Which statement about test automation being applied to a reactive test approach, is CORRECT’
SELECT ONE OPTION
A risk-based approach is being taken to test a new web-based retail application. Which of the following activities is the Technical Test Analyst NOT usually expected to perform?
Consider the following fault attack:
• Force all possible incoming errors from the software/operating system interfaces to the application.
Which of the following is the kind of failure you are looking for when using this attack?
Considering the following statements:
A) The data used for a test is held external to the automated script
B) The scope of an automated test suite is driven by the range of test data available
C) It uses a high-level language to separate the action to be performed on the test data from the test script
D) A spreadsheet is used to record the actions to be performed instead of the input data
Which of the following options is the correct selection of these statements to describe data-driven and keyword-driven automation?
Consider the pseudo code provided below:
Given the following tests, what additional test(s) (if any) would be needed in order to achieve 100% statement coverage, with the minimum number of tests?
Test 1: A = 7, B = 7, Expected output: 7
Test 2: A = 7, B = 5, Expected output: 5
The following user story has been written:
As a paying hotel guest
I want to see the charges that have been added to my bill
So that I can monitor my expenditure and know In advance how much I will have to pay when I check out
The notes that have been added to It mention that It must be possible for the guest to get a printout of the bill, see It In a variety of currencies and set a flag in the hotel's billing system against any Item that they wish to challenge.
The following acceptance criteria have been defined:
1.The user shall be able to choose from the most commonly-used currencies.
2.The application must be accessible on most mobile platforms as well as on the hotel room's smart TV.
3.The hotel manager must be notified whenever a bill item is flagged by a hotel guest.
4.End-to-end response time for any individual request submitted by a user must not exceed 7 seconds.
Applying the INVEST technique to this user story, including its acceptance criteria, which of the following statements is correct?
SELECT ONE OPTION
Which of the following statements is TRUE regarding tools that support component testing and the build process?
BestFor Incorporated is a rapidly growing online financial services company that offers guidance to its customers on a range of financial products. Its first website, BestForMortgages, was launched two years ago, shortly followed by BestForPensions. The popularity of both sites has driven the company to expand its offerings into other sectors and a third website, BestForFood, has recently been released.
The first two websites have proven to be functionally robust but suffered from performance issues due to:
Underestimation of concurrent user access at peak times in its original operational profiles
Data volumes rapidly growing beyond expectations on a single database shared by both sites.
All three websites share the same web server.
The BestForFood system has been running live for several months, however the following significant non-functional defects have been recorded:
A) The layout and navigation of the BestForFood website was not considered by the users as consistent with BestForPensions and BestForMortgages
B) Soon after delivering the BestForFood system the performance of both BestForPensions and BestForMortgages noticeably slowed
C) The time taken to diagnose, repair and re-test production defects did not meet BestForFood service level agreements
D) BestForFood performance was adversely impacted by unexpected growth in data volumes
E) The time taken to install monthly builds into the production system exceeded agreed timescales.
Which TWO of these defects might have been prevented had portability testing and compatibility testing been employed?