B : Integration Testing
C : Acceptance Testing
D : Regression Testing
C : cIncorporation of planning function that in effect results in runtime determination of the translation
B : During designing
C : During coding
D : During testing
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 350/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 52. What determines how information is stored in the repository, how data can be accessed
by tools and viewed by software engineers, how well data security and integrity can be
maintained, and how easily the existing model can be extended to accommodate new needs.
A : Data model
B : Meta model
C : Configuration model
D : Test model
A : Structural model
B : Dynamic model
C : Subsystem model
D : Sequence model
A : Bottom up
B : Top down
C : Big-bang
D : Functional incrimination
Q.no 55. The main focus of ______ is to reduce defects and variations in the processes.
A : QA
B : QC
C : Six Sigma
D : tracking
Q.no 56. Risk mitigation is a risk ___________activity. Risk monitoring is a ___________ activity
D : Random, Tracking.
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 351/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 57. Which of the following is not needed to develop a system design from concept to detailed
object-oriented design?
C : Specifying interfaces
Q.no 58. which control helps to ensure that parallel changes, performed by two different people,
don’t overwrite one another.
A : version control
B : synchronization control
C : access control
D : configuration control
Q.no 59. A __________ executes the loop task first, then tests a condition and repeats the task
until the condition fails.
A : repeat until
B : condition
C : do while tests
D : if then-else
Q.no 60. The order in which test levels are performed is:
Q.no 1. What incorporates data, architectural, interface, and procedural representations of the
software?
A : design model
B : user’s model
C : mental image
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 352/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
D : system image
A : Control Coupling
B : Stamp Coupling
C : Data Coupling
D : Content Coupling
Q.no 5. The importance of software design can be summarized in a single word which is:
A : Efficiency
B : Accuracy
C : Quality
D : Complexity
A : ASP
B : Java
C : C#
D : PHP
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 353/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : Unit testing
B : Regression testing
C : Adhoc testing
A : Large
B : Small
C : Difficult to write
D : Difficult to test
A : condition-transaction-consequence
B : condition-transfer-consequence
C : condition-transition-consequence
D : condition-transmission-consequence
Q.no 10. Select the command which is used to print a string value of a variable in Selenium IDE
Q.no 11. Testing of software with actual data and in actual environment is known as?
A : Regression testing
B : Beta testing
C : Alpha testing
Q.no 12. Which of the following model put much more emphasis on testing?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 354/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
A : waterfall model
B : agile model
C : spiral model
D : v-v model
Q.no 13. Which one of the following phases accounts for the maximum effort during development
of a typical software?
A : Coding
B : Testing
C : Designing
D : Specification
Q.no 14. Which of the following is not a user interface design process?
B : Interface design
D : Interface validation
Q.no 16. Select the operating system which is not supported by Selenium IDE
A : Unix
B : Linux
C : Windows
D : Solaries
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 355/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
D : Software design is an activity subjected to constraints specifies nature and composition of software
product which satisfies client needs and desires
Q.no 19. Which of the following is golden rule for interface design?
Q.no 20. Select the command in SeleniumIDE used to open a web page using theURL
A : OpenRecord
B : Open
C : OpenText
D : OpenTable
A : Customer
B : Investor
C : Developer
D : Project team
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 356/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 22. Which of these does not represent object oriented design?
C : Central model represents class diagrams that show the classes comprising a program and their
relationships to one another
Q.no 23. Which one of the following feedback paths is not present in an iterative waterfall
model?
A : Ad-hoc testing
B : Monkey testing
C : Fuzz testing
D : End-to-End testing
Q.no 25. Software risk always involves two characteristics. What are those characteristics?
Q.no 26. Which of the following testing method is normally used as acceptance test for a software
system?
A : Regression testing
B : Integration testing
C : Unit testing
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 357/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
D : Functional testing
A : Requirement Design
B : Requirement Elicitation
C : Requirement Analysis
D : Requirement Documentation
C : Incorporation of planning function that in effect results in runtime determination of the translation
A : code restructuring
B : back engineering
C : document engineerinhg
D : implementation engineering
Q.no 31. Regression testing is a major part of which of the life cycle?
A : Waterfall model
B : V model
C : Iterative model
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 358/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
D : Agile model
A : Memory leaks
Q.no 33. Software testing are most effective if applied immediately after
A : Requirement Specification
B : Design
C : Coding
D : Integration
Q.no 34. The modification of the software to match changes in the ever changing environment,
falls under which category of software maintenance?
A : Adaptive
B : Corrective
C : perfective
D : preventive
Q.no 35. which of the following risk is a potential threat to every software project
A : generic risk
B : project risk
C : product risk
D : business risk
C : Integration testing
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 359/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
D : Unit testing
Q.no 37. What describes how a set of interacting components can share data?
A : model-view-controller
B : repository pattern
C : architecture
A : Author
B : Moderator
C : Reviewer
D : Scribe
Q.no 40. Webapp configuration object can be managed in much the same way as conventional
software configuration objects except for
A : content items
B : graphic items
C : functional items
D : user items
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 360/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 42. Test wares are handed over to maintenance team during which phase?
Q.no 43. Which of the following is not real-time architectural patterns that are commonly used?
A : Asynchronous communication
C : Environmental Control
D : Process Pipeline
Q.no 44. Which of the following is not a Software Configuration Management Activity?
B : Risk management
C : Release management
D : Branch management
Q.no 45. After occurence of the risk ,the developement team members do some rapid actions to
overcome the problem called as
Q.no 46. Which architectural style goal is to achieve Modifiability with Scalability?
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 361/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
Q.no 47. Which of the following is not a state of a defect in defect life cycle:
A : Verified
B : New
C : Critical
D : Deferred
Q.no 48. Which of the following is not a software testing generic characteristics?
C : Testing and debugging are different activities, but debugging must be accommodated in any testing
strategy
B : a make facility that enables you to collect all relevant configuration objects and construct a specific
version of the software.
C : If the central database is corrupted, the entire history remains safe and secured
Q.no 51. Which one of these belongs to integration testing in the OO context?
A : Unit testing
B : Regression testing
C : Sandwich testing
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 362/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
D : Thread-based testing
A : BS7925-2
B : IEEE 829
C : BS7925-1
D : IEEE 610
Q.no 53. The __________ enables the software engineer to develop models of the information
domain and functional domain at the same time
C : Control specification
D : Activity diagram
Q.no 54. Which of the following is not a design principle that allow the user to maintain control?
D : Design for direct interaction with objects that appear on the screen
Q.no 55. Which model describes the static structure of the system using object classes and their
relationships?
A : Structural model
B : Dynamic model
C : Subsystem model
D : Sequence model
Q.no 56. which of the following impact of the risk drivers on risk components is also called as
disastrous impact
A : critical impact
B : catastrophic impact
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 363/364
12/25/2020 https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30
C : marginal impact
D : Destructive impact
Q.no 57. A chronological record of relevant details about the execution of tests is called as, a
_______
A : Test suite
B : Test procedure
C : Test data
D : Test log
Q.no 59. A _________ is a graphical representation that depicts information flow and the
transforms that are applied as data moves from input to output.
C : Control specification
D : Activity diagram
Q.no 60. Three factors that affect the consequences that are likely to happen if a risk does occur:
A : its nature,
its scope, and its intensity.
B : its nature,
its scope, and its timing.
C : its nature,
its scope, and its durability.
D : its nature,
its limit, and its timing.
https://sppu.wheebox.com/WAC-3/allqusdownloadhtml.ils?testNo=1213&code=1052000&showTest=319&actForm=edit&set=30 364/364