All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Ask a Question
AI Study Help
New
Search
Search
Sign In
Register
study help
business
software testing and quality assurance
Questions and Answers of
Software Testing And Quality Assurance
Attempt to draw a control flow graph for a module that you have recently developed. Determine the cyclomatic complexity for the module. Is the module too complex?
For your current software project, conduct a formal code review as described in Section 3.2.
For your current software project, develop dynamic unit test cases for each of the units in the JUnit framework if the code is in Java or in an appropriate xUnit framework.
Draw a CFG for binsearch().
From the CFG, identify a set of entry–exit paths to satisfy the complete statement coverage criterion.
Identify additional paths, if necessary, to satisfy the complete branch coverage criterion.
For each path identified above, derive their path predicate expressions.
Solve the path predicate expressions to generate test input and compute the corresponding expected outcomes.
Are all the selected paths feasible? If not, select and show that a path is infeasible, if it exists.
Can you introduce two faults in the routine so that these go undetected by your test cases designed for complete branch coverage?
Suggest a general way to detect the kinds of faults introduced in the previous step.
What are the limitations of control flow–based testing?
Show that branch coverage includes statement coverage.
Draw a data flow graph for the binsearch() function given in Figure 5.8.
Assuming that the input array V [ ] has at least one element in it, find an infeasible path in the data flow graph for the binsearch() function. int binsearch (int x, int V[], int n) { int low, high,
Identify a data flow anomaly in the code given in Figure 5.9.
By referring to the data flow graph obtained in exercise 1, find a set of complete paths satisfying the all-defs selection criterion with respect to variable mid.
By referring to the data flow graph obtained in exercise 1, find a set of complete paths satisfying the all-defs selection criterion with respect to variable high.
Write a function in C such that the all-uses criterion produces more test cases than the all-branches criterion.
What is meant by the gap between all-branches testing and all-paths testing and how does data flow testing fill the gap?
Explain why the presence of data flow anomaly does not imply that execution of the program will definitely produce incorrect results.
Program anomaly has been defined by considering three operations, namely, define (d), reference (r ), and undefine (u). The three sequences of operations identified to be program anomaly are dd, du,
Identify some difficulties in identifying data flow anomaly in programs.
Explain what are computation error and domain error.
Give an example of code showing a domain error. D Y-axis (0, 0) 5 X-axis D 1-5 Figure 6.16 Domains D1, D2, and D3. D3
Explain the difference between control flow–based testing and domain error–based testing.
Recall that the domain testing strategy requires us to select test points on and/or very close to domain boundaries. Why do we not select test points far from the boundaries?
Consider the three domains D1, D2, and D3 shown in Figure 6.16. Domain D3 consists of all those points lying on the indicated straight line. Assuming that the maximum X and Y span of all the three
State four kinds of domain errors and explain how they occur.
Explain the following terms: closed boundary, open boundary, closed domain, open domain, extreme point, adjacent domain.
Explain the idea of ON points and OFF points.
Clearly explain the test selection criterion in domain-based testing and show the closed inequality error (boundary shift resulting in a reduced domain) is detected by the test points chosen by the
Identify some difficulties in applying the concept of domain testing to actual program testing.
Describe the difference between black-box and white-box testing techniques?
If a program passes all the black-box tests, it means that the program should work properly. Then, in addition to black-box testing, why do you need to perform white-box testing?
Describe the difference between unit testing and integration testing?
Why should integration testing be performed? What types of errors can this phase of testing reveal?
Discuss the advantages and disadvantages of top-down and bottom-up approaches to integration testing.
Does automation of integration tests help the verification of the daily build process? Justify your answer.
Using the module hierarchy given in Figure 7.13, show the orders of module integration for the top-down and bottom-up integration approaches. Estimate the number of stubs and drivers needed for each
Suppose that you plan to purchase COTS components and integrate them with your communication software project. What kind of acceptance criteria will you develop to conduct acceptance testing of the
During integration testing of COTS components with a software system, it may be required to develop a wrapper software around the OTS component to limit what it can do. Discuss the general
Describe the circumstances under which you would apply white-box testing, back-box testing, or both techniques to evaluate a COTS component.
For your current test project, develop an integration test plan.
Complete Section 5 (i.e., actual test results for each integration test phase) of the integration test plan after executing the integration test cases you developed in exercise 11.
What is an element management system (EMS)? How is it different from a network management station (NMS)?
What are the differences between configuration, compatibility, and interoperability testing?
What are the differences between performance, stress, and scalability testing?What are the differences between load testing and stress testing?
What is the difference between performance and speed?
Buffer overflow is the most commonly found vulnerability in network-aware code that can be exploited to compromise a system. Explain the reason.
What are zero-day attacks? Discuss its significance with respect to security testing.
Discuss the importance of regression testing when developing a new software release. What test cases from the test suite would be more useful in performing a regression test?
What are the differences between safety and reliability? What are the differences between safety testing and security testing?
What is the similarity between software safety and fault tolerance?
