SlideShare une entreprise Scribd logo
1  sur  3
ISTQB Advanced Level Certification – Study Guide (Part 3)

Prior to appearing for exam for ISTQB Advanced Level certification, it is wise to quickly brush up
your knowledge by reviewing the following questions – answers that are extremely important from
the examination point of view.

Q. 21: What is the underlying objective of Regression Testing?

Retesting the affected function is necessary after the change is incorporated since as many as 20
percent of all corrections result in additional errors. Frequently, additional functions will need to be
tested to ensure that no latent defects were induced by the correction, one method of resolution
would be to treat them as new errors and initiate a new error report. The description of regression
testing should include:

# A list of test paragraphs/objectives retested
# The version of software used to perform regression test
# Indication of successful/unsuccessful accomplishment of test.

<<<<<< =================== >>>>>>

Q. 22: What is the utility of an Error Frequency Report?

Error frequency charts report the quantity of errors per unit of software product. The unit used
may be a section of a requirements specification, a test procedure paragraph, a source code
program unit, or any other objectively identifiable component of a software. The utility of an error
frequency report is based on the Pareto Principle of non homogeneous error distribution. If errors
are non homogeneously distributed in the product to be examined, then units with high detected
error frequencies will probably also have a larger than normal number of latent errors.

<<<<<< =================== >>>>>>

Q. 23: What is the Adequacy Criteria for testing?

Verification of software by testing or other means, is quite indirect. It is necessary to judiciously
constrain the verification process. Conditions that are required to be satisfied during testing are
called adequacy criteria. For example, testing may be considered inadequate if the test data do
not include boundary cases specified by the requirements, do not cause execution of every line of
code, or do not cause the software to deal with error-prone situations.

The intent in establishing these criteria is to improve the quality of the testing. As such, adequacy
criteria serve a purpose somewhat akin to software development standards. Adequacy criteria act
as both specifier and judge: as specifier by indicating the constraints that must be satisfied by the
testing, and as judge by indicating deficiencies in a particular test. Adequacy criteria for testing
are generally expressed by stating some required coverage the test data should achieve.
Desirable coverages include the required features, the software structure, or the potential errors
that might occur in the life cycle.

<<<<<< =================== >>>>>>

Q. 24: What are the limitations of testing?

Some problems cannot be solved on a computer because are either intractable or undecidable.
An undecidable problem is one for which no algorithmic solution is possible. In general, programs
cannot be exhaustively tested (tested for each input). Huang shows that to test exhaustively a
program that reads two 32-bit integers would take on the order of 50 billion years. Even if the
input space is smaller, on the very first input it may be the case that the program does not halt
within a reasonable time. It may even be the case that it is obvious the correct output will be
produced if the program ever does halt. Exhaustive testing can only be completed, therefore, if all
non-halting cases can be detected and eliminated.

Another limitation on the power of testing is its reliance on an oracle. An oracle is a mechanism
that judges whether or not a given output is correct for a given input. In some cases, no oracle
may be available e.g., when the program is written to compute an answer that cannot, in practice,
be computed by hand. Imperfect oracles may be available, but their use is risky. The absence of
an oracle, or the presence of an imperfect oracle weakens significantly any conclusions drawn
from testing.

<<<<<< =================== >>>>>>

Q. 25: What is Fault Seeding?

Fault seeding is a statistical method used to assess the number and nature of the faults
remaining in a program. First, faults are seeded into a program. Then the program is tested, and
the number of faults discovered is used to estimate the number of faults yet undiscovered. A
difficulty with this technique is that the faults seeded must be representative of the yet-
undiscovered faults in the program.

<<<<<< =================== >>>>>>

Q. 26: What is Mutation Analysis?

Mutation analysis uses fault seeding to investigate properties of test data. Programs with seeded
faults are called mutants. Mutants are executed to determine whether or not they behave
differently from the original program. Mutants that behave differently are said to have been killed
by the test. The product of mutation analysis is a measure of how well test data kill mutants.
Mutants are produced by applying a mutation operator. Such an operator changes a single
expression in the program to another expression, selected from a finite class of expressions. For
example, a constant might be incremented by one, decremented by one, or replaced by zero,
yielding one of three mutants. Applying the mutation operators at each point in a program where
they are applicable forms a finite, albeit large, set of mutants.

