Kd - 2

  • July 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Kd - 2 as PDF for free.

More details

  • Words: 1,068
  • Pages: 7
KD 2 – The Development and Acquisition Process 1) In which phase of Software development testing starts: a) System Testing phase b) Design Phase c) Requirements phase d) Construction phase 2) Structural Testing means: a) Structured way of approach for testing b) Functionality testing c) Regression testing d) Non-Functional Testing 3) Write down the 11-step development process involved in ‘V’ model? ADTT-PEARSTE A- Access Dev Plan D- Develop Test Plan T-Test Reqmnst T- S/W design P-Program the phase test E-Execute the test and record the result A-Acceptance test R-Report Results S-S/w Installation T-Test s/w changes E-Evaluation of testing effectiveness

4) Find which are all part of non-Functional testing: a) Black-Box testing b) White Box testing c) Regression testing d) Stress testing e) Security testing 5)

Joe is performing a test to see that how system performs when it overloads. Joe is performing: a. White-box testing b. Black Box testing c. Load Testing d. Regression testing e. Stress testing 6) Define Recovery testing?

7) Define Security testing?

8) Find which are all part of Functional testing techniques: a) Requirement testing

b) c) d) e)

Stress testing Load testing Regression testing Parallel testing

9) Retesting modules connected to the changed program is: a) Black-Box testing b) Whit box testing c) Regression testing d) Thread testing e) Usability testing 10) Incremental testing can be done in two ways. a. Top down and b. Bottom Up (T/F) 11) What are the guidelines for writing a Test plan.

Match the following 12) Stress Testing 13) Load Testing 14) Performance Testing

a) Testing the Response time for the transactions in an application b) Testing an application repeatedly over a specific time period c) Testing an application for n number of users

15) Write a test strategy for machine critical application? 16) Mention any 3 phases of SDLC. 17) Project plan is prepared during: a) Initiation phase b) Definition phase c) System Design Phase 18) Before certification, all VV &T test results would be documented and a comparison of actual and expected results are made (T/F). 19) The purpose of installation and operation phase is to: a) b) c) d)

Implement the approved plan Continue approved operation Budget adequately All of the above

20) This individual is responsible for developing uniform policies a) Information resource manager b) System security officer c) Internal control officer 21) The term contractor applies to non-employee performing SDLC activities (T / F). 22) At this stage, the risk /sensitivity of the data controlled by the SDLC under consideration should be evaluated a) b) c) d)

Definition phase System Design phase Evaluation & Acceptance phase Initiation phase

23) Resource planning for verification, validation and testing should be included in this phase: a) b) c) d)

Initiation phase Definition phase System Design phase Programming & Training

24) Before certification all VV & T test results would be documented and a comparison made in this phase a) b) c) d)

Programming & Training Evaluation & Acceptance Installation & Operation A&b

25) At the department level, _______________ is responsible for the development, implementation and operation of an agency’s computer security program: a) Internal control officer b) System security officer c) Information resources management official (IRM) 26) The sponsor /user is ultimately responsible for accepting the system as being complete (T/F) 27) The _________________is designated by the sponsor and is responsible to the same. a) Project Manager b) System security Specialist c) Information Technology Manager 28) The ______________ assures that a system meets basic standards for documentation, recording of transactions etc. a) b) c) d)

Project Manager Information Tech Manager Internal Control Specialist Quality Assurance (AA) Specialist

29) ______________ ensures data integrity a) b) c) d)

Project Manager Information Tech manager Quality Assurance Specialist Internal Control Specialist

30)_______________provides critical information and framework to the department a) b) c) d)

Cost Benefit Analysis Project plan System description Paper Data sensitivity /criticality description

31) Test Analysis Report is: a) b) c) d)

To document test analysis Present demonstrated capabilities and deficiencies Provide basis for preparing a statement of SDLC All of the above

True or False 32) if the expected life cycle of the software system is long, then portability becomes the most crucial quality attribute . 33) if the application is an experimental system, where the software specifications will have a high rate of change, then maintainability is the most important quality factor. Fill in the blanks 34) Effort required to locate and fix an error in an operational program is _______________. 35) Effort required to couple one system with another is ________________________. 36) Extent to which access to software or data by unauthorized persons can be controlled is called as ____________. 37) Effort required to learn, operate, prepare input and interpret output of a program is ___________. 38) Quality factors are grouped according to three activities namely _________, __________ and ___________. 39) Effort required to modify an operational program is ____________________. 40) ____________________________ form is used as a tool in identifying important quality factors of a software product. 41) There are _________ procedures involved in identifying the quality attributes. 42) Extent to which a program can be expected to perform its intended function with required precision is called as ______________.

Answers:

1. c. (page 35) 2. d 3. Assess development plan status, develop the test plan, test software requirements, test software design, execute tests, acceptance test, report test results. (page: 23 of part 2) 4. d,e

5. e (page 25) 6. Recovery testing is used to ensure that operations can be continued after a disaster. It also verifies the effectiveness of component parts of that process. (page 25)

7. Security testing is designed to evaluate the adequacy of the protective procedures and counter measures. (page 25)

8. a,d,e. (page 34) 9. c 10. True 11. Test design, test strategy, test environment are all should be addressed. 12. b 13. c 14. a 15.

White box testing, Black-box testing, regression testing (Regional regression or complete regression) 16. Initiation, Definition, System Design 17. b 18. True 19. d 20. a 21. True 22. d 23. b 24. b 25. b

26. True. (page 5) 27. a 28. c 29. c 30. c 31. d 32. False 33. False

34. Maintainability. (page 51) 35. Interoperability. (page 51) 36. Integrity. (page 49) 37. Usability. (page 49) 38. Product operation, product revision and product transition 39. Flexibility

40. Software quality requirements survey. (page 46) 41. Five. (page 46) 42. Reliability

Related Documents

Kd - 2
July 2020 22
Kd 2.1(2)_rec
June 2020 5
Kd 1.6 (2)_rec
June 2020 5
Kd 3.1(2)_rec
June 2020 6
Modul 3 Kd 2
July 2020 39
- Modul 3 Kd 2
June 2020 46