SET - C-SEPM - FJ3 - Answerkey
SET - C-SEPM - FJ3 - Answerkey
Answer Key
1. Risk strategy that focuses on ________–– ________ preventive actions before the
risk occurs:
Answer: B) Proactive –– Taking actions early
Explanation: Proactive risk strategies involve anticipating and addressing risks
before they occur, unlike reactive strategies that respond after the risk manifests.
3. Match the activities with their relevance to Product Release Management. Which
matching is correct?
Correct Answer: A) A-1, B-2, C-3, D-4
Explanation: Product release management involves planning (1), testing (2),
versioning (3), and deployment (4), assuming the options align with these activities.
7. Deskchecks are used mainly for _______ –– _________ the correctness of logic
manually.
Answer: B) Verifying –– Ensuring
Explanation: Deskchecks involve manually reviewing code to verify and ensure the
correctness of logic, not automating or debugging.
11. How do coding frameworks naturally support consistency and reusability, and
where might their advantages become most visible?
Answer:
Coding frameworks (e.g., Django, Spring) provide predefined structures, libraries,
and conventions that enforce consistent coding practices across teams. They support
reusability through modular components, such as reusable libraries or templates,
reducing redundant code. Advantages are most visible in large-scale projects with
multiple developers, where frameworks streamline development, ensure uniform code
quality, and accelerate feature implementation (e.g., MVC architecture in web apps).
They also simplify maintenance by standardizing updates.
Key Points:
Consistency via standardized patterns.
Reusability through modules/libraries.
Visible in collaborative, scalable projects.
12. How do black-box and white-box testing differ, and what considerations guide
their use?
Answer:
Black-box testing focuses on testing functionality without knowledge of internal code,
using techniques like boundary value analysis or equivalence partitioning. White-box
testing examines internal logic paths, using techniques like statement or path
coverage. Black-box is ideal for validating user requirements, while white-box
ensures code correctness. Considerations include project stage (black-box for
acceptance, white-box for unit testing), tester expertise, and resource availability.
Key Points:
13. How might a company balance reactive and proactive risk strategies, and what
real-world examples highlight their strengths and weaknesses?
Answer:
Proactive strategies anticipate risks (e.g., regular security audits), while reactive
strategies address issues post-occurrence (e.g., patching after a breach). Balancing
involves prioritizing proactive measures for high-impact risks and maintaining
reactive plans for unforeseen issues. Example: Proactive antivirus updates prevent
malware (strength: prevention) but may miss new threats (weakness). Reactive
incident response after a data breach (strength: quick recovery) risks data loss
(weakness).
Key Points:
14. Your self-driving car project faces sensor failure risks—how does an RMMM
plan keep it on track?
Answer:
An RMMM (Risk Management, Mitigation, Monitoring) plan identifies sensor failure
risks, assesses their impact (e.g., safety hazards), and prioritizes them. Mitigation
includes redundant sensors or fault-tolerant algorithms. Monitoring involves real-time
diagnostics to detect failures. Management assigns roles, budgets, and timelines for
mitigation. Regular testing ensures reliability, keeping the project on track by
minimizing downtime and ensuring safety compliance.
Key Points:
Unit Testing: Test individual components (e.g., a function calculating interest rates)
in isolation using tools like JUnit. Developers write test cases to verify logic
correctness. Purpose: Ensure each module works as intended.
Integration Testing: Test interactions between modules (e.g., data transfer between
account management and transaction processing). Use top-down or bottom-up
approaches. Purpose: Verify modules work together without errors.
Validation Testing: Test the software against user requirements (e.g., ensuring the UI
allows secure fund transfers). Conducted via black-box techniques like user
acceptance testing. Purpose: Confirm the software meets user expectations.
System Testing: Test the entire system as a whole (e.g., end-to-end banking
workflows). Includes performance, security, and stress testing. Purpose: Ensure the
integrated system is reliable, secure, and functional.
Implementation: Use automated tools (e.g., Selenium for system testing) and manual
reviews, with test cases derived from requirements.
Key Points: Each level builds on the previous, ensuring comprehensive quality.
17. (OR) Scenario: A code walkthrough is conducted, and multiple logical issues are
identified. Explain the process, stakeholders, and how it differs from inspections
and deskchecks. Discuss how such reviews contribute to quality assurance.
Answer:
Walkthrough Process: The author presents the code to a small team, explaining logic
and functionality. Peers review for logical errors, inconsistencies, or improvements,
discussing issues informally. Issues are documented for fixes.
Stakeholders: Author, peer developers, and sometimes a moderator or tester.
Differences:
o Inspections: Formal, structured reviews with predefined roles (e.g., inspector)
and checklists, focusing on defect detection.
o Deskchecks: Individual, manual code review by the author or a single
reviewer, without group discussion.
o Walkthroughs: Informal, collaborative, and author-led, emphasizing
understanding and feedback.
Quality Assurance Contribution: Walkthroughs catch logical errors early, improve
code clarity, and foster team knowledge sharing. They reduce defects before testing,
saving time and costs.
Key Points: Informal, collaborative reviews enhance code quality and team synergy.
Challenges: