100% found this document useful (1 vote)
1K views15 pages

SOFTWARE FUNDAMENTALS - Quiz - QA

Uploaded by

2005 DEVI.T
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
1K views15 pages

SOFTWARE FUNDAMENTALS - Quiz - QA

Uploaded by

2005 DEVI.T
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 15

SOFTWARE FUNDAMENTALS

1. Match the symbols and flowchart to its appropriate functionality


Parallelogram → Input/output, Diamond → Decision making, Rectangle → Process
2. Stephany is learning to draw a flowchart to calculate the area of a circle. Select the appropriate option that would fit into the
process section of the flow chart? Area=3.14*radius*radius
Any process/action involved in a problem would fit into the process section of a flowchart and should be denoted by the rectangle
symbol. Calculation of area is the process involved in the above problem
3. Which of the following represents the correct sequence for the given algorithm?
Start
Get the two numbers.
Add the two numbers and store the result in sum.
Display the sum value.
Stop
4. Select arrangement of mathematical symbols to make the equation true. 600 [×] 400 [/] 800 [-] 300 [+] 200 = 200
5. Examine the correct logic with their descriptions
BEGIN
DECLARE mark1, mark2, mark3, average
READ mark1, mark2, mark3
average <- (mark1+mark2+mark3)/3
PRINT average
END
→ finding the average mark of three subjects,
BEGIN
DECLARE principal, number_of_years, rate_of_interest,result
READ principal, number_of_years, rate_of_interest
result <---(principal* number_of_years*, rate_of_interest)/100
PRINT result
END
→ calculating simple interest problem,
BEGIN
DECLARE radius,circumference
READ radius
circumference <---- 2*3.14*radius
PRINT circumference
END
→ calculating the perimeter of a circle
6. Arrange the words given below in a meaningful sequence. 1. Word 2. Paragraph 3. Sentence 4. Letters 5. phrase
One should first know letters to make a word, then a phrase, then a sentence and finally a paragraph 4,1,5,3,2
7. Identify the meaningful variable names which can be used? $register_number, user1
Variable names should not start with a number, should not have spaces in between, should not start with symbols except
dollar( $ ) and underscore( _ )
8. Choose the correct and meaningful pseudo-code to add two numbers?
Usage of proper indentation, meaningful variable names, and correct logic makes the pseudo-code effective
BEGIN
DECLARE number1,number2,sum
READ number1,number2
sum<----number1+number2
PRINT sum
END
9. Rearrange the pseudo-code for multiplying two given numbers, Choose the correct option from the below. 154236
1 BEGIN
2 result <- number1 * number2
3 PRINT result
4 READ number 1 and number 2
5 DECLARE variables – number1, number2, result
6 END
10. Flow chart for adding numbers. Is the given flowchart correct? The symbol for reading input from the user is incorrect

Input/output process like reading values, getting input from the user is denoted by parallelogram symbol
11. combination of ___________, ____________ and _______________ variables, constants, operators
Expression is a combination of operands and operators. This operand can be a variable or a constant
12. An algorithm described in the form of programming language is Pseudo code
13. Match the appropriate Flowchart symbols with its purpose.
→ Flow direction, → Input/output, → Process, → Start/Stop, → Connector, → Decision making
14. Which of the following represents the correct sequence for the given pseudo-code? 51342
BEGIN
[1] READ mark1, mark2, mark3, mark4, mark5
[2] PRINT average
[3] total < mark1 + mark2 + mark3 + mark4 + mark5
[4] average < total / 5
[5] DECLARE mark1, mark2, mark3, mark4, mark5, total, average
END
15. Which of the following represents the correct sequence for the given pseudo-code?
BEGIN
DECLARE variables – number1, number2, result
READ number1 and number2
result <- number1 * number2
PRINT result
END
16. Identify the logic which suits the flowchart Else-if Ladder
17. Which of the following is not a keyword used in a pseudo-code Start
18. Consider the pseudo-code snippet. What output do you think the snippet will produce if the sample input for number is 3?
