Google News
logo
Automation Testing - Quiz(MCQ)
A)
Test Design
B)
Test Process
C)
Automation Testing
D)
Test Automation

Correct Answer :   Test Automation


Explanation : Automation testing, which is also known as Test Automation, is when the tester writes scripts and uses another software to test the product.

A)
system testing
B)
unit testing
C)
integration testing
D)
All of the above

Correct Answer :   All of the above


Explanation : Different stages for manual testing such as unit testing, integration testing, system testing, and user acceptance testing.

A)
Unit Testing
B)
Regression Testing
C)
Exploratory Testing
D)
End-to-End Testing

Correct Answer :   Exploratory Testing

A)
Angular
B)
Cypress
C)
Selenium
D)
Protractor

Correct Answer :   Angular

A)
To run UI tests
B)
To run cross-browser tests
C)
To run load tests
D)
To automate hardware testing

Correct Answer :   To run cross-browser tests

A)
React.js
B)
Angular.js
C)
Aurelia.js
D)
Backbone.js

Correct Answer :   Angular.js

A)
To perform load testing
B)
To allow cross-browser testing
C)
To perform unit testing efficiently
D)
To run multiple tests in parallel across multiple browsers and operating systems

Correct Answer :   To run multiple tests in parallel across multiple browsers and operating systems

A)
Client Testing
B)
Automation Testing
C)
Manual Testing
D)
All of the above

Correct Answer :   Manual Testing


Explanation : Manual testing includes testing a software manually, i.e., without using any automated tool or any script.

A)
Selenium
B)
QTP
C)
Testing fundamentals
D)
Documentation Skills

Correct Answer :   Selenium

A)
QTP
B)
Selenium
C)
QA Programming
D)
Testing fundamental

Correct Answer :   QTP

A)
Integration Testing
B)
Unit Testing
C)
Both (A) and (B)
D)
None of the Above

Correct Answer :   Unit Testing


Explanation :

Unit Testing – the smallest piece of code that can be logically isolated and tested with input and output Testing individual units or modules of an application. The purpose is to validate if the independent modules (code) work as expected. Mostly done during the development (coding phase) of an application by the developers.

A)
Black-box testing
B)
White-box testing
C)
Both (A) and (B)
D)
None of the Above

Correct Answer :   Black-box testing


Explanation : Black-box testing is a method of software testing that examines the functionality of an application without peering into its internal structures or workings. This method of test can be applied virtually to every level of software testing: unit, integration, system and acceptance. It is sometimes referred to as specification-based testing

A)
Contract Testing
B)
Integration Testing
C)
Both (A) and (B)
D)
None of the Above

Correct Answer :   Contract Testing

A)
Retesting
B)
Unit testing
C)
Ad hoc testing
D)
Regression testing

Correct Answer :   Ad hoc testing


Explanation : Ad hoc testing is done without planning and documentation.

A)
API
B)
Unit
C)
Functional
D)
Regression

Correct Answer :   Regression

A)
It adds a layer of security
B)
It improves software performance
C)
It ensures the software will run on multiple platforms.
D)
Problems are not expected for things that already work.

Correct Answer :   Problems are not expected for things that already work.

A)
It reduces the bugs.
B)
It improves the efficiency of repetitive tests and reduces human errors
C)
It allows developers to build faster applications.
D)
It makes it easier for testers to test the applications.

Correct Answer :   It improves the efficiency of repetitive tests and reduces human errors

A)
C
B)
C#
C)
Java
D)
Python

Correct Answer :   C

A)
White box
B)
Black box
C)
Grey box
D)
Green box

Correct Answer :   Black box


Explanation : Black box techniqe is applied for usability testing

A)
The test is repeatable.
B)
It’s time-consuming for a human tester.
C)
The software is changing constantly.
D)
The test involves complicated calculations.

Correct Answer :   The software is changing constantly.

A)
Grid
B)
Web Driver
C)
A bug database
D)
Integrated Development Environment (IDE)

Correct Answer :   A bug database

A)
CAPTCHA
B)
Login Form
C)
Button Click
D)
Link Navigation

Correct Answer :   CAPTCHA

A)
Selenium
B)
SilkTest
C)
IBM Rational Functional Tester
D)
All of the above

Correct Answer :   All of the above

A)
True
B)
False
C)
Can not say.
D)
--

Correct Answer :   True


Explanation : True, automation testing is also used to test the application from load, performance, and stress point of view.

A)
Downloading large contents from the internet
B)
Generating a large amount of traffic on particalr page
C)
Running multiple applications on a computer or server simultaneously
D)
All of the above

Correct Answer :   All of the above

A)
QTP
B)
Testing tool
C)
Selenium
D)
Testing fundamentals

Correct Answer :   Testing tool

A)
Priority
B)
Severity
C)
Both (A) and (B)
D)
None of the above

Correct Answer :   Severity


Explanation : Severity is determined by the functional impact of the bug or impact on the application. For example, if a very commonly used button on the homepage of a website does not work, it is a bug of critical severity. Whereas if there is some spelling mistake in a disclaimer text which is present on the last page and is rarely seen by the user, then it will be of trivial severity.

