Which phase of Risk Management in Testing involves determining the likelihood and impact of a risk?
- Risk Assessment
- Risk Identification
- Risk Mitigation
- Risk Monitoring
In the "Risk Assessment" phase of Risk Management, the identified risks are further evaluated to determine their likelihood of occurrence and the potential impact on the project. This provides clarity on which risks need urgent attention and which can be monitored periodically.
What distinguishes Contract Acceptance Testing from other types of Acceptance Testing?
- It focuses on system integration.
- It follows strict formal protocols.
- It is performed by external agencies.
- It's based solely on user feedback.
Contract Acceptance Testing is distinguished by its strict adherence to formal protocols and contractual specifications. The main objective is to ensure the software system meets the criteria defined in the contract before it is accepted, making it more legally-binding in nature than other types of acceptance testing.
In Continuous Integration, what is typically done immediately after code is committed to the source control repository?
- A set of automated tests is run
- Code is archived
- Code is manually reviewed
- The code is deployed to production
After code is committed to the source control repository in a Continuous Integration setup, a set of automated tests is immediately run. These tests are designed to check that the new code changes have not introduced any defects or broken existing functionality. This immediate feedback allows developers to address any issues or bugs instantly, ensuring the codebase remains stable and of high quality.
In a CI/CD pipeline, why is "Docker" often integrated?
- For parallel execution of tests
- To enhance the user interface
- To make software versioning easier
- To reduce dependency issues
Docker is integrated into CI/CD pipelines primarily to encapsulate applications and their dependencies into containers. This ensures that the software runs uniformly across different environments, thereby reducing "works on my machine" kind of issues. Containers provide an isolated environment, minimizing dependency clashes and ensuring the application behaves the same, regardless of where the container is deployed.
For improved traceability in CI/CD, each code commit should be linked to a specific _______.
- Code Comment
- Developer Name
- Issue or Ticket
- Release Date
To ensure improved traceability in CI/CD pipelines, it's crucial to link each code commit to a specific "Issue or Ticket". This provides context about why a particular change was made, aids in debugging, and ensures transparency and accountability in the process.
Non-incremental integration testing is sometimes called _______ because of its sudden and comprehensive integration nature.
- Big Bang
- Sandwich
- Stub
- Top-down
Non-incremental integration testing, commonly referred to as the Big Bang approach, involves integrating all modules suddenly at once and then testing the entire system. This approach is risky because if any defects arise, it becomes difficult to identify the root cause since everything is integrated all at once.
Selenium provides support for various programming languages including Java, C#, and _______.
- JavaScript
- Kotlin
- PHP
- Ruby
Selenium is a popular test automation framework that offers bindings for multiple programming languages. While Java and C# are among the prominent ones, Selenium also provides support for Ruby, allowing testers and developers to write test scripts in it.
The primary output of a vulnerability scanning process, which provides a list of vulnerabilities found and their severity, is termed as a _______ report.
- Findings Report
- Security Audit
- Vulnerability Assessment
- Vulnerability Report
A Vulnerability Report provides insights into the vulnerabilities discovered during a vulnerability scanning process. It details the nature, severity, and potential impact of each vulnerability, often suggesting remedies or mitigation strategies. Such reports are crucial for organizations to prioritize and address security risks.
A _______ is a tool that helps visually impaired users by reading out the text displayed on the screen.
- Screen Magnifier
- Screen Reader
- Text-to-Voice Software
- Voice Assistant
A "Screen Reader" is specifically designed to assist visually impaired users by interpreting what is being displayed on the screen and reading it out loud. This allows them to understand and navigate the user interface without the need to see it.
The principle that states defects tend to cluster in certain modules or areas of the software is known as _______.
- Boundary Value
- Defect Clustering
- Error Seeding
- Pesticide Paradox
The "Defect Clustering" principle is based on the Pareto principle, which states that approximately 80% of the problems are found in 20% of the modules. This means that a small number of modules contain most of the defects. Identifying these can lead to focused testing efforts.