BEGIN
DECLARE number
READ number
IF number>=0
IF number == 0
PRINT “Zero”
ELSE
PRINT “Three”
ENDIF
PRINT “No Value”
END
In first if condition, 3 is greater than or equal to 0, so execution progresses to the second if statement. The second if statement's
test fails because 3 is not equal to 0. Thus, the else clause attached to the second if statement is executed. So, “Three” is
displayed. The final PRINT statement is completely outside of any if statement, so it always gets executed, and thus “No value” is
displayed
Three
No value
19. Choose the correct options to complete the pseudo-code and determine whether the number is positive, zero, or negative.
BEGIN
DECLARE number
READ number
IF number>0
PRINT “Number is positive”
IF number==0
PRINT “Number is zero”
IF number<0
PRINT “Number is Negative”
END IF
END
20. Which of the keyword is used to close the IF block, while writing a pseudo-code? End if
21. Identify the correct pseudo-code logic for checking a number divisible by 5 or 11.
BEGIN
DECLARE number
READ number
IF number%5==0
THEN
PRINT “number divisible by 5”
ELSE IF number%11==0
THEN
PRINT “number divisible by 11”
ELSE
PRINT “number not divisible by 5 or 11”
END IF
END
22. By default, the flow of a program is________ top to bottom
23. Go to statements in the algorithm is… Used to alternate the (control) flow of the program
24. If a doctor gives you 3 pills and tells you to take one pill every half hour, how long would it take before all the pills had been
taken? 1 hour, one pill is taken at the beginning of an hour, second after half an hour, remaining at the end of the hour
25. What do you infer from this statement? “Only if Alvin is happy, then he does not go to work.”
Alvin is not happy and he goes to work.
26. The given pseudo-code snippet is an example for_______Simple If logic
READ age
IF age>18
THEN
PRINT “Eligible to vote”
END IF
27. Decision statements are also called as _______________.Selection logic
28. Manual execution of the steps in the algorithm is called as _____Dry run
29. You are returning home from a hotel. On the way, you find a sealed envelope in a street, fully addressed with unused stamps
on it. What would you do??? post it at the nearest mail box.
30. A computer program must either use conditional statements or looping statements or sequential statements to solve a
problem. All of them must not appear in the same program. State true/ false. 'False'.
Program’s flow could have sequential statements, selection statements or Looping statements or combination of all.
31. If there are 6 chocolates and you take away 4, how many do you have? 4 The chocolates which you took
32. From the option, find the correct pseudo-code to find the greatest of three numbers
Nested if Logic with proper indentation
BEGIN
DECLARE variables a,b,c
READ a,b,c
IF a>b
IF a>c
PRINT “a”
ELSE
PRINT “c”
ELSE IF b>c
PRINT “b”
ELSE
PRINT “c”
END
33. Arrange the pseudo-code logic for checking a number divisible by 5 or 11.
BEGIN
DECLARE number
READ number
IF number%5==0
THEN
PRINT “number divisible by 5”
ELSE IF number%11==0
THEN
PRINT “number divisible by 11”
ELSE
PRINT ““number not divisible by 5 or 11”
END IF
END
34. Which statement logic implements multiple-way selection? Else if ladder
else if ladder statements are multiple-way branching statements. It decides the execution among several alternatives
35. selection statements_must be used when a set of statements needs to be executed only if a condition is met.
36. When a single if-else logic is used, how many possible choices can be there? 2 Either if part, or else part
37. Select the appropriate code for the given problem statement provided as pseudocode. Problem Statement : Strong number .
Check if a given number is a strong number. 145 is a strong number because 1!+4!+5! = 145.
