To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.
The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Some new questions:
Q
As a tester, as part of a V-model project, you are currently executing some tests aimed at verifying if a mobile app asks the user to grant the proper access permissions during the installation process and after the installation process. The requirements specification states that in both cases the app shall ask the user to grant access permissions only to the camera and photos stored on the device. However, you observe that the app also asks the user to grant access permission to all contacts on the device. Consider the following items:
[I]. Test environment
[ii]. Expected result
[iii]. Actual result.
[IV] Test level.
[V]. Root cause.
Based on only the given information, which of the items listed above, are you able to CORRECTLY specify in a defect report?
A. [l] and [IV]
B. [ii] and [III].
C. [ii], [iii] and [v]
D. [ii], [IV] and [V].
Q
Which of the statements correctly describes when a whole team approach may NOT be suitable?
A. When a high level of test independence may be required.
B. When acceptance tests need to be created.
C. When a test automation approach needs to be determined.
D. When the team dynamics need to be improved.
Q
Which of the following statements is incorrect regarding the involvement of testers in the software development lifecycle (SDLC)?
A. Testers should contribute to all activities in the SDLC and participate in design discussions.
B. Testers should be involved from the beginning of the SDLC to increase understanding of design decisions and detect defects early.
C. Testers should only be involved during the testing phase.
D. Testers’ involvement is essential; developers find it difficult to be objective.
Q
A possible risk of introducing test automation is:
A. the tool may not be fit-for-purpose.
B. the tool may create additional development dependencies.
C. the tool may not be compatible with the development platform.
D. the tool will be owned and maintained by developers and replace testers.
Answer: A
Q
Metrics can be collected during and at the end of testing activities to assess which of the following?
i. Progress against the planned schedule and budget.
II . Current quality of the test object.
Hi. Adequacy of the test approach.
iv. Effectiveness of the test activities with respect to the objectives.
v. All the above.
Select the correct answer:
A. Only i and ii.
B. Only i and iii.
C. Only I, ii and iv.
D. Only v.
Q
Which review type, also known as a ”buddy check”, is commonly used in Agile development?
A. Inspection.
B. Walkthrough.
C. Technical review.
D. Informal review.
……………