SlideShare ist ein Scribd-Unternehmen logo
1 von 3
ISTQB Advanced Level Certification – Study Guide (Part 3)

Prior to appearing for exam for ISTQB Advanced Level certification, it is wise to quickly brush up
your knowledge by reviewing the following questions – answers that are extremely important from
the examination point of view.

Q. 21: What is the underlying objective of Regression Testing?

Retesting the affected function is necessary after the change is incorporated since as many as 20
percent of all corrections result in additional errors. Frequently, additional functions will need to be
tested to ensure that no latent defects were induced by the correction, one method of resolution
would be to treat them as new errors and initiate a new error report. The description of regression
testing should include:

# A list of test paragraphs/objectives retested
# The version of software used to perform regression test
# Indication of successful/unsuccessful accomplishment of test.

<<<<<< =================== >>>>>>

Q. 22: What is the utility of an Error Frequency Report?

Error frequency charts report the quantity of errors per unit of software product. The unit used
may be a section of a requirements specification, a test procedure paragraph, a source code
program unit, or any other objectively identifiable component of a software. The utility of an error
frequency report is based on the Pareto Principle of non homogeneous error distribution. If errors
are non homogeneously distributed in the product to be examined, then units with high detected
error frequencies will probably also have a larger than normal number of latent errors.

<<<<<< =================== >>>>>>

Q. 23: What is the Adequacy Criteria for testing?

Verification of software by testing or other means, is quite indirect. It is necessary to judiciously
constrain the verification process. Conditions that are required to be satisfied during testing are
called adequacy criteria. For example, testing may be considered inadequate if the test data do
not include boundary cases specified by the requirements, do not cause execution of every line of
code, or do not cause the software to deal with error-prone situations.

The intent in establishing these criteria is to improve the quality of the testing. As such, adequacy
criteria serve a purpose somewhat akin to software development standards. Adequacy criteria act
as both specifier and judge: as specifier by indicating the constraints that must be satisfied by the
testing, and as judge by indicating deficiencies in a particular test. Adequacy criteria for testing
are generally expressed by stating some required coverage the test data should achieve.
Desirable coverages include the required features, the software structure, or the potential errors
that might occur in the life cycle.

<<<<<< =================== >>>>>>

Q. 24: What are the limitations of testing?

Some problems cannot be solved on a computer because are either intractable or undecidable.
An undecidable problem is one for which no algorithmic solution is possible. In general, programs
cannot be exhaustively tested (tested for each input). Huang shows that to test exhaustively a
program that reads two 32-bit integers would take on the order of 50 billion years. Even if the
input space is smaller, on the very first input it may be the case that the program does not halt
within a reasonable time. It may even be the case that it is obvious the correct output will be
produced if the program ever does halt. Exhaustive testing can only be completed, therefore, if all
non-halting cases can be detected and eliminated.

Another limitation on the power of testing is its reliance on an oracle. An oracle is a mechanism
that judges whether or not a given output is correct for a given input. In some cases, no oracle
may be available e.g., when the program is written to compute an answer that cannot, in practice,
be computed by hand. Imperfect oracles may be available, but their use is risky. The absence of
an oracle, or the presence of an imperfect oracle weakens significantly any conclusions drawn
from testing.

<<<<<< =================== >>>>>>

Q. 25: What is Fault Seeding?

Fault seeding is a statistical method used to assess the number and nature of the faults
remaining in a program. First, faults are seeded into a program. Then the program is tested, and
the number of faults discovered is used to estimate the number of faults yet undiscovered. A
difficulty with this technique is that the faults seeded must be representative of the yet-
undiscovered faults in the program.

<<<<<< =================== >>>>>>

Q. 26: What is Mutation Analysis?

Mutation analysis uses fault seeding to investigate properties of test data. Programs with seeded
faults are called mutants. Mutants are executed to determine whether or not they behave
differently from the original program. Mutants that behave differently are said to have been killed
by the test. The product of mutation analysis is a measure of how well test data kill mutants.
Mutants are produced by applying a mutation operator. Such an operator changes a single
expression in the program to another expression, selected from a finite class of expressions. For
example, a constant might be incremented by one, decremented by one, or replaced by zero,
yielding one of three mutants. Applying the mutation operators at each point in a program where
they are applicable forms a finite, albeit large, set of mutants.