Sample Input : 145 Sample Output : Strong number Code:
BEGIN
DECLARE variables number, sum, temp, remainder, fact
READ number
SET sum=0, temp=number
WHILE number != 0
remainder = number % 10
SET fact = 1
FOR i IN 1 to remainder DO
fact = fact *i
END FOR
sum = sum+ fact
number = number / 10
END WHILE
IF sum==temp THEN
PRINT "Strong number"
ELSE
PRINT "Not a Strong number"
END IF
END
38. Choose the pseudocode for the below problem statement.
Problem Statement : Vehicle Registration Mr.William buys a new Audi car. During the vehicle registration, he desires a fancy
number in such a way that both the number and its reverse are the same. Generate an algorithm to find that fancy number.
Sample Input : 1221 Sample Output : Number is Fancy
BEGIN
DECLARE variables number, reverse, rem, temp
READ number
SET reverse = 0, temp = number
WHILE number !=0 DO
rem = number%10
reverse = reverse*10 + rem
number = number/10
END WHILE
IF temp == reverse THEN
PRINT "Number is Fancy"
ELSE
PRINT "Number is Not Fancy"
END IF
END
39. Match the appropriate opening and closing blocks in looping statements.
BEGIN → END, WHILE → END WHILE, FOR → END FOR, IF → END IF
40. Which looping logic is exit controlled? do-while loop
Do-while loop logic executes the statements at least once, and finally checks for the condition to be evaluated
41. Which of the following statement should be inserted to complete the above pseudo code for finding factorial of 5 numbers.
The logic for finding a factorial is factorial * index
BEGIN
DECLARE variables i, factorial
SET factorial <-- 1
FOR i<--1 to 5 do
factorial <--factorial * i
i <-- i+1
END FOR
PRINT factorial
END
42. Which of the following statement should be inserted to complete the above pseudo code for finding factorial of 5 numbers.
Consider the output: “0, 2, 4, 6, 8 ,10 ,12, 16”. Which of the below given pseudo code snippet gives the above output?
BEGIN
DECLARE number, count, even
SET count <-- 8, number <-- 0, even <-- 0
WHILE number<count
PRINT even
SET even <-- even + 2
number <-- number + 1
END WHILE
PRINT even
END
43. Iteration/looping is a repetition of___________ single statement, Block of statements
Looping block can have a single statement or block of statements
44. Do-while looping statement is almost same as______ While loop
45. What is true about FOR LOOP? In for loop, the exact number of iterations is known
In for loop, the exact number of iterations is known and it is entry controlled. For loop can be nested
46. Jack wants to book flight tickets in Feather-Airways’ online portal for his family of five. Passenger details like name, age,
gender etc. should be entered for each member. The same process of getting details continues for all the five members. The
above scenario is a good example for which looping statements? For loop
When the exact number of iterations is known, For loop can be used
47. Predict the output of the given flowchart.

The answer is 1, 2. Print statement is executed first, and prints count as 1. Count is incremented to 1 and the condition will be
checked. When it becomes false, the final count value 2 gets printed
48. What will be the output for WHILE loop? . -2
BEGIN
DECLARE number
SET number <-- 30
WHILE number>0
number <-- number-4
END WHILE
PRINT number
END
49. What is the output for FOR-loop snippet? 1 4 7 10 13 Value gets incremented by 3, until the number is less than 15
FOR i <--1 to 15
PRINT i
i <-- i+3
END FOR
50. Which of the following symbols is inappropriate in building the flowchart pertaining to sequential flow of program?
In a sequential Flow of a program, Decision making symbol is irrelevant diamond
51. The statement / statements within the loop must get executed at least once except for do-while statement. 'False'.
Looping statements except do-while are entry-controlled that is only if the condition is met it allows the block to execute. Whereas
do-while executes the statement at least once before checking the condition
52. Which of the following statements are true with respect to looping statements? initial condition must be applied before
the loop begins to execute, the condition under which the iterative process should get terminated must be given
53. Which of the following statements are true?
The operand in an expression can be a variable or a constant. Operator without operand is meaningless
An operand is a mandatory element in an expression., The operand in an expression can be a variable or a constant.
