0

testing Online Quiz - 24

Description: testing Online Quiz - 24
Number of Questions: 20
Created by:
Tags: testing
Attempted 0/20 Correct 0 Score 0

Which of the following documents would NOT be used as requirements against which an auditor would conduct an evaluation of compliance and/or conformance?

  1. A tailored process

  2. A coding standard

  3. A requirements specification

  4. A quality record


Correct Option: D

Which of the following roles typically has final approval over what is included in the software requirements and the priorities of those requirements?

  1. Business analyst

  2. Customer

  3. Direct user

  4. Project manager


Correct Option: B

The completion of which of the following events is most likely to be designated as a project milestone?

  1. a critical activity

  2. a peer review

  3. a phase gate review

  4. a test case


Correct Option: C
  1. Phase containment

  2. Defect detection efficiency

  3. Test case execution cycle time

  4. Test case defect density


Correct Option: D
  1. 0, 10, and 30 characters in length.

  2. 4, 5, 25 and 26 characters in length.

  3. 5, 6, 24 and 25 characters in length.

  4. from 5 to 25 characters inclusively.


Correct Option: B

The role of a software configuration management change management tool would include:

  1. tracking the statuses of defect reports as they are worked to resolution.

  2. automating the software build processes and running automate test scripts.

  3. establishing, maintaining and managing the various configuration libraries.

  4. relating versions of configuration items to other items in the same baseline.


Correct Option: A

It is possible to copy data pools from one project to another.

  1. True

  2. False


Correct Option: A

Which Java method advances the data pool cursor to the next row in the data pool ?

  1. dpMoveCursor()

  2. dpNext()

  3. dpNextRow()

  4. dpMoveNext()


Correct Option: B
  1. inputKeys("ENTER") -> ENTER is a key stroke ; inputChars("ENTER") -> characters ENTER are read

  2. inputKeys("ENTER") -> characters ENTER are read ; inputChars("ENTER") -> ENTER is a key stroke

  3. None

  4. Both 1 and 2


Correct Option: A

What is the extension of data pool?

  1. .dp

  2. .rftdp

  3. .rftDP

  4. None


Correct Option: C

Rogers Applications that can be launched through SSO

  1. CIM and CSM

  2. CIM, SGI and CSM

  3. CIM, SGI, CSM and TOE Fido

  4. CIM, SGI, CSM and TOE Rogers


Correct Option: C
  1. Consumer and Business

  2. Consumer, Business - Cable and Business - Wireless

  3. Consumer - Cable, Consumer - Wireless and Business

  4. Consumer - Cable, Consumer - Wireless, Business - Cable and Business - Wireless


Correct Option: B
  1. Active and Inactive

  2. New, Active and Inactive

  3. New, Active, Inactive and Obsolete

  4. New, Active, Inactive, Obsolete and Closed


Correct Option: C
- Hide questions