<<<<<< =================== >>>>>>

Q. 27: What are the conditions necessary for a fault to cause a program failure?

Three conditions necessary and sufficient for a fault to cause a program failure are execution,
infection, and propagation. The fault location must be executed, the resulting data state must be
infected with an erroneous value, and the succeeding computation must propagate the infection
through erroneous data states, producing a failure.

Sensitivity analysis investigates the three conditions required for failure, with particular focus on
infection and propagation of errors.

Infection analysis employs mutation analysis to determine the probability of a data state’s being
infected after a potentially faulty statement is executed.

Propagation analysis mutates the data state to determine the probability that an infected data
state will cause a program failure.

<<<<<< =================== >>>>>>

Q. 28: What is Symbolic Analysis?
Symbolic analysis seeks to describe the function computed by a program in a more general way.
A symbolic execution system accepts three inputs: a program to be interpreted, symbolic input for
the program, and the path to follow. It produces two outputs: the symbolic output that describes
the computation of the selected path, and the path condition for that path. The specification of the
path can be either interactive or pre-selected. The symbolic output can be used to prove the
program correct with respect to its specification, and the path condition can be used for
generating test data to exercise the desired path. Structured data types cause difficulties,
however, since it is sometimes impossible to deduce what component is being modified.

<<<<<< =================== >>>>>>

Q. 29: What is Specification Oriented Testing?

Program testing is specification-oriented when test data are developed from documents and
understandings intended to specify a module’s behavior. Sources include, but are not limited to,
the actual written specification and the high- and low-level designs of the code to be tested. The
goal is to test for the presence of each (required) software feature, including the input domains,
the output domains, categories of inputs that should receive equivalent processing, and the
processing functions themselves.

Specification-oriented testing seeks to show that every requirement is addressed by the software.
An unimplemented requirement may be reflected in a missing path or missing code in the
software. Specification-oriented testing assumes a functional view of the software and sometimes
is called functional or black-box testing.

<<<<<< =================== >>>>>>

Q. 30: What is Input Domain Testing?

It is the testing based on the interface of the module. In extremal testing, test data are
chosen to cover the extremes of the input domain. Similarly, midrange testing selects data
from the interiors of domains. For structured input domains, combinations of extremal points
for each component are chosen. This procedure can generate a large quantity of data.

Read More articles on ISTQB CTAL Advanced Level Certifications at

http://www.softwaretestinggenius.com/categoryDetail.php?catId=166

Contenu connexe

Tendances

software testing strategies
software testing strategiessoftware testing strategies
software testing strategies
Hemanth Gajula
 
Software quality assurance lecture 1
Software quality assurance lecture 1Software quality assurance lecture 1
Software quality assurance lecture 1
Abdul Basit
 
Software quality assurance
Software quality assuranceSoftware quality assurance
Software quality assurance
Er. Nancy
 
Test Management Training
Test Management TrainingTest Management Training
Test Management Training
suhasreddy1
 
Term Paper - Quality Assurance in Software Development
Term Paper - Quality Assurance in Software DevelopmentTerm Paper - Quality Assurance in Software Development
Term Paper - Quality Assurance in Software Development
Sharad Srivastava
 
Ch 7 integrating quality activities in the projectlife cycle
Ch 7 integrating quality activities in the projectlife cycleCh 7 integrating quality activities in the projectlife cycle
Ch 7 integrating quality activities in the projectlife cycle
Kittitouch Suteeca
 
Software Quality Challenge
Software Quality ChallengeSoftware Quality Challenge
Software Quality Challenge
Helmy Satria
 
Chapter 8 software quality assurance and configuration audit
Chapter 8 software quality assurance and configuration auditChapter 8 software quality assurance and configuration audit
Chapter 8 software quality assurance and configuration audit
Cliftone Mullah
 
Defect Analytics & Statistical Trends
Defect Analytics & Statistical TrendsDefect Analytics & Statistical Trends
Defect Analytics & Statistical Trends
Mani Nutulapati
 
Software Quality Framework Introduction
Software Quality Framework IntroductionSoftware Quality Framework Introduction
Software Quality Framework Introduction
Don Hough
 

Tendances (20)

software testing strategies
software testing strategiessoftware testing strategies
software testing strategies
 
Software quality assurance lecture 1
Software quality assurance lecture 1Software quality assurance lecture 1
Software quality assurance lecture 1
 
Software Quality Assurance
Software Quality AssuranceSoftware Quality Assurance
Software Quality Assurance
 