54. Consider you have a Rubik cube with different colors in each face. To solve this cube, you will continue to rotate the sides
until you reach same colors in all faces. This is a real time example for which looping statements? While
In Rubik cube, you first check for the colours in all sides. If the colours are not the same, the cube is rotated until it attains same
colours in all faces
55. CrossWord Puzzle
1) Step by step list of instructions
4) When you know the exact number of iterations, this loop is used
2)When a process/set of actions is to be repeated, these statements are used.
3) In looping, Each execution of a statement/block of statements is technically termed as______
5) This loop statement is also called as exit-controlled loop
56. Identify the logic which suits the flowchart? While loop
While loop checks for the condition first. Only if it is true, it enters the block. The statements gets repeated until the condition
becomes false.
57. It's Halloween. You go from house to house, tricking or treating. You get 2 candies from each house that you go to. You
must return home once you collect 100 candies. Can you arrange the sequence for this loop activity. 1 4 2 5 6 3 7
1 BEGIN
2 SET candy count <- 0
3 END WHILE
4 DECLARE candy_count
5 WHILE candy_count<=100
6 candy count <- candy_count+2
7 END
58. Looping statements are also called ____________Iteration logic
59. Select the appropriate code snippet for the given problem statement provided as pseudocode.
Problem Statement : Dinner Plan Five friends plan to go out for dinner. They plan to order equal number of dishes.
Each row specifies individual cost. Find the total amount each person needs to pay.
Assume the values for this matrix for 3 dishes are
12 23 18
45 32 60
42 39 23
54 42 60
25 84 30
The output will be
Amount to be paid by person 1 is 53
Amount to be paid by person 2 is 137
Amount to be paid by person 3 is 104
Amount to be paid by person 4 is 156
Amount to be paid by person 3 is 139
Explanation : Output is the sum of each row
Code:
BEGIN
DECLARE variable arr[5][20], n, sum=0
FOR i IN 0 to 4 DO
FOR j IN 0 to n-1 DO
READ arr[i][j]
END FOR
END FOR
FOR i IN 0 TO 4 DO
SET sum = 0
FOR j IN 0 TO n-1 DO
sum = sum + arr[i][j]
END FOR
PRINT "Amount to be paid by person "+(i+1)+" is "+sum
END FOR
END
60. Problem Statement : Find Maximum value
Choose a pseudo code to find the maximum values in each row of a matrix. Assume it is a 3x3 matrix.
Explanation : Matrix will be with index
(0,0) (0,1) (0,2)
(1,0) (1,1) (1,2)
(2,0) (2,1) (2,2)
Assume the values for this matrix are
12 23 18
45 32 60
42 39 23
The output will be
Max value in row 1 is 23
Max value in row 2 is 60
Max value in row 3 is 42
BEGIN
DECLARE variable arr[3][3]
FOR i IN 0 to 2 DO
FOR j IN 0 to 2 DO
READ arr[i][j]
END FOR
END FOR
FOR i IN 0 TO 2 DO
SET max = arr[i][0]
FOR j IN 0 TO 2 DO
IF arr[i][j]>max THEN
max = arr[i][j]
END IF
END FOR
PRINT "Max value in row "+(i+1)+" is "+max
END FOR
END
61. A mathematical quiz context happened in a school and the scores are stored in an array named quizmark. The coordinating
person wants to copy the quiz score into another array named copyquizmark. Which of these options will do that?
Using for loop helps to copy the elements from one array to another array
FOR index <- 0 to n
copyquizmark[index] <- quizmark[index]
index <- index+1
END FOR
62. Assume, number[100] <- 99. How many elements can be stored inside the array variable number?
From the given statement, it is predictable that number 99 is assigned to 101 th position of the array. But, there is no clue about
the total size of the array and the number of elements that can be stored
The statement gives no clue about the number of elements that can be stored
63. Map the scenario to its appropriate array type
Matrix multiplication 2D ARRAY
To create a list of all prime numbers below 100 1D ARRAY
64. Which of the following are False with respect to the manipulation of arrays?
An array can store homogeneous data. Elements of array are stored in contiguous locations and it is not possible to increase the
array size It is possible to increase the size of the array , An array can store heterogeneous data
65. Negative elements can be placed inside an array. State true / false True
Size of the array cannot be negative. But the elements stored inside an array can be negative
66. The names of all associates undergoing training are stored in an array named associate_name[50]. The 5th associates’ name
is retrieved as associate_name[4], associate_name[3+1]
since array index starts from 0, the fifth element is accessed is accessed by array[4]. It is possible to perform arithmetic operation
in an array position
67. Information about the elements to be stored in the array need not be specified when declaring an array
It is not mandatory to specify the elements to be stored in the array when declaring an array
68. It is not possible to do a search operation in an array that is not sorted. State True/False. False
It is not mandatory to sort an array when searching an element randomly. It can be either sorted or unsorted
69. The operation of ordering the elements in the list is known as Sorting Sorting is the process of ordering the elements
70. Random access is not possible in an array. State True/False False
Elements in an array is stored sequentially and contiguously, and can be accessed in a random manner.
71. Index is used to locate an element in an array.
72. Assume you have an array named numbers of size 10. Which of the assignment is valid?numbers[0] <- 10, numbers[9] <- 5
array index starts from 0 to 9, for 10 elements. Assigning values to numbers[10],numbers[11] is not valid, since the index exceeds
the size of array resulting in unpredictable results
73. Which of the following statements is correct with respect to arrays? Elements in an array are arranged contiguously.
Elements in an array are arranged in a contiguous manner and are of fixed size
74. Expression within [ ] should always resolve to a positive number
Array size or index value is given inside square braces and should be a positive integer value
75. Consider you buy a laptop. You want to store the details of that laptop such as price, model_name,model_number,
warranty_period into a single array named details[10]. Is ths possible? No
No, It is not possible. An array can store data of same type. since model_name consists of letters, model_no consists of number
etc, it is not possible to the details into a single array
76. List of songs stored in your mobile phone is a good example for single-dimensional arrays
one-d array is enough to store the list of songs in mobile phones.
77. Consider you want to compare the prices of redmi , sony, samsung phones in three online sites like amazon,flipkart,ebay.
Which array type is best suitable to do this comparision? two-dimensional arrays
To compare 3 mobile phones in 3 different online sites, 2-d arrays can be used.
78. It is possible to traverse through an array from the first position to the last and not vice versa. False
an Array can be traversed from first to last and vice versa
79. An Array consists of rows and columns is also called as________ Two-dimensional array
80. Choose the correct Pseudo code to store names in an array and display a name.
BEGIN
DECLARE name [20]
INPUT name
PRINT name
END
81. ABC company comes to the Allen Software Company with various requirement. The client wants the functionality to view
all the employee profile, view salary information of the employee and view the leave details.Once each functionality is
completed the module will be delivered to the client. Which would be the right model for this scenario. Incremental model
82. A client wants to develop a Web application for the new Super market store. The client want to have lot of UI components
and customers will have lot of interactions with the UI. What model is best suited Prototype
83. Software development process involves tranformation of user needs into an effective software solution.
84. Spiral life cycle model is not suitable for products that are vulnerable to large number of risks. FALSE
85. When there is a difference between the output what is expected and the actual one is termed as…… Defect
86. XYZ Finance Co. has, at present, started its operations in India. Based on the first six months performance, it has plans for
expansion across five countries. They want to automate their operations at this stage. What is the process model that the
developer should choose to adopt? Evolutionary prototyping model
87. Scenario: LIC has manually carried out their process of premium collection procedure for the past 45 years. Now, they have
employed the services of another company to automate the above.
