0% found this document useful (0 votes)
486 views5 pages

MCQs On UNIT 4

This document contains 28 multiple choice questions about defect management. It covers topics like defect classification, types of defects, the defect life cycle, and defect reporting. Defects can be found during the test implementation and execution phase. It is more costly if a defect is delayed to later phases. Defect severity determines the priority in which defects should be fixed. Defect reports are useful for process improvement and contain information like the defect description, priority, and tester name.

Uploaded by

Salim Pinjari
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
486 views5 pages

MCQs On UNIT 4

This document contains 28 multiple choice questions about defect management. It covers topics like defect classification, types of defects, the defect life cycle, and defect reporting. Defects can be found during the test implementation and execution phase. It is more costly if a defect is delayed to later phases. Defect severity determines the priority in which defects should be fixed. Defect reports are useful for process improvement and contain information like the defect description, priority, and tester name.

Uploaded by

Salim Pinjari
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

MCQs on UNIT 4: Defect Management

Firstly Study notes given to you for full coverage of points and clearing
doubts.

4.1 Introduction
1. During which phase discrepancies are reported as defects?
a) Evaluating exit criteria and reporting
b) Test closure activity
c) Test implementation and execution
d) Test analysis and design

2. If a defect is delayed for later phases it proves more costly.


A) True B) False

3. What can be the Effect of software defects or bugs


● Crashes the software or program

● Freezes or hang the computer system

● Malicious use breaks the security of system

● ALL above


4. Which one of the below is not a Bug Tracking tool?
a. Bugzilla
b. Team Track
c. Selenium

5. What is not present in the test case?


a.Requirement ID
b.Test Case ID
c.Bug ID
4.2 Defect Classification
6. Which of the following defect attribute denotes the order in which defects
need to be fixed?
a. Severity
b. Priority
c. Intensity
d. Complexity

7. What is not true about priority?


a) Priority is impact of defect on business
b) Priority can be urgent, high, medium, low
c) Priority once assigned cant be changed.
d) All of the above

8. Who determines the severity of bug?


a) Developer b) Customer
c) Tester d) All stakeholders\

9. Severity can be changed at any point of time .True or false.


a) True b) False

10. Informing the developer which bug to be fixed first is called as?
a. Severity Priority
b. Traceability Fixability

11. How severe the bug is affecting the application is called as?
a. Severity
b. Priority
c. Traceability
d. Fixability

12. Which of the following is not the classification of Defects


a. Impact
b. Visibility
c. Urgency
d. None of above

13. “App/Product crash frequently” is the example of


a. Critical
b. Major
c. Medium
d. Low
14. Computational Error, Data error, Missing Design, interface Error etc can
be –
a. Type of error wise defects
b. Work product wise defects

4.2.1 Defects in Software Products


15. Defects in software product fall into
a. Implementation defects or Coding Defects
b. Requirement defects
c. Design defects
d. All above
4.3 Defect Management Process
16. In a company if the test plan is not written according to the standards, which
category of defect will it be classified into

B: Product defect

C: Procedure defect

D: Documentation defect

17. Which of the following is not a part of defect management process?

a. Defect reporting
b. Defect prevention
c. Requirement baselining
d. Management Reporting

4.3.1 Defect Prevention Process


18. Which of the following step not included in Defect Prevention Process?
a. Identify Critical Risks
b. Defect Prevention
c. Estimate Expected Impact
d. Minimize Expected Impact

Defect Life Cycle


19.Which of the following is not a state of a defect in defect life cycle:
A) New
B) Open
C) Verified
D) Deferred
E) Critical

20. Which of the following stage is performed by developer?

1. New
2. Open
3. Assigned
4. Fixed
5. Verify
6. Closed
7. Deferred
8. Rejected

a) 1,2,3,4,5,6
b) 2,3,4,5,6,7,8
c) 2,3,4,7,8
d) 2,3,4,5,6

21. Deffered status in bug life cycle means

a. Developer feels that the bug is not genuine


b. Bug is repeated twice or the two bugs mention the same concept of the bug
c. The bug is expected to be fixed in next releases

4.4.1 Defect Report Template


22. A good defect report might not have following section
a. Defect Type
b. Priority
c. Attachments
d. Cost

4.5 Estimate Expected Impact of a Defect


23. The expected impact of a risk (E) is calculated as,
a. E=P*I
b. E=P*D

4.5.1 Techniques for Finding Defects


24. different techniques for finding defects
a. Static techniques
b. Operational techniques
c. Dynamic techniques
d. Only a and c
e. All a b c
Reporting a Defect
25.Defect reports are useful as they contain
a) defect description
b) Priority
c) Summary
d) Name of tester
e) All of the above

26.Defect report is also useful for process improvement. True or false.


a) True b) False

27. A document that contains description of any event that has happened which
requires further investigation is called as a
a) Test summary report
b) Defect report
c) Bug report
d) Incident report

28. Executing the same test case by giving the number of inputs on same build
called as?

a. Regression Testing
b. Retesting
c. Ad-Hoc Testing
d. Smoke Testing

-----------------END-----------------

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy