Software Development Question
SOFTWARE TESTING MID-TERM EXAMINATION SPRING SEMESTER 2024 1. What is coverage? List various methods to determine coverage. 2. How do you determine when testing is done? 3. What is a “grey problem?” 4. Explain “root cause analysis.” 5. Look up “fish bone analysis” and explain how you might use it in software testing, bug tracking, error analysis. 6. What is a testing Oracle and why is it essential for effective software testing? 7. What is an Operational Profile and how is it used to plan a testing strategy? 8. Define Risk-based Functional Testing. How are risks prioritized for testing purposes? 9. Why must an effective testing strategy balance testing for correct executions and invalid executions? What percentage of time should you allocate in the schedule for the testing of error conditions? 10. Software development models are often used as the basis for Integration Testing and System Testing. Compare: a. User Stories, b. Use Cases, c. User Journeys; 11. How they can be used to define test cases for System Testing? 12 A security authentication routine asks you to enter a password of at least 6 characters, and then asks you to enter it again. The program compares the two entries and either accepts the password (if they match) or rejects it (if they don’t). Legal characters are letters, digits, or special characters. (The case of letters is not considered.) Describe the potential failure risks with the routine using the table below as a guide. Propose a set of test cases to evaluate each of these risks using the appropriate boundary conditions and equivalence classes. Note that there are two variables – Password1 and Password2. Be devious in defining your test cases. Identify at least four potential risks. 13. Explain Path testing and data flow testing. 14 Briefly discuss the differences between ‘top-down’ Decomposition-based integration testing (on the functional decomposition graph of the program) and Path-based (MM-paths) integration testing. What are the pros and cons of each integration strategy? 15 Discuss the role of inspections and reviews during the front-end of the software development life cycle. Under what circumstances would design inspections and code inspections be beneficial? What is the role of the tester in the inspection process? 16 Select any feature of Canvas and answer the following: a. Explain the methodology you would use to develop a set of scenario tests for this feature. b. Describe a specific scenario test that you would use to test this feature. c. Explain why this is a particularly good scenario test. d. Perform this test and report the results. Create a test plan, test description and test results report. (Note that it is not required to find a defect for the purposes of this exam,) 17 Use the Triangle case from the textbook for the following: a. Identify the paths b. For each path design a test to validate the inputs and outputs of the program. 18 Repeat the process in 17 for the feature you selected from Canvas.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.