Question: Which of the following models would you suggest to the outsource company? Waterfall model
88. Consider that you have to develop a flight control system. The system is simulated as such that the original system is
working. There are many potential hazards with such a system. What model is suitable? Spiral model
89. Match the correct E,T,V,X (Entry,Task,Verify,Exit) criteria for the below scenario
Developing HLD and LLD Artifacts → Task, Reviewed design document → Exit,
Input containing the reviewed SRS → Entry, Review of the artifacts → Verfication
90. Testing performed by the user to ensure that the system meets the agreed upon quality attributes and the specification is
called as…. Acceptance testing
91. Choose the option that accurately represents the sequential order of phases in the Waterfall model.
Requirement Gathering, Analysis, Design, Implementation, Testing, Deployment, Maintenance
92. Which model emphasizes Validation and Verification at each level of stage containment? V-Model
93. Which conforms that the software meets its technical specifications?. Verification
94. The software is put into operation in the client’s environment. The client comes back to enhance the UI to attract more
customers. This phase is called as _______________Maintenance
Any change that is made to the software after it is deployed is known as maintenance
95. Match the appropriate usage of the SDLC process models, based on the nature of requirements
When the requirements are unclear → Use the Throw away prototype,
When the requirements are unstable → Use the Evolutionary prototype
96. Which of the below is one of the phase of the prototype model? Quick design
97. Match the phases of the Rapid Application Development model against their objectives.
Data modeling → Information gathered from business modeling is used to define data objects,
Process modeling → Data objects are converted to achieve the business objective,
Testing and turnover → New components along with all the interfaces are tested,
Business modeling → The information flow is identified between various modules,
Application generation → Automated tools are used to convert process models into the actual system
98. High-risk or major functions are addressed in the first cycles there by delivering an operational product. Which of the SDLC
process models achieves this? Incremental model
High-risk or major functions are addressed in the first increment cycles and each release delivers an operational product
99. Beta technologies has undertaken a collision avoidance system software to be implemented for airports. Additional safety
measures have to be automated by warning pilots when another aircraft gets closer, otherwise impacts are huge. Which of
the following SDLC process models best suits the requirement? Spiral model
Spiral model is used when risks perceived is high
100. The student mark processing system software has been developed and deployed at the St. Peters university. The system
shows the grade as 0 for all the students rather than the actual grade. Which phase below was not done properly during the
SDLC? Software Testing Testing is done on the software product developed to find defects.
101. Aesthetics of the website is part of the functional requirement. State true or false FALSE
102. _______ describes how the development activities will be performed and how development phases follow each other.
Software Development Process
103. _________ is the application of a systematic, disciplined, quantifiable approach to the design, development, operation and
maintenance of software. Software Engineering
104. During which phase the following activities are performed: Identifying the major modules of the system, how these modules
integrate, the architecture of the system and describing pseudo code for each of the identified module Design
Identifying the major modules of the system, how these modules integrate, the architecture of the system and describing pseudo
code for each of the identified module are performed during the design phase
105. Requirement came to Allen Software company to develop a software for military purpose. .00001 second delay in the
missile launching software would create greater loss to the human life. What kind of model is best suited for this scenario?
Spiral model is used for high risk projects Spiral model
106. Which of the following are available in SRS Document?
Functional Requirements, Non Functional Requirements, Constraints
107. Choose the correct type of testing for the given Scenario
Testing that ensures software systems and applications are free from any vulnerabilities, or risks - Security Testing
Determining how the application behaves when multiple users access it simultaneously - Load Testing
Testing to determine user's ease to use the application, and its flexibility - Usability Testing
Determining the responsiveness and stability of the system - Performance Testing
Testing to test the GUI components in the screen → Usability Testing,
Testing to check if 1000000 users accessing website at the same point of time → Load Testing,
Testing to check if the card is swiped for more than three times with wrong pin, the card has to be blocked → Security Testing,
Testing to check if the report is generated within 5 sec on click of the button as agreed in the SRS → Performance Testing
108. Whenever a new product is arrived, the stock needs to be updated. This requirement is an example for non functional
requirement. FALSE
109. Identify the possible entities from the given option Customer, Sale
110. What kind of non functional requirement best suit the below scenario: Whenever the new offers are published in the online
shopping site, an sms has to be sent to all the registered customers within 10 minutes of publishing
Performance Requirement
111. Consider the below scenario. A team has many players and the player belongs to one team. Identify the cardinality between