<<<<<< =================== >>>>>>

Q. 27: What are the conditions necessary for a fault to cause a program failure?

Three conditions necessary and sufficient for a fault to cause a program failure are execution,
infection, and propagation. The fault location must be executed, the resulting data state must be
infected with an erroneous value, and the succeeding computation must propagate the infection
through erroneous data states, producing a failure.

Sensitivity analysis investigates the three conditions required for failure, with particular focus on
infection and propagation of errors.

Infection analysis employs mutation analysis to determine the probability of a data state’s being
infected after a potentially faulty statement is executed.

Propagation analysis mutates the data state to determine the probability that an infected data
state will cause a program failure.

<<<<<< =================== >>>>>>

Q. 28: What is Symbolic Analysis?
Symbolic analysis seeks to describe the function computed by a program in a more general way.
A symbolic execution system accepts three inputs: a program to be interpreted, symbolic input for
the program, and the path to follow. It produces two outputs: the symbolic output that describes
the computation of the selected path, and the path condition for that path. The specification of the
path can be either interactive or pre-selected. The symbolic output can be used to prove the
program correct with respect to its specification, and the path condition can be used for
generating test data to exercise the desired path. Structured data types cause difficulties,
however, since it is sometimes impossible to deduce what component is being modified.

<<<<<< =================== >>>>>>

Q. 29: What is Specification Oriented Testing?

Program testing is specification-oriented when test data are developed from documents and
understandings intended to specify a module’s behavior. Sources include, but are not limited to,
the actual written specification and the high- and low-level designs of the code to be tested. The
goal is to test for the presence of each (required) software feature, including the input domains,
the output domains, categories of inputs that should receive equivalent processing, and the
processing functions themselves.

Specification-oriented testing seeks to show that every requirement is addressed by the software.
An unimplemented requirement may be reflected in a missing path or missing code in the
software. Specification-oriented testing assumes a functional view of the software and sometimes
is called functional or black-box testing.

<<<<<< =================== >>>>>>

Q. 30: What is Input Domain Testing?

It is the testing based on the interface of the module. In extremal testing, test data are
chosen to cover the extremes of the input domain. Similarly, midrange testing selects data
from the interiors of domains. For structured input domains, combinations of extremal points
for each component are chosen. This procedure can generate a large quantity of data.

Read More articles on ISTQB CTAL Advanced Level Certifications at

http://www.softwaretestinggenius.com/categoryDetail.php?catId=166

Weitere ähnliche Inhalte

Was ist angesagt?

software testing strategies
software testing strategiessoftware testing strategies
software testing strategies
Hemanth Gajula
 
Software quality assurance lecture 1
Software quality assurance lecture 1Software quality assurance lecture 1
Software quality assurance lecture 1
Abdul Basit
 
Software quality assurance
Software quality assuranceSoftware quality assurance
Software quality assurance
Er. Nancy
 
Test Management Training
Test Management TrainingTest Management Training
Test Management Training
suhasreddy1
 
Term Paper - Quality Assurance in Software Development
Term Paper - Quality Assurance in Software DevelopmentTerm Paper - Quality Assurance in Software Development
Term Paper - Quality Assurance in Software Development
Sharad Srivastava
 
Ch 7 integrating quality activities in the projectlife cycle
Ch 7 integrating quality activities in the projectlife cycleCh 7 integrating quality activities in the projectlife cycle
Ch 7 integrating quality activities in the projectlife cycle
Kittitouch Suteeca
 
Software Quality Challenge
Software Quality ChallengeSoftware Quality Challenge
Software Quality Challenge
Helmy Satria
 
Chapter 8 software quality assurance and configuration audit
Chapter 8 software quality assurance and configuration auditChapter 8 software quality assurance and configuration audit
Chapter 8 software quality assurance and configuration audit
Cliftone Mullah
 
Defect Analytics & Statistical Trends
Defect Analytics & Statistical TrendsDefect Analytics & Statistical Trends
Defect Analytics & Statistical Trends
Mani Nutulapati
 
Software Quality Framework Introduction
Software Quality Framework IntroductionSoftware Quality Framework Introduction
Software Quality Framework Introduction
Don Hough
 

Was ist angesagt? (20)

software testing strategies
software testing strategiessoftware testing strategies
software testing strategies
 
Software quality assurance lecture 1
Software quality assurance lecture 1Software quality assurance lecture 1
Software quality assurance lecture 1
 
