This section includes 7 InterviewSolutions, each offering curated multiple-choice questions to sharpen your Current Affairs knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Explain User Acceptance Testing? |
|
Answer» User ACCEPTANCE testing is usually performed after the product is THOROUGHLY tested. In this form of testing, SOFTWARE users or say, client, itself use the application to make sure if everything is working as PER the requirement and perfectly in the REAL world scenario. UAT is also known as End-user testing. User acceptance testing is usually performed after the product is thoroughly tested. In this form of testing, software users or say, client, itself use the application to make sure if everything is working as per the requirement and perfectly in the real world scenario. UAT is also known as End-user testing. |
|
| 2. |
What Are The Factors To Be Considered In Risk-based Testing? |
|
Answer» By Risk-based testing of a project, it is not just to deliver a project risk-free but the main aim of risk-based testing is to ACHIEVE the project outcome by carrying out best practices of risk management. The MAJOR FACTORS to be considered in Risk-based testing are as follows:
By Risk-based testing of a project, it is not just to deliver a project risk-free but the main aim of risk-based testing is to achieve the project outcome by carrying out best practices of risk management. The major factors to be considered in Risk-based testing are as follows: |
|
| 3. |
What Do You Understand By Requirement Traceability Matrix? |
|
Answer» Requirement Traceability matrix (RTM) is a tool to KEEP a track of requirement coverage over the PROCESS of testing. In RTM, all requirements are categorized as their development in COURSE of SPRINT and their respective ids (new feature implementation/ enhancement/ previous issues, etc) are maintained for keeping a track that everything mentioned in the requirement DOCUMENT has been implemented before the release of the product. RTM is created as soon as the requirement document is received and is maintained till the release of the product. Requirement Traceability matrix (RTM) is a tool to keep a track of requirement coverage over the process of testing. In RTM, all requirements are categorized as their development in course of sprint and their respective ids (new feature implementation/ enhancement/ previous issues, etc) are maintained for keeping a track that everything mentioned in the requirement document has been implemented before the release of the product. RTM is created as soon as the requirement document is received and is maintained till the release of the product. |
|
| 4. |
What Do You Understand By Sanity Testing? |
|
Answer» Sanity testing is performed after receiving the build to check the NEW functionality/defects to be fixed. In this form of testing the goal is to check the functionality roughly as EXPECTED and determine whether the bug is fixed and ALSO the EFFECT of the fixed bug on the application under test. There is no point in accepting the build by the tester and WASTING time if Sanity testing fails. Sanity testing is performed after receiving the build to check the new functionality/defects to be fixed. In this form of testing the goal is to check the functionality roughly as expected and determine whether the bug is fixed and also the effect of the fixed bug on the application under test. There is no point in accepting the build by the tester and wasting time if Sanity testing fails. |
|
| 5. |
When Do We Perform Smoke Testing? |
|
Answer» Smoke testing is performed on the application after RECEIVING the build. Tester USUALLY TESTS for the critical path and not the functionality in deep to make sure, WHETHER the build is to be accepted for further testing or to be rejected in case of broken application. A smoke checklist usually contains the critical path of the application without which an application is blocked. Smoke testing is performed on the application after receiving the build. Tester usually tests for the critical path and not the functionality in deep to make sure, whether the build is to be accepted for further testing or to be rejected in case of broken application. A smoke checklist usually contains the critical path of the application without which an application is blocked. |
|
| 6. |
Explain Boundary Value Analysis? |
|
Answer» Boundary value analysis method checks the boundary values of Equivalence class partitions. Boundary value analysis is basically a testing technique which IDENTIFIES the errors at the boundaries rather than WITHIN the range values. For Example: An input field can allow a minimum of 8 characters and maximum 12 characters then 8-12 is CONSIDERED as the valid range and 13 are considered as the invalid range. Accordingly, the test cases are written for valid partition value, EXACT boundary value, and invalid partition value. Boundary value analysis method checks the boundary values of Equivalence class partitions. Boundary value analysis is basically a testing technique which identifies the errors at the boundaries rather than within the range values. For Example: An input field can allow a minimum of 8 characters and maximum 12 characters then 8-12 is considered as the valid range and 13 are considered as the invalid range. Accordingly, the test cases are written for valid partition value, exact boundary value, and invalid partition value. |
|
| 7. |
What Is Adhoc Testing? |
|
Answer» Adhoc testing, USUALLY known as RANDOM testing is a form of testing which does not follow any test case or requirement of the application. Adhoc testing is basically an unplanned activity where any part of the application is randomly CHECKED to find defects. In such cases, the defects ENCOUNTERED are very DIFFICULT to reproduce as no planned test cases are followed. Adhoc testing is usually performed when there is a limited time to perform elaborative testing. Adhoc testing, usually known as random testing is a form of testing which does not follow any test case or requirement of the application. Adhoc testing is basically an unplanned activity where any part of the application is randomly checked to find defects. In such cases, the defects encountered are very difficult to reproduce as no planned test cases are followed. Adhoc testing is usually performed when there is a limited time to perform elaborative testing. |
|
| 8. |
Explain Accessibility Testing And Its Importance In The Present Scenario? |
|