player and team M:1
112. Which of the following options are the steps involved in Requirements Analysis?
Requirements Gathering, Analysis of the gathered requirements
113. From the below options, identify the role of the system analyst. Creates SRS
114. Identify the correct statements from the below options.
Analysis is performed followed by High level design and then Low level design
115. Match the correct objectives of each phase involved in Requirements Engineering
Requirements Elicitation → Gathering requirements from the users, customers and other stake holders, Requirements
Analysis → Analyzing the customer and the user/stakeholder to arrive at a definition of software requirements,
Requirements Specification → Documents all the requirements properly in SRS
116. Identify the type of design that helps in transforming the data model created during requirements analysis phase into the data
structures that will be used to implement the software Data Design
Data Design helps in creating the data architecture for a system to represent the data components
117. Match the objectives of the types of design involved
Interface design → Describes how the software communicates with itself, and with the users interacting with the software,
Low Level Design → Focuses on writing a detailed algorithm,
Architecture design → Defines the modules of the system and the functions that each module perform
118. The standard document that describes all the requirements of the system is called as Software Requirement Specification
119. A good SRS should be ______, ________ and _______.. Traceable, Consistent, Complete
120. An SRS has the following requirement.The stock exchange shall show the stock report for the next 24 hours.What is the
issue with this requirement Ambiguous
121. Client Comes to Allen Company for a Banking Solution. Who from the below options would be best suited to gather all the
requirements correctly from the client System analyst
122. In remote control Car application, in the step by step execution of the requirement described, it is mentioned when the fuel
level goes below the minimum level, the application should indicate the user in red color. In the output section of the same
process it is mentioned that the indicator will glow pink. What is the kind of requirement specified in SRS? Contradicting
123. Client Comes to Allen Company for a Banking Solution.Which phase of SDLC is best suited to gather what is expected from
client Requirement analysis
124. Boundary value analysis can only be used during white-box testing. State if True or False. FALSE
125. The testing technique that deals with the internal logic and structure of the code is called ________.WhiteBox Testing
126. Walk through is performed by the trained moderator, whereas the Inspection is usually conducted by the author itself to
record defects and deviations FALSE
Walk through is conducted by the author itself and the Inspection is led by a trained moderator
127. Tester is trying to test whether the values in the drop down are listed properly. What type of testing the tester performs in this
scenario? Black box testing
In Black box testing functionality of the software is tested and not the internal implementation of the code
128. After implementation of Library management system, the tester identified that certain logic are redundantly rewritten by the
developers, and the coding standards are violated in few modules. What type of testing is carried out to identify these errors?
Static Testing is a software testing method where the code of the software and the work products, that is, the associated
documents are observed and tested manually to find errors Static Testing
129. Determine the cyclomatic complexity for the following code: 4
Accept year
if(year mod 4=0 and year mod 100!=0) or(year mod 400 =0)
print year is leap
else
print year is not leap
end if.
The cyclomatic complexity for the given code is 4
130. In the online shopping portal, for customer registration the password field can accept only characters in the range of 5 to 25.
Derive test cases using Boundary value analysis 5,25,4,26
131. Identify this technique of dynamic testing where, For a range of input, three values are chosen, One value above the
range, One value below the range, and One value within the range Equivalence partitioning
Equivalence class partitioning divides the input domain into classes of data from which test cases can be derived
132. What is the difference between the actual output of a software and the correct output? Error
133. Match the objectives of the phases of Software Testing Life Cycle
Test Design → Test scenarios, test cases, test data, and test scripts are prepared,
Test Plan → Resource allocation, creation of test environment, test schedule and test functionality,
Test Execution → Executing test scripts and Finding bugs
134. Match the roles involved in Static Testing
Scribe → Records each defect found, Inspector → Inspecting the document, Reader → Presents the document, Author
→ Writer of the ‘document under review’, Moderator → Leads the review process
135. What is the type of testing in which the tester will know about the input and the expected output details based on the
specification document only but no knowledge on implementation? Black Box Testing
In Black box testing functionality of the software is tested without the knowledge of the internal implementation of the code