Software Quality Assurance
Software Quality AssuranceSoftware Quality Assurance
Software Quality Assurance
 
Software quality assurance
Software quality assuranceSoftware quality assurance
Software quality assurance
 
Test Management Training
Test Management TrainingTest Management Training
Test Management Training
 
Term Paper - Quality Assurance in Software Development
Term Paper - Quality Assurance in Software DevelopmentTerm Paper - Quality Assurance in Software Development
Term Paper - Quality Assurance in Software Development
 
Software Quality Assurance class 1
Software Quality Assurance  class 1Software Quality Assurance  class 1
Software Quality Assurance class 1
 
Chapter 2 - Performance Measurement Fundamentals
Chapter 2 - Performance Measurement FundamentalsChapter 2 - Performance Measurement Fundamentals
Chapter 2 - Performance Measurement Fundamentals
 
Test management
Test managementTest management
Test management
 
Ch 7 integrating quality activities in the projectlife cycle
Ch 7 integrating quality activities in the projectlife cycleCh 7 integrating quality activities in the projectlife cycle
Ch 7 integrating quality activities in the projectlife cycle
 
Software Quality Challenge
Software Quality ChallengeSoftware Quality Challenge
Software Quality Challenge
 
Test cases planning
Test cases planningTest cases planning
Test cases planning
 
Chapter 8 software quality assurance and configuration audit
Chapter 8 software quality assurance and configuration auditChapter 8 software quality assurance and configuration audit
Chapter 8 software quality assurance and configuration audit
 
Software test management overview for managers
Software test management overview for managersSoftware test management overview for managers
Software test management overview for managers
 
Defect Analytics & Statistical Trends
Defect Analytics & Statistical TrendsDefect Analytics & Statistical Trends
Defect Analytics & Statistical Trends
 
SECh1920
SECh1920SECh1920
SECh1920
 
Software Product Measurement and Analysis in a Continuous Integration Environ...
Software Product Measurement and Analysis in a Continuous Integration Environ...Software Product Measurement and Analysis in a Continuous Integration Environ...
Software Product Measurement and Analysis in a Continuous Integration Environ...
 
Software Quality Framework Introduction
Software Quality Framework IntroductionSoftware Quality Framework Introduction
Software Quality Framework Introduction
 
Neeraj_Kumar
Neeraj_KumarNeeraj_Kumar
Neeraj_Kumar
 
Introduction To Software Quality Assurance
Introduction To Software Quality AssuranceIntroduction To Software Quality Assurance
Introduction To Software Quality Assurance
 

Ähnlich wie ISTQB Advanced Study Guide - 3

st-notes-13-26-software-testing-is-the-act-of-examining-the-artifacts-and-the...
st-notes-13-26-software-testing-is-the-act-of-examining-the-artifacts-and-the...st-notes-13-26-software-testing-is-the-act-of-examining-the-artifacts-and-the...
st-notes-13-26-software-testing-is-the-act-of-examining-the-artifacts-and-the...
mwpeexdvjgtqujwhog
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 

Ähnlich wie ISTQB Advanced Study Guide - 3 (20)

ISTQB Advanced Study Guide - 4
ISTQB Advanced Study Guide - 4ISTQB Advanced Study Guide - 4
ISTQB Advanced Study Guide - 4
 
st-notes-13-26-software-testing-is-the-act-of-examining-the-artifacts-and-the...
st-notes-13-26-software-testing-is-the-act-of-examining-the-artifacts-and-the...st-notes-13-26-software-testing-is-the-act-of-examining-the-artifacts-and-the...
st-notes-13-26-software-testing-is-the-act-of-examining-the-artifacts-and-the...
 
Chapter 9 Testing Strategies.ppt
Chapter 9 Testing Strategies.pptChapter 9 Testing Strategies.ppt
Chapter 9 Testing Strategies.ppt
 
Software Testing
Software TestingSoftware Testing
Software Testing
 
O0181397100
O0181397100O0181397100
O0181397100
 
Test case-point-analysis (whitepaper)
Test case-point-analysis (whitepaper)Test case-point-analysis (whitepaper)
Test case-point-analysis (whitepaper)
 
Software Testing Interview Questions For Experienced
Software Testing Interview Questions For ExperiencedSoftware Testing Interview Questions For Experienced
Software Testing Interview Questions For Experienced
 
