Interview Questions, Answers and Tutorials

Category: Software Testing

Boundary Value Analysis-4

5.2 Critical Fault Assumption The Critical Fault Assumption is also known as the single fault assumption in reliability theory. The assumption relies on the statistic that failures are only rarely the product of two or more simultaneous faults. Upon using this assumption we can reduce the required calculations dramatically.    The number of test cases for our example as you can recall was 9. Upon inspection we find that the function f that computes the number of test cases for a given number of variables n can be shown as:                           …

Boundary Value Analysis-3

5.0 Applying Boundary Value Analysis   In the general application of Boundary Value Analysis can be done in a uniform manner. The basic form of implementation is to maintain all but one of the variables at their nominal (normal or average) values and allowing the remaining variable to take on its extreme values. The values used to test the extremities are:    • Min ———————————— – Minimal  • Min+ ———————————— – Just above Minimal  • Nom ———————————— – Average  • Max- ———————————— – Just below Maximum  • Max ———————————— – Maximum    In continuing our example this results in the following test cases…

Boundary Value Analysis-2

4.0 The Focus of BVA   Boundary Value Analysis focuses on the input variables of the function. For the purposes of this report, I will define two variables ( I will only define two so that further examples can be kept concise) X1 and X2. Where X1 lies between A and B and X2 lies between C and D.     A ≤ X1 ≤ B  C ≤ X2 ≤ D    The values of A, B, C, and D are the extremities of the input domain. These are best demonstrated by figure 4.1.        The Yellow shaded area of the…

Boundary Value Analysis-1

1.0 Introduction   The practice of testing software has become one of the most important aspects of the process of software creation. When we are testing software the first and potentially most crucial step is to design test cases. There are many methods associated with test case design. This report will document the approach known as Boundary Value Analysis (BVA).    As the incredibly influential Dijkstra stated, “Testing can show the presence of bugs, but not the absence”. Although this is true we find that testing can be very good at first, if implemented correctly. For this reason, we need to know…

Requirements Traceability Matrix (RTM)

1. Requirements Traceability Matrix (RTM) A document showing the relationship/mapping between Test Requirements and Test Cases. Elements of RTM: a. Requirements ID b. Requirements Description c. Test Case ID d. Status [Open, Closed, Defer (Later), On hold] 2. Verification and Validation Verification is the process of confirming that something software meets its specification. Validation is the process of confirming that it meets the user’s requirements. Difference between Verification and Validation: Suppose, you are going to buy a pair of shoes having number 9 for you. You have chosen a pair and seen the tag with 9 written on it. This…

Desktop Application Testing

Level 1 – User Interface Testing (GUI Testing): a. Content wording used in the web pages should be correct.   b. Wrap-around should occur properly.   c. Instructions used in the application should be correct (i.e. if you follow each instruction does the expected result occur?)   d. Image spacing – To verify that images are displaying properly with text.Level 2 – Functional Testing a. Check for broken links (Broken link refers to a hyperlink that does not work). b. Warning messages: User input should get verified at the system level according to business rules and error/warning messages should be…

Companies Written Exam Sample Paper Set -2

11. A piece of software has been given….what tests in the following will you perform? 1) Test the areas most critical to business processes 2) Test the areas where faults will be maximum 3) Test the easiest functionalitiesA. 1&2 are true and 3 are false. B. 1,2&3 are true. C. 1 is true, 2&3 are false. D. 1&2 are false, 3 are true. 12. Amount of testing performed will not depend on A. Risks involved B. Contractual requirements C. Legal requirements D. Test data. 13. Which of the following provides the biggest potential cost saving from the use of CAST?…

Companies Written Exam Sample Paper Set -1

1. What is failure? A. Deviation from expected result to the actual result B. Defect in the software. C. Error in the program code. D. Fault in the system. 2. People who don’t participate in technical reviews A. Analysts B. Management C. Developers D. Testers 3. What type of testing is done to supplement the rigorous testing? A. Regression testing. B. Integration testing. C. Error Guessing D. System testing. 4. Capture and replay facilities are least likely to be used to …. A. Performance testing B. Recovery testing C. GUI testing D. User requirements. 5. If a candidate is given…

GUI Testing

GUI testing is a process to test the application’s user interface and to make sure that it confirms the design requirements. 1. Text Box a. Move the Mouse Cursor over all Enter-able TextBoxes. The cursor should change from an arrow to Insert Bar. b. If it doesn’t then the text in the box should be grey or non-update-able. c. Try to overflow the text by typing too many characters. d. Enter invalid characters – Letters in amount fields, try strange characters like +, – *, etc. in All fields. e. SHIFT and Arrow should Select Characters. Selection should also be…

Test Case for E-Commerce Site (login)

LOGIN-1: Normal User Login Purpose:Test that users can log in to the system with the proper user ID and password. Prerequisites:The user is not logged into the system. The user account ‘test.user’ exists and is in good standing. Test Data:User ID: test.userPassword: testing_answers Test Steps:1. Visit the Login page.2. Enter the User ID stated above.3. Enter the Password stated above.4. Click the Submit button. Verify Results:5. The user is logged into the user administration page. Post-Test:6. Click the Logout button. 7. Notes and Questions. LOGIN-2: Invalid User ID Purpose:Test that a user receives an error message when they attempt to…