A)
Priority
B)
Severity
C)
Both (A) and (B)
D)
None of the above

Correct Answer :   Priority


Explanation : Priority is determined by the impact of the bug on the business. For example, if on the Google home page an ‘o’ is missing from the word ‘Google’, it does not impact any functionality but can impact the name and business and therefore this bug will be of higher priority.

A)
Usability Testing
B)
Disability Testing
C)
Accessibility Testing
D)
None of the above

Correct Answer :   Accessibility Testing


Explanation : Accessibility Testing : It is a subset of Usability testing to ensure the system or component is usable by people having disabilities.

A)
Fuzzing
B)
API
C)
Unit
D)
Regression

Correct Answer :   Fuzzing

A)
RDP
B)
SSH
C)
HTTP
D)
SMTP

Correct Answer :   HTTP

A)
Unit
B)
API
C)
Fuzzing
D)
Functional

Correct Answer :   API

A)
Scripts
B)
Variables
C)
Parameters
D)
Applications to test

Correct Answer :   Applications to test

A)
Unit
B)
Load
C)
Stress
D)
Functional

Correct Answer :   Load

A)
A single API
B)
Subroutines
C)
Newly submitted changes
D)
Inter-component communication

Correct Answer :   Inter-component communication

A)
chrome-headless-disable-gpu-remote-debugging-port=9222
B)
chromium-headless-disable-gpu-remote-debugging-port=9222
C)
chrome-nogui-disable-gpu-remote-debugging-port=9222
D)
chromebook-headless-disable-gpu-remote-debugging- port = 9222 X

Correct Answer :   chrome-headless-disable-gpu-remote-debugging-port=9222

A)
CLI
B)
API
C)
GUI
D)
Unit test

Correct Answer :   CLI

A)
Bucket Testing
B)
Release Testing
C)
Both (A) and (B)
D)
None of the above

Correct Answer :   Bucket Testing

A)
A/B Testing
B)
Bucket Testing
C)
Blue-Green deployment
D)
None of the above

Correct Answer :   Blue-Green deployment


Explanation :

It is a method of installing changes to an application or server by swapping alternating production and staging servers.
In this method, two identical production environments work in parallel.
 
One is the currently-running production environment receiving all user traffic (Blue). The other is a clone of it, but idle (Green). Both use the same database backend and app configuration.
 
The new version of the application is deployed in the green environment and tested for functionality and performance. Once the testing results are successful, application traffic is routed from blue to green. Green then becomes the new production.
 
If there is an issue after green becomes live, traffic can be routed back to blue

A)
Defect Logging
B)
Defect Seeding
C)
Both (A) and (B)
D)
None of the above

Correct Answer :   Defect Seeding


Explanation :

Defect Seeding : is the process of adding known defects to the application intentionally for the purpose of monitoring the rate of detection and removal. This process is also known as defect bebugging or Fault injection or defect feeding

A)
Age Testing
B)
Agile Testing
C)
Future Testing
D)
All of the above

Correct Answer :   Age Testing


Explanation :

Age Testing : 

It is a process to check how significantly the performance of a software/application may drop as the system gets older.

It is to check how the software would behave in the future.
 
With the help of this testing report, we would be able to take the necessary steps to update, modify and add new features to the software which can eventually help us to continue with the software without any interruption in future.

A)
Buddy programming
B)
Pair programming
C)
Both (A) and (B)
D)
None of the above

Correct Answer :   Pair programming

A)
Final Testing
B)
Integration Testing
C)
UAT (User Acceptance Testing)
D)
All of the above

Correct Answer :   UAT (User Acceptance Testing)


Explanation :

User Acceptance Testing : Clients/end users are involved in testing the product to validate the product against their requirements.
 
2 types of UAT

* Alpha testing : Alpha Testing is a type of software testing performed to identify bugs before releasing the product to real users or to the public.

* Beta testing : Beta Testing is performed by real users of the software application in a real environment.
 
 
 

A)
Alpha Testing
B)
Beta Testing
C)
Both (A) and (B)
D)
None of the above

Correct Answer :   Alpha Testing


Explanation :

Alpha testing : Testing takes place at the developer’s site by the internal teams, before release to external customers.

A)
Account Mining
B)
Account Harvesting
C)
Can not say
D)
--

Correct Answer :   Account Harvesting


Explanation :

Account Harvesting is the process of gathering user accounts from a system, service, or database using a variety of methods, such as malware or phishing.
 
Often used to refer to computer spammers, individuals who try to sell or seduce others through email advertising or solicitation. Account harvesting involves using computer programs to search areas on the Internet in order to gather lists of email addresses from a number of sources, including chat rooms, domain names, instant message users, message boards, newsgroups, online directories for Web pages, Web pages, and other online destinations. Recent studies have shown that newsgroups and chat rooms, in particular, are great resources for harvesting email addresses