All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Hire a Tutor
AI Study Help
New
Search
Search
Sign In
Register
study help
computer science
systems analysis and design
Questions and Answers of
Systems Analysis And Design
List and explain genetic algorithm operators. Differentiate between one-point and twopoint crossover.
Consider a program to subtract two numbers. Construct its fitness function and generate test data using genetic algorithm.
Explain with the help of a flowchart the functionality of genetic algorithms.
Write short notes on the following:(a) Mutation(b) One point crossover(c) Two point crossover(d) Fitness function
What are genetic algorithms? How are they different from traditional exhaustive search based algorithms?
Explain the use of fitness function. Consider a small program and construct its fitness function.
Consider a program to determine the division of a student based on his/her average marks in three subjects. Design test cases and list constraints of each independent path using symbolic execution.
(a) What is dynamic test data generation?(b) Differentiate between static and dynamic test data generation.
List the advantages of automated test data generation over manual test data generation.
What is random testing? Why is it popular in practice?
Explain the significance of symbolic execution. What are the advantages and limitations of this technique?
What is symbolic execution? How is it different from random testing?
Which is not a software test data automation tool?(a) MIDOAN(b) CONFORMIQ(c) WINRUNNER(d) T-VEC
Fitness function is used in:(a) Genetic algorithm(b) Symbolic execution(c) Mutation testing(d) Data flow testing
Fitness function is used to:(a) Verify the effectiveness of variables(b) Verify the performance of a test suite(c) Measure how close each sample test set is to the goal(d) All of the above
The function of the mutation operator is to:(a) Randomly change bits(b) Generate new offsprings(c) Reproduce new bits(d) None of the above
The function of crossover operator is to:(a) Mutate a bit(b) Transpose a bit(c) Generate two new offsprings(d) Generate one new offspring
Genetic operators are:(a) Mutation and addition(b) Mutation and subtraction(c) Crossover and addition(d) Mutation and crossover
Evolutionary algorithms are based on:(a) Heuristic search strategy(b) Constraint based systems(c) Exhaustive search(d) None of the above
Which one is a popular heuristic search technique?(a) Hill climbing(b) Simulated annealing(c) Genetic algorithm(d) Neural network
The purpose of objective function is:(a) Function minimization(b) Function maximization(c) Function optimization(d) Function execution
Symbolic execution is applicable to a:(a) Large sized program(b) Small sized program(c) Medium sized program(d) (b) and (c)
Random testing:(a) Generates test data based on constraints(b) Generates test data arbitrarily(c) Generates test cases based on independent paths(d) None of the above
Symbolic execution is based on:(a) Variables(b) Constraints(c) Paths(d) Boundary values
Symbolic execution is a:(a) Black box testing technique(b) Gray box testing technique(c) Static testing technique(d) Dynamic testing technique
Dynamic test data generation involves:(a) Static analysis of the program(b) Actual execution of the program(c) Verification of requirements(d) All of the above
Automated test data generation is used to generate:(a) Test data(b) Test cases(c) Test suite(d) All of the above
Prepare a checklist for verifying security of an e-commerce website.
Describe the following metrics:(a) Information quality(b) Link quality(c) Image quality(d) Content percentage(e) Wrapped links
Identify functional and performance test cases of the following web page: File Edit View Favorites Tools Help Back Address Mtp://www.google.co.in/ Search Favorites Web Images Maps News Orkut Books
Explain the significance of stress testing in analyzing the performance of a web application.
(a) Which metrics must be captured during web usability testing?(b) Identify web page composition metrics.
Explain three-tier architecture of a web application.
(a) Identify major risks in testing a web application.(b) What issues are considered while constructing test cases during user interface testing?
What is post deployment testing? How are surveys helpful in post deployment testing?Explain the criteria that must be followed for deciding which suggested idea must be implemented.
What aspects must be covered in order to ensure database correctness in database testing? Explain with the help of an example.
What is database testing? Identify administrative and user operations of an online purchase of a website.
Consider the following web page. Design test cases using all kinds of web testing tests. Address http://www.oss.com/ogin.asp Search Favorites Welcome! log into the membership online shopping
Discuss some areas where web testing cannot be performed effectively without the help of a tool.
(a) What is load testing? What metrics must be captured during load testing?(b) What do you understand by the following terms?(a) Response time(b) Throughput(c) Web page views per week(c) List some
What are several factors that influence major components of a performance test report?
Define the following terms:(a) Access control(b) Authentication(c) Integrity(d) Non-repudiation(e) Virus(f) Firewall
Explain the significance of virus and firewall testing.
What is security testing? Explain the primary requirements that must be fulfilled by a web application during security testing.
Design test cases for testing a search engine such as Google.
What factors are considered while performing usability testing?
What is the most important type of testing which we consider when we test a web application? Justify your answer.
Describe the procedure to conduct configuration and compatibility testing for a web application.
What is the purpose of browser testing?
(a) What is usability testing? What steps must be followed in usability testing?(b) What is the purpose of preparing a questionnaire in usability testing?
Define usability. List and explain various attributes of usability.
Consider the web application given in exercise 11.4. Design test cases using form based testing. Make the necessary assumptions.
Explain the significance of navigation testing. List some commercially available tools for link testing.
Consider a web application for registering users in order to create an email account.The registration form includes the following fields:(a) User name(b) Password(c) Re-type password(d) First name(e)
What is user interface testing? Explain with the help of an example.
(a) What are the key areas in testing a web application?(b) Which conventional testing techniques are applicable in testing a web application?
What is web testing? Differentiate between client/server applications and web application.