Testing
Testing Testing
Testing
 
Software testing
Software testingSoftware testing
Software testing
 
Software testing & Quality Assurance
Software testing & Quality Assurance Software testing & Quality Assurance
Software testing & Quality Assurance
 
Some Commonly Asked Question For Software Testing
Some Commonly Asked Question For Software TestingSome Commonly Asked Question For Software Testing
Some Commonly Asked Question For Software Testing
 
Testing ppt
Testing pptTesting ppt
Testing ppt
 
Testing Slides 1 (Testing Intro+Static Testing).pdf
Testing Slides 1 (Testing Intro+Static Testing).pdfTesting Slides 1 (Testing Intro+Static Testing).pdf
Testing Slides 1 (Testing Intro+Static Testing).pdf
 
A Complexity Based Regression Test Selection Strategy
A Complexity Based Regression Test Selection StrategyA Complexity Based Regression Test Selection Strategy
A Complexity Based Regression Test Selection Strategy
 
SE-Testing.ppt
SE-Testing.pptSE-Testing.ppt
SE-Testing.ppt
 
testing
testingtesting
testing
 
A COMPOSITION ON SOFTWARE TESTING
A COMPOSITION ON SOFTWARE TESTINGA COMPOSITION ON SOFTWARE TESTING
A COMPOSITION ON SOFTWARE TESTING
 
Software testing
Software testingSoftware testing
Software testing
 
Software testing
Software testingSoftware testing
Software testing
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 

Mehr von Yogindernath Gupta

ISTQB / ISEB Foundation Exam Practice
ISTQB / ISEB Foundation Exam PracticeISTQB / ISEB Foundation Exam Practice
ISTQB / ISEB Foundation Exam Practice
Yogindernath Gupta
 
ISTQB / ISEB Foundation Exam Practice - 2
ISTQB / ISEB Foundation Exam Practice - 2ISTQB / ISEB Foundation Exam Practice - 2
ISTQB / ISEB Foundation Exam Practice - 2
Yogindernath Gupta
 
ISTQB / ISEB Foundation Exam Practice -1
ISTQB / ISEB Foundation Exam Practice -1ISTQB / ISEB Foundation Exam Practice -1
ISTQB / ISEB Foundation Exam Practice -1
Yogindernath Gupta
 
Introduction to specification based test design techniques
Introduction to specification based test design techniquesIntroduction to specification based test design techniques
Introduction to specification based test design techniques
Yogindernath Gupta
 

Mehr von Yogindernath Gupta (20)

Introduction to ISTQB & ISEB Certifications
Introduction to ISTQB & ISEB CertificationsIntroduction to ISTQB & ISEB Certifications
Introduction to ISTQB & ISEB Certifications
 
Learn Software Testing for ISTQB Foundation Exam
Learn Software Testing for ISTQB Foundation ExamLearn Software Testing for ISTQB Foundation Exam
Learn Software Testing for ISTQB Foundation Exam
 
ISTQB / ISEB Foundation Exam Practice - 6
ISTQB / ISEB Foundation Exam Practice - 6ISTQB / ISEB Foundation Exam Practice - 6
ISTQB / ISEB Foundation Exam Practice - 6
 
ISTQB / ISEB Foundation Exam Practice - 5
ISTQB / ISEB Foundation Exam Practice - 5ISTQB / ISEB Foundation Exam Practice - 5
ISTQB / ISEB Foundation Exam Practice - 5
 
ISTQB / ISEB Foundation Exam Practice - 4
ISTQB / ISEB Foundation Exam Practice - 4ISTQB / ISEB Foundation Exam Practice - 4
ISTQB / ISEB Foundation Exam Practice - 4
 
ISTQB / ISEB Foundation Exam Practice
ISTQB / ISEB Foundation Exam PracticeISTQB / ISEB Foundation Exam Practice
ISTQB / ISEB Foundation Exam Practice
 
ISTQB / ISEB Foundation Exam Practice - 2
ISTQB / ISEB Foundation Exam Practice - 2ISTQB / ISEB Foundation Exam Practice - 2
ISTQB / ISEB Foundation Exam Practice - 2
 
ISTQB / ISEB Foundation Exam Practice -1
ISTQB / ISEB Foundation Exam Practice -1ISTQB / ISEB Foundation Exam Practice -1
ISTQB / ISEB Foundation Exam Practice -1
 
ISTQB Advanced Study Guide - 8
ISTQB Advanced Study Guide - 8ISTQB Advanced Study Guide - 8
ISTQB Advanced Study Guide - 8
 