136. Identify the correct phases of software testing life cycle.
Requirements Analysis,Test Preparation,Test Case development,Test Environment Set up,Test Execution,Test Cycle
closure
137. Match the objectives against the techniques of generating test cases in black box testing
Cause Effect Analysis - It is suitable for applications in which combinations of input conditions are few
Cause Effect Graphing - The causes and effects represent the nodes
State Transition Diagram - involves actions as one of its components
138. Which all of the following options would basis path testing perform?
Every statement(Statement coverage)
Every predicate (condition) in the code(branch coverage)
Loops (loop coverage)
Statement Coverage, Condition or Branch Coverage, Loop Coverage
139. In an online shopping application, during customer registration the customer was made to enter his city in a text box. As the
site became popular for online shopping, the client came back to include autocomplete feature in the city field to improve
user friendliness. What maintenance needs to be carried out in this scenario? Perfective
140. In Software maintenance, changes are implemented by modifying existing components and adding new components to the
system. TRUE
In maintenance, changes are implemented by modifying existing components and adding new components to the system
141. Software maintenance for the change of the platform is an example for --------- maintenance Adaptive
Adaptive maintenance involves adapting the software to changes in the working environment or platform
142. Y2K problem is an example for ------------- maintenance Preventive
Preventive maintenance is the changes made to the system to prevent occurrence of errors in future
143. Client wanted to add a new feature to his existing application "Discount Offers" for all the existing customers. Whenever a
new product comes to the supermarket, their customer's should be intimated with the week day offer. What kind of
maintenance is this? Perfective Maintanence
Perfective maintenance involves making functional enhancements to the system
144. Client has developed an application that allows each of their customers to store 2TB of data. As the number of Customers are
increasing client feels the storage space has to be increased for smooth operations to its customers. What type of
maintanence is this? Preventive Maintanence
145. Any changes done to the software during the operational phase of the software before project wind up is called as
maintenance. FALSE Any change that is made to the software after it is deployed is known as maintenance
146. Automated tools are available in the market, for managing change and versioning the software TRUE
147. Which of the following describes the change history of an object? Evolution graph
Evolution Graph describes the change history of an object
148. The entry door of the Server room inside the company can be considered as equivalent to baseline concept in
configuration management. Baseline is a Specification or product that has been formally reviewed and agreed
upon, that thereafter serves as the basis for further development
149. _________ is a committee that makes decisions regarding whether or not proposed changes to a software project can be
incorporated. Change Control Board
150. Version Management allows parallel concurrent development. State True or False. True
151. Match the correct option
Who authenticates that the change proposed is valid → Change Control Board,
Process that ensures different versions of the project is managed → Configuration Management,
Process that ensures that changes made are recorded and controlled → Change Management,
The standard document where the requester fills the change in the change management process → Change Request Form
152. From the options identify the features that are part of the software configuration management
Version management, Concurrency control, Synchronisation control
153. John bought a new Laptop with a high end configuration. To protect his laptop and the applications installed he installed a
antivirus software.This is an example for Preventive Maintenance
154. Which of the following options are valid for the relationship between the configuration objects?
A curved arrow indicates a compositional relation. A double-headed straight arrow indicates an interrelationship.
155. Match the following facts about Version Management
If a file is changed and we want to roll back to the previous version - Automatic backup.
Lock a file - Serialized changes to file.
When a member of the team wants his code to work in isolation - Create branches.
156. Configuration audit is responsible for reviewing the items against various specifications for assessing its quality and
correctness
157. Version Control allows users to lock files so they can only be edited by one person at a time and track changes to files
Version control is a mechanism used to manage multiple versions of files 'True'.
158. Choose the missing steps involved in the Change Control Process in the correct order:
Identify and submit change request
Evaluate impacts of change request
Plan the change
Implement and test the change
Verify implementation of change
Close change request

You might also like