Which one of the following is an example of how product risk analysis can influence the testing approach?
The other options are not examples of how product risk analysis can influence the testing approach, because they are either not related to product risks or not based on risk levels. They are:
Tests have been specified for the latest software release and users have prioritised these
However, there are some dependencies between tests as shown in the table below (e.g. Test ID. X cannot be run until Test ID. Y has been successfully completed).
Which test execution schedule best meets the prioritisation and dependency conditions?
The test execution schedule should follow the priority order of the tests, as well as the dependency constraints. The priority order is given by the user value column, where higher values indicate higher priority. The dependency constraints are given by the dependency column, where a test ID indicates that the test cannot be run until the test with that ID has been successfully completed. Therefore, the test execution schedule should start with the highest priority test that has no dependency, which is test 5. Then, it should continue with the next highest priority test that has no dependency or has a satisfied dependency, which is test 1. Then, it should proceed with test 2, which depends on test 1, and then test 3, which depends on test 2. Finally, it should end with test 4, which depends on test 3. Thus, the test execution schedule that best meets the prioritisation and dependency conditions is 5,1,2,3,4.
Which of the types of test tools noted below BEST describes tools that support reviews?
Tools for document review and annotation
Tools for document comparison and version control
Tools for checklist management and defect tracking
Tools for recording user actions and feedback
Tools for analyzing user behavior and satisfaction
Tools for simulating different user interfaces and devices
Tools for data validation and verification
Tools for data cleansing and transformation
Tools for data profiling and analysis
Tools for security testing
Tools for performance testing
Tools for accessibility testing
You are responsible for applying the correct technique (or a review of the requirements document for a project to develop a new software application. You identify the reviewers and the required roles, including the meeting leader, who is the requirements document author, and a separate role for a scribe. Additionally, you decide to take a relatively informal approach to the requirements review. The goal of the review is to find defects in the requirements document, such as omissions, inconsistencies, and duplications. Another goal of the review is to improve the software application's usability and accessibility by considering the various stakeholders' viewpoints.
Which of the following statements BEST describes this scenario?
This scenario is using a walkthrough review type and a perspective-based review technique. A walkthrough is a type of review that is relatively informal and led by the author of the work product. A perspective-based review technique is a technique that involves reviewing the work product from different viewpoints or perspectives of various stakeholders. The scenario matches these descriptions, as it involves an informal approach, a meeting leader who is the author of the requirements document, and a goal of improving the software application's usability and accessibility by considering the various stakeholders' viewpoints. Option A is incorrect, as a pair review is a type of review that involves only two people, usually the author and another team member. Option C is incorrect, as a checklist-based review technique is a technique that involves reviewing the work product against a predefined list of items or criteria. Option D is incorrect, as it combines the incorrect descriptions of options A and C.
You are testing a mobile app that displays a person's status in respect of Covid-19. There are five possibilities: Fully Vaccinated, Partly Vaccinated, Infected & Recovered. Last Tested Positive or Last Tested Negative. You have found that, after receiving data about successful administration of a second injection, the person's status has not changed from Partly Vaccinated to Fully Vaccinated, although it should have done. The project uses a popular proprietary defect management tool where you have drafted an incident report with the following information:
* Test id., test environment used and date/time of run
* Expected and actual results with steps to reproduce.
* Severity level 4 (Critical - an entire functional area is unusable)
* Version data for the application under test and the testware that was used
Which one of the following important items of information is missing?
Priority is an important item of information that is missing from the incident report. Priority indicates the importance or urgency of resolving the incident, based on the business needs and the impact on the stakeholders. Priority is usually assigned by the project manager or the customer, and it helps to determine the order in which incidents should be addressed. Priority may differ from severity, which indicates the degree of impact of the incident on the system or the component under test. Severity is usually assigned by the tester or the developer, and it helps to assess the risk of the incident. For example, an incident may have a high severity but a low priority, if it affects a critical function but only occurs in a rare situation. Conversely, an incident may have a low severity but a high priority, if it affects a minor function but occurs frequently or affects many users. Therefore, both priority and severity are useful information for incident management and resolution.
The other options are not essential information for the incident report, although they may be helpful or desirable in some cases. Recommendations are suggestions or proposals for resolving the incident, which may be provided by the tester, the developer, or other stakeholders. However, recommendations are not mandatory, and they may not be feasible or acceptable in some situations. Name of tester is the identifier of the person who reported the incident, which may be useful for communication or accountability purposes. However, name of tester is not critical, and it may be replaced by other identifiers, such as email address, employee number, or role. Change history is the record of the changes made to the incident report, such as status, resolution, or comments. Change history is valuable for tracking and auditing purposes, but it is not part of the initial incident report, rather it is updated as the incident progresses.
Alison
2 days agoChristiane
17 days agoJerry
18 days agoMarta
1 months agoJaclyn
1 months agoBettina
2 months agoPhyliss
2 months agoJenifer
2 months agoRolland
2 months agoLashaun
2 months agoAudra
2 months agoCasie
2 months agoRashad
3 months agoFletcher
3 months agoRonny
3 months agoLanie
4 months agoWilliam
4 months agoEzekiel
4 months agoElenor
4 months agoEladia
4 months agoDarrin
5 months agoTamesha
5 months agoYvonne
6 months agoFranchesca
7 months agoRosendo
7 months agoColette
7 months agoJesusa
8 months ago