ISTQB Advanced Study Guide - 7
ISTQB Advanced Study Guide - 7ISTQB Advanced Study Guide - 7
ISTQB Advanced Study Guide - 7
 
ISTQB Advanced Study Guide - 6
ISTQB Advanced Study Guide - 6ISTQB Advanced Study Guide - 6
ISTQB Advanced Study Guide - 6
 
ISTQB Advanced Study Guide - 5
ISTQB Advanced Study Guide - 5ISTQB Advanced Study Guide - 5
ISTQB Advanced Study Guide - 5
 
Introduction to specification based test design techniques
Introduction to specification based test design techniquesIntroduction to specification based test design techniques
Introduction to specification based test design techniques
 
Knowledge Levels In Certifications
Knowledge Levels In CertificationsKnowledge Levels In Certifications
Knowledge Levels In Certifications
 
Design Review & Software Testing
Design Review & Software TestingDesign Review & Software Testing
Design Review & Software Testing
 
Software Development Life Cycle - SDLC
Software Development Life Cycle - SDLCSoftware Development Life Cycle - SDLC
Software Development Life Cycle - SDLC
 
Tutorial - 16 : How to pass parameters from one script to another by CallScri...
Tutorial - 16 : How to pass parameters from one script to another by CallScri...Tutorial - 16 : How to pass parameters from one script to another by CallScri...
Tutorial - 16 : How to pass parameters from one script to another by CallScri...
 
Tutorial - 14 How to insert a verification point from the script explorer usi...
Tutorial - 14 How to insert a verification point from the script explorer usi...Tutorial - 14 How to insert a verification point from the script explorer usi...
Tutorial - 14 How to insert a verification point from the script explorer usi...
 
A Practical Roadmap To HP QTP Certification
A Practical Roadmap To HP QTP CertificationA Practical Roadmap To HP QTP Certification
A Practical Roadmap To HP QTP Certification
 
Unearthing The Power Of IBM – Rational Functional Tester 7.0 - RFT
Unearthing The Power Of IBM – Rational Functional Tester 7.0 - RFTUnearthing The Power Of IBM – Rational Functional Tester 7.0 - RFT
Unearthing The Power Of IBM – Rational Functional Tester 7.0 - RFT
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 