Software quality assurance
Software quality assuranceSoftware quality assurance
Software quality assurance
 
Test Management Training
Test Management TrainingTest Management Training
Test Management Training
 
Term Paper - Quality Assurance in Software Development
Term Paper - Quality Assurance in Software DevelopmentTerm Paper - Quality Assurance in Software Development
Term Paper - Quality Assurance in Software Development
 
Software Quality Assurance class 1
Software Quality Assurance  class 1Software Quality Assurance  class 1
Software Quality Assurance class 1
 
Chapter 2 - Performance Measurement Fundamentals
Chapter 2 - Performance Measurement FundamentalsChapter 2 - Performance Measurement Fundamentals
Chapter 2 - Performance Measurement Fundamentals
 
Test management
Test managementTest management
Test management
 
Ch 7 integrating quality activities in the projectlife cycle
Ch 7 integrating quality activities in the projectlife cycleCh 7 integrating quality activities in the projectlife cycle
Ch 7 integrating quality activities in the projectlife cycle
 
Software Quality Challenge
Software Quality ChallengeSoftware Quality Challenge
Software Quality Challenge
 
Test cases planning
Test cases planningTest cases planning
Test cases planning
 
Chapter 8 software quality assurance and configuration audit
Chapter 8 software quality assurance and configuration auditChapter 8 software quality assurance and configuration audit
Chapter 8 software quality assurance and configuration audit
 
Software test management overview for managers
Software test management overview for managersSoftware test management overview for managers
Software test management overview for managers
 
Defect Analytics & Statistical Trends
Defect Analytics & Statistical TrendsDefect Analytics & Statistical Trends
Defect Analytics & Statistical Trends
 
SECh1920
SECh1920SECh1920
SECh1920
 
Software Product Measurement and Analysis in a Continuous Integration Environ...
Software Product Measurement and Analysis in a Continuous Integration Environ...Software Product Measurement and Analysis in a Continuous Integration Environ...
Software Product Measurement and Analysis in a Continuous Integration Environ...
 
Software Quality Framework Introduction
Software Quality Framework IntroductionSoftware Quality Framework Introduction
Software Quality Framework Introduction
 
Neeraj_Kumar
Neeraj_KumarNeeraj_Kumar
Neeraj_Kumar
 
Introduction To Software Quality Assurance
Introduction To Software Quality AssuranceIntroduction To Software Quality Assurance
Introduction To Software Quality Assurance
 

Similaire à ISTQB Advanced Study Guide - 3

st-notes-13-26-software-testing-is-the-act-of-examining-the-artifacts-and-the...
st-notes-13-26-software-testing-is-the-act-of-examining-the-artifacts-and-the...st-notes-13-26-software-testing-is-the-act-of-examining-the-artifacts-and-the...
st-notes-13-26-software-testing-is-the-act-of-examining-the-artifacts-and-the...
mwpeexdvjgtqujwhog
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 

Similaire à ISTQB Advanced Study Guide - 3 (20)

ISTQB Advanced Study Guide - 4
ISTQB Advanced Study Guide - 4ISTQB Advanced Study Guide - 4
ISTQB Advanced Study Guide - 4
 
st-notes-13-26-software-testing-is-the-act-of-examining-the-artifacts-and-the...
st-notes-13-26-software-testing-is-the-act-of-examining-the-artifacts-and-the...st-notes-13-26-software-testing-is-the-act-of-examining-the-artifacts-and-the...
st-notes-13-26-software-testing-is-the-act-of-examining-the-artifacts-and-the...
 
Chapter 9 Testing Strategies.ppt
Chapter 9 Testing Strategies.pptChapter 9 Testing Strategies.ppt
Chapter 9 Testing Strategies.ppt
 
Software Testing
Software TestingSoftware Testing
Software Testing
 
O0181397100
O0181397100O0181397100
O0181397100
 
Test case-point-analysis (whitepaper)
Test case-point-analysis (whitepaper)Test case-point-analysis (whitepaper)
Test case-point-analysis (whitepaper)
 
Software Testing Interview Questions For Experienced
Software Testing Interview Questions For ExperiencedSoftware Testing Interview Questions For Experienced
Software Testing Interview Questions For Experienced
 
Testing
Testing Testing
Testing
 
Software testing
Software testingSoftware testing
Software testing
 
Software testing & Quality Assurance
Software testing & Quality Assurance Software testing & Quality Assurance
Software testing & Quality Assurance
 