Length of link text metric is used to count:(a) Links on a page(b) Words in the text for a link(c) Total words in links(d) Links embedded in the text on a page
Web usability metrics can be divided into:(i) Page composition metrics(ii) Page formatting metrics(iii) Recovery from failure metrics(iv) Performance verification metrics(a) (i) and (iii)(b) (i) and
Post-deployment testing is used to:(a) Ensure database security(b) Ensure proper functioning of user interfaces(c) Improve the website and for future evaluations(d) Perform stress testing
Which is not a load testing tool?(a) Empirix’s e-Test(b) Illumit’s WebLight(c) Microsoft’s ACT(d) Radview’s WebLoad
Which one is not a web usability metric?(a) Total links on a page(b) Response time(c) Word count(d) Number of graphics
An effective way to obtain the user’s feedback is:(a) A questionnaire(b) A checklist(c) An interview(d) None of the above
Database testing may not include:(a) Data validation(b) Virus checking(c) Concurrency control(d) Recovery from failure
Which one is not a load testing metric?(a) Number of concurrent users(b) Wait Time(c) Total links on a page(d) Throughput
The difference between stress testing and load testing is:(a) Stress testing checks performance of the system beyond the specified limits while load testing checks the performance on specified
The factors that influence performance include:(i) Network bandwidth(ii) Reliability(iii) Response time(iv) Time to market(a) (i) and (ii)(b) (i) and (iii)(c) (i), (iii) and (iv)(d) All of the above
The primary security requirements do not include:(a) Reliability(b) Authentication(c) Delivery(d) Performance
Access control is:(a) Protecting data from virus threats(b) Protecting data from unauthorized users(c) Recovering the network from failure(d) None of the above
Non-repudiation is:(a) The receiver’s ability to prove that data came from an unauthenticated user(b) The receiver’s ability to prove that data is not modified during transit(c) The receiver’s
Virus testing ensures that:(a) The network is protected from intruders(b) Anti-virus software identifies, detects and removes viruses(c) Hyperlinks function properly(d) Anti-virus software is
Architecture of a firewall consists of:(a) External network(b) Database server(c) Router(d) Antivirus software
The aim of security testing is not:(a) To protect the application from unauthorized access(b) To protect the application against virus threats(c) To ensure proper functioning of user interface
Compatibility matrix is created in:(a) Security testing(b) Database testing(c) Performance testing(d) Browser testing
Browser testing does not verify the functioning of the web application in terms of:(a) Load(b) Operating system compatibility(c) Text(d) Video
Which of the following is not a browser?(a) Internet explorer(b) Linux(c) Chrome(d) Mozilla
The goal of configuration and compatibility testing is:(a) To ensure that the web application can handle load during maximum traffic(b) To ensure database integrity(c) To ensure proper functioning of
In selection of participants we must remember:(a) Selection of the right number and type of participants(b) Selection of participants with the right type of skills(c) Selection of participants of the
Usability does not consist of:(a) Accuracy(b) Reliability(c) Learnability(d) Completeness
Form based testing does not check:(a) Data validations(b) Hyperlinks on each page(c) Mandatory fields(d) Navigation amongst fields
Which is not a link testing tool?(a) LinkTiger’s LinkTiger(b) Illumit’s WebLight(c) Elsop’s LinkScan(d) Apache’s Jmeter
Navigation testing investigates the proper functioning of:(a) Forms(b) Links(c) Tables(d) Frames
Key areas in testing web applications do not include:(a) Security testing(b) Browser testing(c) Acceptance testing(d) Database testing
A web server incorporates:(a) Business logic(b) Database storage(c) Web browser(d) All of the above
A web application depicts:(a) Two-tier architecture(b) Three-tier architecture(c) N-tier architecture(d) Four-tier architecture
A web application consists of:(a) Web server(b) Database server(c) Client application(d) All of the above
A client-server application consists of:(a) Server application(b) Database server(c) Application server(d) None of the above
What is software reliability? Does it exist? Describe the following terms:(i) MTBF(ii) MTTF(iii) Failure intensity(iv) Failures experienced in a time interval
Assume that a program will experience 200 failures in infinite time. It has now experienced 100 failures. The initial failure intensity was 10 failures / CPU hour.(a) Determine the present failure
A program is expected to have 500 faults. The assumption is that one fault may lead to one failure. The initial failure intensity is 10 failures / CPU hour. The program is released with a failure
Explain the Jelinski – Moranda model of reliability theory. What is the relationship between ‘ ’ and ‘t’?
Assume that the initial failure intensity is 5 failures / CPU hour. The failure intensity decay parameter is 0.01/ failure. We have experienced 25 failures up to this time. Find the failures
Assume that initial failure intensity is 20 failures / CPU hour. The failure intensity decay parameter is 0.05/ failure. We assume that 50 failures have been experienced.Calculate the current failure
Explain the logarithmic poisson model and find the values of μ and .
Discuss the basic model of software reliability. How can we calculate and ?
Explain the software fault prediction model. List out the metrics used in the analysis of the model. Define precision, sensitivity and completeness. What is the purpose of using Receiver Operating
What is the relationship between testability and complexity? Discuss the factors which affect the software testability.
(a) What metrics are required to be captured during testing?(b) Identify some test process metrics(c) Identify some test product metrics
Describe the following metrics:(a) Quality of source code(b) Source code coverage(c) Test case defect density(d) Review efficiency
(a) What should we measure during testing?(b) Discuss things which can be measured with respect to time(c) Explain any reliability model where emphasis is on failures rather than faults.
Showing 100 - 200
of 480
1
2
3
4
5