Technical Questions

Q:

Data flow analysis studies

A) The use of data on paths through the code B) Possible communications bottlenecks in a program
C) The intrinsic complexity of the code D) The rate of change of data values as a program executes
 
Answer & Explanation Answer: A) The use of data on paths through the code

Explanation:

Data flow analysis studies the use of data on paths through the code.

Report Error

View Answer Report Error Discuss

3 4618
Q:

What is a drawback of MVT?

Answer

1) ability to support multiple processors
2) virtual storage
3) source level debugging

Report Error

View answer Workspace Report Error Discuss

1 4604
Q:

 The process of reading a database schema and producing a data model from that schema is known as:

A) data modeling. B) database design.
C) reverse engineering. D) None of the above is correct.
 
Answer & Explanation Answer: C) reverse engineering.

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: Database

1 4580
Q:

What is called scratch pad of computer?

Answer

Cache Memory is scratch pad of computer.

Report Error

View answer Workspace Report Error Discuss

Subject: Hardware

2 4567
Q:

Why address bus in unidirectional and data bus is bidirectional?

Answer

Because there is no need address traansaction between processor and peripheral device but data bus is needed because data has to be read and write

Report Error

View answer Workspace Report Error Discuss

Subject: Hardware

3 4551
Q:

Reporting Discrepancies as incidents is a part of which phase?

A) Test Implementation and execution B) Evaluating exit criteria and reporting
C) Test Analysis and Design D) Test Closure Activities
 
Answer & Explanation Answer: A) Test Implementation and execution

Explanation:
Report Error

View Answer Report Error Discuss

3 4535
Q:

Describe how to perform Risk Analysis during software testing.

Answer

While a test plan is being created, risks involved in testing the product are to be taken into consideration along with possibility of their occurrence and the damage they may cause along with solutions; if any. Detailed study of this is called as Risk Analysis.


Some of the risks could be:


New Hardware 


New Technology 


New Automation Tool 


Sequence of code delivery 


Availability of application test resources 


Identify and describe the risk magnitude indicators: High, Medium and Low


High magnitude means the effect of the risk would be very high and non-tolerable. Company may face severe loss and its reputation is at risk. Must be tested.


Medium: tolerable but not desirable. Company may suffer financially but there is limited liability or loss of reputation. Should be tested.


Low: tolerable. Little or no external exposure. Little or no financial loss. Company’s reputation unaffected. Might be tested.


Three perspectives of Risk Assessment: Effect, Cause and Likelihood.


To assess risk by Effect, identify a condition, event or action and try to determine its impact.


To asses risk by Cause is opposite of by Effect. Begin by stating an undesirable event or condition and identify the set of events that could have permitted the condition to exist.


To asses risk by Likelihood is to determine the probability that a requirement will not be satisfied.

Report Error

View answer Workspace Report Error Discuss

Subject: Software Testing

0 4530
Q:

What happens during the bootstrap process?

Answer

A bootstrap is the process of starting up a computer. It also refers to the program that initializes the operating system (OS) during start-up.


It referred to a bootstrap load button that was used to initiate a hardwired bootstrap program, or smaller program that executed a larger program such as the OS.

Report Error

View answer Workspace Report Error Discuss

6 4513