For each of the following situations, explain whether it is a hazard or a mishap:(a) Water in a swimming pool becomes electrified.(b) A room fills with carbon dioxide.(c) A car stops abruptly.(d) A
What are the similarities and differences between quality assurance (QA) and safety assurance (SA)?
For your current test project, develop a taxonomy of system tests that you plan to execute against the implementation.
(a) What is the central idea in Howden’s theory of functional testing?(b) What is a functionally identifiable substructure?(c) All combinations of special values of input variables can lead to a
Consider the system S in Figure 9.7, which has three input parameters X, Y, and Z. Assume that set D, a set of input test data values, has been selected for each of the input variables such that D(X)
Discuss the drawback of the orthogonal array methodology compared to the IPO algorithm.
Consider the system S which can take n input parameters and each parameter can take on m values. For this system answer the following questions:(a) What is the maximum number of pairs a single test
What is the minimum number of test cases to be selected to achieve pairwise coverage?
Consider the following triangle classification system, originally used by Myers[16]: The system reads in three positive values from the standard input. The three values A,B, and C are interpreted as
Consider again the triangle classification program with a slightly different specification:The program reads floating values from the standard input. The three values A, B, and C are interpreted as
Consider the triangle classification specification. The system reads in three positive values from the standard input. The three values A,B, and C are interpreted as representing the lengths of the
What are the advantages and disadvantages of random testing?
What is a test oracle? What are the differences between a parametric oracle and a statistical oracle?
Discuss the similarity between the decision table–based and category partition–based testing methodology.
Considering the FSM of Figure 10.17 discussed in this chapter, provide a test sequence table, similar to Table 10.12, for the state transition (D, B, b/y).
What are the fundamental differences between UIO sequence and distinguishing sequence methods of state verification?
Consider the FSM G = , shown in Figure 10.49, where S = {A,B,C} is the set of states, I = {a,b, c} is the set of inputs, O = {e, f }is the set of outputs, A is the initial state, δ : S × I →S is
Consider the FSM H = of Figure 10.50, where S = {A,B,C,D,E, F,G} is the set of states, I = {ri,a, c, x, z} is the set of inputs, O = {null,b, f, d} is the set of outputs, A is the initial state,δ :
Consider the FSM K = of Figure 10.51, where S = {A,B,C} is the set of states, I = {a, b} is the set of inputs, O = {x, y}is the set of outputs, A is the initial state, δ : S × I →S is the
Consider the nondeterministic FSM NFSM = of Figure 10.52, where S = {A,B,C,D,E, F,G} is the set of states, I = {ri,a, c, x, z}is the set of inputs, O = {null,b, f, d} is the set of outputs, A is the
Discuss the effectiveness of the error detection capabilities among the abstract test architectures presented in this chapter.
Design a test component to test the system, represented in Figure 10.8, from the standpoint of a local phone alone. In your test component, consider the partial transition tour OH–AD–RNG–TK.
Assuming that a called (remote) phone is far away from the calling (local)phone, explain the difficulty you will encounter while designing a test case in TTCN-3 from the following transition tour in
Explain the concept of test case verdicts.
Do we have to upgrade the software image sequentially on each of the network elements or at the same time on all the 100 elements? Or, do we proceed in a batch of 20 elements at a time?
What is the source of the upgrade? Will the source be on an element management server?
What does “easy” mean here? Does it refer to the length of time, say, 200 seconds, taken by the upgrade process?
Can we have a mix of old and new software images on different network elements on the same network? In other words, is a new software image compatible with the old image?
If we support old and new software images on different network elements on the same network, then the EMS should be capable of managing two versions of a software installed on the same network. Is it
To what release will the software be downgraded? Suppose the software image is upgraded to the nth release from the (n − 1)th release. Now, if the software image is to be downgraded, to what
While a system is being upgraded, do we need to observe the CPU utilization of the network elements and the EMS server? What is the expected CPU utilization?
Explain the difference between coverage metrics and traceability matrix.
Explain the difference between requirement testability and software testability.
Justify the statement that software testability and fault tolerant are opposites to each other, and attaining both at the same time for the same piece of software is not feasible. When do you want
What are the differences between software testability and reliability? What is more important in a software: high testability or high reliability? Justify your answer.
In a software test project, the number of unit-, integration-, and system-level test cases specified are 250, 175, and 235, respectively. The number of test cases added during the unit, integration,
Prepare a checklist of items that will serve as the focal point for reviewing test cases.
Under what circumstances can the execution result of a test case be declared as blocked?
Implement the requirement model discussed in this chapter.
Implement the test factory model discussed in this chapter.
For your current test project, develop the test suite hierarchy and identify a test objective for each test case within each test (sub)group.
Develop detailed test cases using the schema defined in Table 11.6 as a template for the test objectives you identified in the previous exercise.
What is the purpose of having a system test plan ready before the start of system test cycles?
What are some essential items a tester should include in a system test plan?
What are the advantages and disadvantages of having separate unit, integration, and system test plans as opposed to an inclusive test plan containing all three in the same document?
Study the test plan proposed in the IEEE standard 829 standard described in the literature review section of this chapter. What are the essential items not addressed in this test plan?
Showing 3100 - 3200
of 3313
First
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34