Which phase of Risk Management in Testing involves determining the likelihood and impact of a risk?
- Risk Assessment
- Risk Identification
- Risk Mitigation
- Risk Monitoring
In the "Risk Assessment" phase of Risk Management, the identified risks are further evaluated to determine their likelihood of occurrence and the potential impact on the project. This provides clarity on which risks need urgent attention and which can be monitored periodically.
What distinguishes Contract Acceptance Testing from other types of Acceptance Testing?
- It focuses on system integration.
- It follows strict formal protocols.
- It is performed by external agencies.
- It's based solely on user feedback.
Contract Acceptance Testing is distinguished by its strict adherence to formal protocols and contractual specifications. The main objective is to ensure the software system meets the criteria defined in the contract before it is accepted, making it more legally-binding in nature than other types of acceptance testing.
In Continuous Integration, what is typically done immediately after code is committed to the source control repository?
- A set of automated tests is run
- Code is archived
- Code is manually reviewed
- The code is deployed to production
After code is committed to the source control repository in a Continuous Integration setup, a set of automated tests is immediately run. These tests are designed to check that the new code changes have not introduced any defects or broken existing functionality. This immediate feedback allows developers to address any issues or bugs instantly, ensuring the codebase remains stable and of high quality.
In a CI/CD pipeline, why is "Docker" often integrated?
- For parallel execution of tests
- To enhance the user interface
- To make software versioning easier
- To reduce dependency issues
Docker is integrated into CI/CD pipelines primarily to encapsulate applications and their dependencies into containers. This ensures that the software runs uniformly across different environments, thereby reducing "works on my machine" kind of issues. Containers provide an isolated environment, minimizing dependency clashes and ensuring the application behaves the same, regardless of where the container is deployed.
Contract Acceptance Testing is critical in _______ projects where the client's requirements are strictly defined from the onset.
- Agile
- Incremental
- Spiral
- Waterfall
In Waterfall projects, stages of the project are sequential, starting with requirement analysis and culminating in product release. Contract Acceptance Testing is crucial because client requirements are strictly defined at the beginning, and any deviation can lead to non-compliance.
Selenium provides support for various programming languages including Java, C#, and _______.
- JavaScript
- Kotlin
- PHP
- Ruby
Selenium is a popular test automation framework that offers bindings for multiple programming languages. While Java and C# are among the prominent ones, Selenium also provides support for Ruby, allowing testers and developers to write test scripts in it.
The primary output of a vulnerability scanning process, which provides a list of vulnerabilities found and their severity, is termed as a _______ report.
- Findings Report
- Security Audit
- Vulnerability Assessment
- Vulnerability Report
A Vulnerability Report provides insights into the vulnerabilities discovered during a vulnerability scanning process. It details the nature, severity, and potential impact of each vulnerability, often suggesting remedies or mitigation strategies. Such reports are crucial for organizations to prioritize and address security risks.
A _______ is a tool that helps visually impaired users by reading out the text displayed on the screen.
- Screen Magnifier
- Screen Reader
- Text-to-Voice Software
- Voice Assistant
A "Screen Reader" is specifically designed to assist visually impaired users by interpreting what is being displayed on the screen and reading it out loud. This allows them to understand and navigate the user interface without the need to see it.
The principle that states defects tend to cluster in certain modules or areas of the software is known as _______.
- Boundary Value
- Defect Clustering
- Error Seeding
- Pesticide Paradox
The "Defect Clustering" principle is based on the Pareto principle, which states that approximately 80% of the problems are found in 20% of the modules. This means that a small number of modules contain most of the defects. Identifying these can lead to focused testing efforts.
The _______ of a digital product refers to a user's overall satisfaction, including efficiency, effectiveness, and emotional responses.
- Functionality
- Interface
- Usability
- User Experience
User Experience (UX) refers to the overall emotions and satisfaction a user derives from using a product or system. It encompasses a broad range of factors including efficiency, effectiveness, accessibility, and emotional responses. It goes beyond mere functionality and looks at the holistic feel and usability.