Some Commonly Asked Question For Software Testing
Some Commonly Asked Question For Software TestingSome Commonly Asked Question For Software Testing
Some Commonly Asked Question For Software Testing
 
Testing ppt
Testing pptTesting ppt
Testing ppt
 
Testing Slides 1 (Testing Intro+Static Testing).pdf
Testing Slides 1 (Testing Intro+Static Testing).pdfTesting Slides 1 (Testing Intro+Static Testing).pdf
Testing Slides 1 (Testing Intro+Static Testing).pdf
 
A Complexity Based Regression Test Selection Strategy
A Complexity Based Regression Test Selection StrategyA Complexity Based Regression Test Selection Strategy
A Complexity Based Regression Test Selection Strategy
 
SE-Testing.ppt
SE-Testing.pptSE-Testing.ppt
SE-Testing.ppt
 
testing
testingtesting
testing
 
A COMPOSITION ON SOFTWARE TESTING
A COMPOSITION ON SOFTWARE TESTINGA COMPOSITION ON SOFTWARE TESTING
A COMPOSITION ON SOFTWARE TESTING
 
Software testing
Software testingSoftware testing
Software testing
 
Software testing
Software testingSoftware testing
Software testing
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 

Plus de Yogindernath Gupta

ISTQB / ISEB Foundation Exam Practice
ISTQB / ISEB Foundation Exam PracticeISTQB / ISEB Foundation Exam Practice
ISTQB / ISEB Foundation Exam Practice
Yogindernath Gupta
 
ISTQB / ISEB Foundation Exam Practice - 2
ISTQB / ISEB Foundation Exam Practice - 2ISTQB / ISEB Foundation Exam Practice - 2
ISTQB / ISEB Foundation Exam Practice - 2
Yogindernath Gupta
 
ISTQB / ISEB Foundation Exam Practice -1
ISTQB / ISEB Foundation Exam Practice -1ISTQB / ISEB Foundation Exam Practice -1
ISTQB / ISEB Foundation Exam Practice -1
Yogindernath Gupta
 
Introduction to specification based test design techniques
Introduction to specification based test design techniquesIntroduction to specification based test design techniques
Introduction to specification based test design techniques
Yogindernath Gupta
 

Plus de Yogindernath Gupta (20)

Introduction to ISTQB & ISEB Certifications
Introduction to ISTQB & ISEB CertificationsIntroduction to ISTQB & ISEB Certifications
Introduction to ISTQB & ISEB Certifications
 
Learn Software Testing for ISTQB Foundation Exam
Learn Software Testing for ISTQB Foundation ExamLearn Software Testing for ISTQB Foundation Exam
Learn Software Testing for ISTQB Foundation Exam
 
ISTQB / ISEB Foundation Exam Practice - 6
ISTQB / ISEB Foundation Exam Practice - 6ISTQB / ISEB Foundation Exam Practice - 6
ISTQB / ISEB Foundation Exam Practice - 6
 
ISTQB / ISEB Foundation Exam Practice - 5
ISTQB / ISEB Foundation Exam Practice - 5ISTQB / ISEB Foundation Exam Practice - 5
ISTQB / ISEB Foundation Exam Practice - 5
 
ISTQB / ISEB Foundation Exam Practice - 4
ISTQB / ISEB Foundation Exam Practice - 4ISTQB / ISEB Foundation Exam Practice - 4
ISTQB / ISEB Foundation Exam Practice - 4
 
ISTQB / ISEB Foundation Exam Practice
ISTQB / ISEB Foundation Exam PracticeISTQB / ISEB Foundation Exam Practice
ISTQB / ISEB Foundation Exam Practice
 
ISTQB / ISEB Foundation Exam Practice - 2
ISTQB / ISEB Foundation Exam Practice - 2ISTQB / ISEB Foundation Exam Practice - 2
ISTQB / ISEB Foundation Exam Practice - 2
 
ISTQB / ISEB Foundation Exam Practice -1
ISTQB / ISEB Foundation Exam Practice -1ISTQB / ISEB Foundation Exam Practice -1
ISTQB / ISEB Foundation Exam Practice -1
 
ISTQB Advanced Study Guide - 8
ISTQB Advanced Study Guide - 8ISTQB Advanced Study Guide - 8
ISTQB Advanced Study Guide - 8
 
