Which of the following test design techniques is specifically targeted at such failures?
For an ATM banking project introduced earlier, “When the user first inserts a valid credit card type,
the system considers the user to be in an unauthenticated state. When requesting a cash advance,
the user must be in an authenticated state. The user authenticates by entering the proper PIN code.
When authenticating the user, the system shall allow the user to enter their PIN code up to three
times before failing the authentication and rejecting the card. On the first and second try, the system
shall prompt the user to re-enter the PIN code.” Suppose you are concerned that, depending on the
exact number of invalid PIN codes entered, the system might behave improperly. Which of the
following test design techniques is specifically targeted at such failures?
which of the following statements is correct?
Study the “Supercar” classification tree, which of the following statements is correct?
how many test cases are needed to achieve 1-switch coverage?
Using the state diagram (based on the “Route Calculation”), how many test cases are needed to
achieve 1-switch coverage?
which would be the most interesting test set to explicitly test one single boundary value as defined in the
Using the “Tax System” specification scenario as described above, using boundary value analysis,
which would be the most interesting test set to explicitly test one single boundary value as defined
in the “Tax System” specification?
Which of the following test techniques will you use to the processing functionality of the traffic control sys
You are testing the processing of a critical traffic control system to which various regulations apply.
The processing of the input variables is dependent of defined ranges within which the actual
retrieved data values can lie. Which of the following test techniques will you use to the processing
functionality of the traffic control system?
Which of the following descriptions is an example of the use of defect taxonomies?
Which of the following descriptions is an example of the use of defect taxonomies?
Number of correct answers: 1
Which of the following statements fits the principles of experience-based testing?
Which of the following statements fits the principles of experience-based testing?
Which of the following test techniques will you use to test this new web site in its various environments?
A new web site must operate correctly with different browsers (Internet Explorer, Google Chrome,
Firefox, Netscape, Mozilla), using different plug-ins (Realplayer, Mediaplayer), will be receiving pages
from different servers (IIS, Apache and WebLogic) and will be running on various server operation
systems (windows 2007, XP, Linux)
Which of the following test techniques will you use to test this new web site in its various
environments?
Which of the following techniques is most likely be used to support interoperability tests?
A car navigation system needs to be integrated in the overall car software. Interoperability testing is
thus considered to be important. Which of the following techniques is most likely be used to support
interoperability tests?
Which THREE techniques would you recommend?
A company wants to develop a web site to implement an on-line sales channel. The company has
decided to do some usability testing, but resources are limited. The usability testing has therefore to
be done as efficient as possible. Which THREE techniques would you recommend?