ISTQB Advanced Study Guide - 3

  • 1. ISTQB Advanced Level Certification – Study Guide (Part 3) Prior to appearing for exam for ISTQB Advanced Level certification, it is wise to quickly brush up your knowledge by reviewing the following questions – answers that are extremely important from the examination point of view. Q. 21: What is the underlying objective of Regression Testing? Retesting the affected function is necessary after the change is incorporated since as many as 20 percent of all corrections result in additional errors. Frequently, additional functions will need to be tested to ensure that no latent defects were induced by the correction, one method of resolution would be to treat them as new errors and initiate a new error report. The description of regression testing should include: # A list of test paragraphs/objectives retested # The version of software used to perform regression test # Indication of successful/unsuccessful accomplishment of test. <<<<<< =================== >>>>>> Q. 22: What is the utility of an Error Frequency Report? Error frequency charts report the quantity of errors per unit of software product. The unit used may be a section of a requirements specification, a test procedure paragraph, a source code program unit, or any other objectively identifiable component of a software. The utility of an error frequency report is based on the Pareto Principle of non homogeneous error distribution. If errors are non homogeneously distributed in the product to be examined, then units with high detected error frequencies will probably also have a larger than normal number of latent errors. <<<<<< =================== >>>>>> Q. 23: What is the Adequacy Criteria for testing? Verification of software by testing or other means, is quite indirect. It is necessary to judiciously constrain the verification process. Conditions that are required to be satisfied during testing are called adequacy criteria. For example, testing may be considered inadequate if the test data do not include boundary cases specified by the requirements, do not cause execution of every line of code, or do not cause the software to deal with error-prone situations. The intent in establishing these criteria is to improve the quality of the testing. As such, adequacy criteria serve a purpose somewhat akin to software development standards. Adequacy criteria act as both specifier and judge: as specifier by indicating the constraints that must be satisfied by the testing, and as judge by indicating deficiencies in a particular test. Adequacy criteria for testing are generally expressed by stating some required coverage the test data should achieve. Desirable coverages include the required features, the software structure, or the potential errors that might occur in the life cycle. <<<<<< =================== >>>>>> Q. 24: What are the limitations of testing? Some problems cannot be solved on a computer because are either intractable or undecidable. An undecidable problem is one for which no algorithmic solution is possible. In general, programs cannot be exhaustively tested (tested for each input). Huang shows that to test exhaustively a program that reads two 32-bit integers would take on the order of 50 billion years. Even if the input space is smaller, on the very first input it may be the case that the program does not halt
  • 2. within a reasonable time. It may even be the case that it is obvious the correct output will be produced if the program ever does halt. Exhaustive testing can only be completed, therefore, if all non-halting cases can be detected and eliminated. Another limitation on the power of testing is its reliance on an oracle. An oracle is a mechanism that judges whether or not a given output is correct for a given input. In some cases, no oracle may be available e.g., when the program is written to compute an answer that cannot, in practice, be computed by hand. Imperfect oracles may be available, but their use is risky. The absence of an oracle, or the presence of an imperfect oracle weakens significantly any conclusions drawn from testing. <<<<<< =================== >>>>>> Q. 25: What is Fault Seeding? Fault seeding is a statistical method used to assess the number and nature of the faults remaining in a program. First, faults are seeded into a program. Then the program is tested, and the number of faults discovered is used to estimate the number of faults yet undiscovered. A difficulty with this technique is that the faults seeded must be representative of the yet- undiscovered faults in the program. <<<<<< =================== >>>>>> Q. 26: What is Mutation Analysis? Mutation analysis uses fault seeding to investigate properties of test data. Programs with seeded faults are called mutants. Mutants are executed to determine whether or not they behave differently from the original program. Mutants that behave differently are said to have been killed by the test. The product of mutation analysis is a measure of how well test data kill mutants. Mutants are produced by applying a mutation operator. Such an operator changes a single expression in the program to another expression, selected from a finite class of expressions. For example, a constant might be incremented by one, decremented by one, or replaced by zero, yielding one of three mutants. Applying the mutation operators at each point in a program where they are applicable forms a finite, albeit large, set of mutants. <<<<<< =================== >>>>>> Q. 27: What are the conditions necessary for a fault to cause a program failure? Three conditions necessary and sufficient for a fault to cause a program failure are execution, infection, and propagation. The fault location must be executed, the resulting data state must be infected with an erroneous value, and the succeeding computation must propagate the infection through erroneous data states, producing a failure. Sensitivity analysis investigates the three conditions required for failure, with particular focus on infection and propagation of errors. Infection analysis employs mutation analysis to determine the probability of a data state’s being infected after a potentially faulty statement is executed. Propagation analysis mutates the data state to determine the probability that an infected data state will cause a program failure. <<<<<< =================== >>>>>> Q. 28: What is Symbolic Analysis?
  • 3. Symbolic analysis seeks to describe the function computed by a program in a more general way. A symbolic execution system accepts three inputs: a program to be interpreted, symbolic input for the program, and the path to follow. It produces two outputs: the symbolic output that describes the computation of the selected path, and the path condition for that path. The specification of the path can be either interactive or pre-selected. The symbolic output can be used to prove the program correct with respect to its specification, and the path condition can be used for generating test data to exercise the desired path. Structured data types cause difficulties, however, since it is sometimes impossible to deduce what component is being modified. <<<<<< =================== >>>>>> Q. 29: What is Specification Oriented Testing? Program testing is specification-oriented when test data are developed from documents and understandings intended to specify a module’s behavior. Sources include, but are not limited to, the actual written specification and the high- and low-level designs of the code to be tested. The goal is to test for the presence of each (required) software feature, including the input domains, the output domains, categories of inputs that should receive equivalent processing, and the processing functions themselves. Specification-oriented testing seeks to show that every requirement is addressed by the software. An unimplemented requirement may be reflected in a missing path or missing code in the software. Specification-oriented testing assumes a functional view of the software and sometimes is called functional or black-box testing. <<<<<< =================== >>>>>> Q. 30: What is Input Domain Testing? It is the testing based on the interface of the module. In extremal testing, test data are chosen to cover the extremes of the input domain. Similarly, midrange testing selects data from the interiors of domains. For structured input domains, combinations of extremal points for each component are chosen. This procedure can generate a large quantity of data. Read More articles on ISTQB CTAL Advanced Level Certifications at http://www.softwaretestinggenius.com/categoryDetail.php?catId=166