ISTQB Advanced Study Guide - 7
ISTQB Advanced Study Guide - 7ISTQB Advanced Study Guide - 7
ISTQB Advanced Study Guide - 7
 
ISTQB Advanced Study Guide - 6
ISTQB Advanced Study Guide - 6ISTQB Advanced Study Guide - 6
ISTQB Advanced Study Guide - 6
 
ISTQB Advanced Study Guide - 5
ISTQB Advanced Study Guide - 5ISTQB Advanced Study Guide - 5
ISTQB Advanced Study Guide - 5
 
Introduction to specification based test design techniques
Introduction to specification based test design techniquesIntroduction to specification based test design techniques
Introduction to specification based test design techniques
 
Knowledge Levels In Certifications
Knowledge Levels In CertificationsKnowledge Levels In Certifications
Knowledge Levels In Certifications
 
Design Review & Software Testing
Design Review & Software TestingDesign Review & Software Testing
Design Review & Software Testing
 
Software Development Life Cycle - SDLC
Software Development Life Cycle - SDLCSoftware Development Life Cycle - SDLC
Software Development Life Cycle - SDLC
 
Tutorial - 16 : How to pass parameters from one script to another by CallScri...
Tutorial - 16 : How to pass parameters from one script to another by CallScri...Tutorial - 16 : How to pass parameters from one script to another by CallScri...
Tutorial - 16 : How to pass parameters from one script to another by CallScri...
 
Tutorial - 14 How to insert a verification point from the script explorer usi...
Tutorial - 14 How to insert a verification point from the script explorer usi...Tutorial - 14 How to insert a verification point from the script explorer usi...
Tutorial - 14 How to insert a verification point from the script explorer usi...
 
A Practical Roadmap To HP QTP Certification
A Practical Roadmap To HP QTP CertificationA Practical Roadmap To HP QTP Certification
A Practical Roadmap To HP QTP Certification
 
Unearthing The Power Of IBM – Rational Functional Tester 7.0 - RFT
Unearthing The Power Of IBM – Rational Functional Tester 7.0 - RFTUnearthing The Power Of IBM – Rational Functional Tester 7.0 - RFT
Unearthing The Power Of IBM – Rational Functional Tester 7.0 - RFT
 

Dernier

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Dernier (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