Answer» Accessibility testing is a form of usability testing what testing is performed to ensure that the application can be easily handled by people with disabilities like hearing, colour blindness, LOW VISIBILITY etc. In today’s scenario, the web has acquired the major place in our life in the form of e-commerce sites, e-learning, e-payments, etc. Thus in order to grow better in life, everyone should be ABLE to be a part of technology especially people with some disabilities. Enlisted below are few types of SOFTWARE which HELPS and assist people with disabilities to use technology:
Accessibility testing is a form of usability testing what testing is performed to ensure that the application can be easily handled by people with disabilities like hearing, colour blindness, low visibility etc. In today’s scenario, the web has acquired the major place in our life in the form of e-commerce sites, e-learning, e-payments, etc. Thus in order to grow better in life, everyone should be able to be a part of technology especially people with some disabilities. Enlisted below are few types of software which helps and assist people with disabilities to use technology: |
|
| 9. |
For Any Web Application, What Are The Possible Login Features That Should Be Tested? |
|
Answer» Listed below are the possible scenarios that can be performed to fully test the login feature of any application:
Listed below are the possible scenarios that can be performed to fully test the login feature of any application: |
|
| 10. |
What Do You Understand By Exploratory Testing? When Is It Performed? |
|
Answer» Exploratory testing means testing or exploring the application without FOLLOWING any schedules or PROCEDURES. While performing exploratory testing, testers do not follow any pattern and use their out of box thinking and diverse ideas to see how the application performs. Following this process covers even the smallest part of the application and helps in finding more issues/bugs than in the normal test case testing process. Exploratory testing is USUALLY performed in cases when:
Exploratory testing means testing or exploring the application without following any schedules or procedures. While performing exploratory testing, testers do not follow any pattern and use their out of box thinking and diverse ideas to see how the application performs. Following this process covers even the smallest part of the application and helps in finding more issues/bugs than in the normal test case testing process. Exploratory testing is usually performed in cases when: |
|
| 11. |
What Do You Understand By Volume Testing? |
|
Answer» Volume testing is a form of performance testing which determines the performance LEVELS of the server THROUGHPUT and response time when concurrent USERS, as well as LARGE data load from the database, are PUT onto the system/application under tests. Volume testing is a form of performance testing which determines the performance levels of the server throughput and response time when concurrent users, as well as large data load from the database, are put onto the system/application under tests. |
|
| 12. |
Explain The Term Stress Testing And Load Testing? |
|
Answer» Stress Testing is a form of performance testing where the application is bound to go through exertion or stress i.e. execution of application above the threshold of the break to determine the point where the application crashes. This condition usually arises when there are too many users and too much of data. Stress testing also verifies the application recovery when the work load is reduced. Load Testing is a form of performance testing where the application is executed above various load levels to MONITOR PEAK performance of the SERVER, response time, server throughput, ETC. Through load testing process stability, performance and integrity of the application are determined under concurrent system load. Stress Testing is a form of performance testing where the application is bound to go through exertion or stress i.e. execution of application above the threshold of the break to determine the point where the application crashes. This condition usually arises when there are too many users and too much of data. Stress testing also verifies the application recovery when the work load is reduced. Load Testing is a form of performance testing where the application is executed above various load levels to monitor peak performance of the server, response time, server throughput, etc. Through load testing process stability, performance and integrity of the application are determined under concurrent system load. |
|
| 13. |
What Is Known As Data-driven Testing? |
|
Answer» Data-driven testing is the methodology where a series of test script containing test cases are executed repeatedly using data sources like Excel spreadsheet, XML file, CSV file, SQL database for input values and the actual output is compared to the expected one in the VERIFICATION process. For Example: Test studio is used for data-driven testing. Some advantages of data-driven testing are:
Data-driven testing is the methodology where a series of test script containing test cases are executed repeatedly using data sources like Excel spreadsheet, XML file, CSV file, SQL database for input values and the actual output is compared to the expected one in the verification process. For Example: Test studio is used for data-driven testing. Some advantages of data-driven testing are: |
|
| 14. |
Enlist Some Bug Status Along With Its Description? |
|
Answer» Enlisted below are few bug statuses along with their descriptions:
Enlisted below are few bug statuses along with their descriptions: |
|
| 15. |
What Are The Important Steps That Are Covered In Functional Testing? |
|
Answer» Following are the steps that should be covered as a part of functional testing:
Following are the steps that should be covered as a part of functional testing: |
|
| 16. |
What Do You Understand By The Term ‘functional Testing’? |
|
Answer» A black box testing technique, where the functionality of an application is tested to generate the desired output by providing certain input is called ‘Functional testing’. The role of functional testing is not only to VALIDATE the behavior of the application as per the requirement document specification but is ALSO to verify whether the application is ready to be released into the live environment or not. Given below are few functional testing TECHNIQUES that are commonly used:
A black box testing technique, where the functionality of an application is tested to generate the desired output by providing certain input is called ‘Functional testing’. The role of functional testing is not only to validate the behavior of the application as per the requirement document specification but is also to verify whether the application is ready to be released into the live environment or not. Given below are few functional testing techniques that are commonly used: |
|