ISTQB Advanced Study Guide - 3

  • 1. ISTQB Advanced Level Certification – Study Guide (Part 3) Prior to appearing for exam for ISTQB Advanced Level certification, it is wise to quickly brush up your knowledge by reviewing the following questions – answers that are extremely important from the examination point of view. Q. 21: What is the underlying objective of Regression Testing? Retesting the affected function is necessary after the change is incorporated since as many as 20 percent of all corrections result in additional errors. Frequently, additional functions will need to be tested to ensure that no latent defects were induced by the correction, one method of resolution would be to treat them as new errors and initiate a new error report. The description of regression testing should include: # A list of test paragraphs/objectives retested # The version of software used to perform regression test # Indication of successful/unsuccessful accomplishment of test. <<<<<< =================== >>>>>> Q. 22: What is the utility of an Error Frequency Report? Error frequency charts report the quantity of errors per unit of software product. The unit used may be a section of a requirements specification, a test procedure paragraph, a source code program unit, or any other objectively identifiable component of a software. The utility of an error frequency report is based on the Pareto Principle of non homogeneous error distribution. If errors are non homogeneously distributed in the product to be examined, then units with high detected error frequencies will probably also have a larger than normal number of latent errors. <<<<<< =================== >>>>>> Q. 23: What is the Adequacy Criteria for testing? Verification of software by testing or other means, is quite indirect. It is necessary to judiciously constrain the verification process. Conditions that are required to be satisfied during testing are called adequacy criteria. For example, testing may be considered inadequate if the test data do not include boundary cases specified by the requirements, do not cause execution of every line of code, or do not cause the software to deal with error-prone situations. The intent in establishing these criteria is to improve the quality of the testing. As such, adequacy criteria serve a purpose somewhat akin to software development standards. Adequacy criteria act as both specifier and judge: as specifier by indicating the constraints that must be satisfied by the testing, and as judge by indicating deficiencies in a particular test. Adequacy criteria for testing are generally expressed by stating some required coverage the test data should achieve. Desirable coverages include the required features, the software structure, or the potential errors that might occur in the life cycle. <<<<<< =================== >>>>>> Q. 24: What are the limitations of testing? Some problems cannot be solved on a computer because are either intractable or undecidable. An undecidable problem is one for which no algorithmic solution is possible. In general, programs cannot be exhaustively tested (tested for each input). Huang shows that to test exhaustively a program that reads two 32-bit integers would take on the order of 50 billion years. Even if the input space is smaller, on the very first input it may be the case that the program does not halt
  • 2. within a reasonable time. It may even be the case that it is obvious the correct output will be produced if the program ever does halt. Exhaustive testing can only be completed, therefore, if all non-halting cases can be detected and eliminated. Another limitation on the power of testing is its reliance on an oracle. An oracle is a mechanism that judges whether or not a given output is correct for a given input. In some cases, no oracle may be available e.g., when the program is written to compute an answer that cannot, in practice, be computed by hand. Imperfect oracles may be available, but their use is risky. The absence of an oracle, or the presence of an imperfect oracle weakens significantly any conclusions drawn from testing. <<<<<< =================== >>>>>> Q. 25: What is Fault Seeding? Fault seeding is a statistical method used to assess the number and nature of the faults remaining in a program. First, faults are seeded into a program. Then the program is tested, and the number of faults discovered is used to estimate the number of faults yet undiscovered. A difficulty with this technique is that the faults seeded must be representative of the yet- undiscovered faults in the program. <<<<<< =================== >>>>>> Q. 26: What is Mutation Analysis? Mutation analysis uses fault seeding to investigate properties of test data. Programs with seeded faults are called mutants. Mutants are executed to determine whether or not they behave differently from the original program. Mutants that behave differently are said to have been killed by the test. The product of mutation analysis is a measure of how well test data kill mutants. Mutants are produced by applying a mutation operator. Such an operator changes a single expression in the program to another expression, selected from a finite class of expressions. For example, a constant might be incremented by one, decremented by one, or replaced by zero, yielding one of three mutants. Applying the mutation operators at each point in a program where they are applicable forms a finite, albeit large, set of mutants. <<<<<< =================== >>>>>> Q. 27: What are the conditions necessary for a fault to cause a program failure? Three conditions necessary and sufficient for a fault to cause a program failure are execution, infection, and propagation. The fault location must be executed, the resulting data state must be infected with an erroneous value, and the succeeding computation must propagate the infection through erroneous data states, producing a failure. Sensitivity analysis investigates the three conditions required for failure, with particular focus on infection and propagation of errors. Infection analysis employs mutation analysis to determine the probability of a data state’s being infected after a potentially faulty statement is executed. Propagation analysis mutates the data state to determine the probability that an infected data state will cause a program failure. <<<<<< =================== >>>>>> Q. 28: What is Symbolic Analysis?
  • 3. Symbolic analysis seeks to describe the function computed by a program in a more general way. A symbolic execution system accepts three inputs: a program to be interpreted, symbolic input for the program, and the path to follow. It produces two outputs: the symbolic output that describes the computation of the selected path, and the path condition for that path. The specification of the path can be either interactive or pre-selected. The symbolic output can be used to prove the program correct with respect to its specification, and the path condition can be used for generating test data to exercise the desired path. Structured data types cause difficulties, however, since it is sometimes impossible to deduce what component is being modified. <<<<<< =================== >>>>>> Q. 29: What is Specification Oriented Testing? Program testing is specification-oriented when test data are developed from documents and understandings intended to specify a module’s behavior. Sources include, but are not limited to, the actual written specification and the high- and low-level designs of the code to be tested. The goal is to test for the presence of each (required) software feature, including the input domains, the output domains, categories of inputs that should receive equivalent processing, and the processing functions themselves. Specification-oriented testing seeks to show that every requirement is addressed by the software. An unimplemented requirement may be reflected in a missing path or missing code in the software. Specification-oriented testing assumes a functional view of the software and sometimes is called functional or black-box testing. <<<<<< =================== >>>>>> Q. 30: What is Input Domain Testing? It is the testing based on the interface of the module. In extremal testing, test data are chosen to cover the extremes of the input domain. Similarly, midrange testing selects data from the interiors of domains. For structured input domains, combinations of extremal points for each component are chosen. This procedure can generate a large quantity of data. Read More articles on ISTQB CTAL Advanced Level Certifications at http://www.softwaretestinggenius.com/categoryDetail.php?catId=166