Evaluation Form - Answer

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

Question Answer

WORK
EXPERIENCE
Stress Testing is a form of performance testing where the application is
bound to go through exertion or stress i.e. execution of application
above the threshold of the break to determine the point where the
application crashes. This condition usually arises when there are too
many users and too much of data.
Explain the term
Stress testing also verifies the application recovery when the workload
Stress Testing and
is reduced.
Load testing.
Load Testing is a form of performance testing where the application is
executed above various load levels to monitor the peak performance of
the server, response time, server throughput, etc. Through load testing
process stability, performance and integrity of the application are
determined under concurrent system load.
Defect Severity is defined by the level or the degree of impact by the
defect on the application under test. Higher the severity of the defect,
the more is the impact on the application.
Following are the 4 classes in which a defect severity is categorized:
Critical
Major
Medium
Explain the
Low
difference
Defect priority defines the order in which the defect should be resolved
between Severity
first i.e. the higher the priority of the defect implies that the application
and Priority.
is unusable or stuck at some point and the defect should be resolved as
soon as possible.
Following are the 3 classes in which a defect priority is defined:
High
Medium
Low

What is the
difference Regression Retesting
between Retesting
and Regression Regression is a type of software Retesting is the process of
testing. testing that checks the code change testing that checks the test
does not affect the current features cases which were failed in
and functions of an application. the final execution.

The main purpose of regression Retesting is applied on the


testing is that the changes made to defect fixes.
the code should not affect the
existing functionalities.

Defect verification is not an element Defect verification is an


of Regression testing. element of regression
testing.

Automation can be performed for Automation cannot be


regression testing while manual performed for Retesting.
testing could be expensive and time-
consuming.

Regression testing is also known as Retesting is also known as


generic testing. planned testing.

Regression testing concern with Regression testing can be


executing test cases that was passed performed in parallel with the
in earlier builds. Retesting concern retesting. Priority of retesting
with executing those test cases that is higher than the regression
are failed earlier. testing.
Smoke testing is performed on the application after receiving the build.
Tester usually tests for the critical path and not the functionality in
When do we
deep to make sure, whether the build is to be accepted for further
perform Smoke
testing or to be rejected in case of broken application.
testing?
A smoke checklist usually contains the critical path of the application
without which an application is blocked
What if the If the software is so buggy, the first thing we need to do is to report the
software is so bugs and categories them based on Severity. If the bugs are critical
buggy it can’t bugs then it severely affects schedules and indicates deeper problems
really be tested at in the software development process. So you need to let the manager
all? know about the bugs with proper documentation as evidence.
What the bug
JRA, TFS
reporting tools?
What is Integration testing is a level of software testing process, where
Integration individual units of an application are combined and tested. It is usually
testing? performed after unit and functional testing.
Answer: Boundary value analysis method checks the boundary values
of Equivalence class partitions. Boundary value analysis is basically a
testing technique which identifies the errors at the boundaries rather
than within the range values.
Explain Boundary For Example, An input field can allow a minimum of 8 characters and a
Value Analysis. maximum of 12 characters then 8-12 is considered as the valid range
and <7 and >13 are considered as the invalid range. Accordingly, the
test cases are written for valid partition value, exact boundary value,
and invalid partition value.

Decision table testing is used for testing systems for which the
When is used specification takes the form of rules or cause-effect combinations. In a
Decision table decision table, the inputs are listed in a column, with the outputs in the
testing? same column but below the inputs. The remainder of the table explores
combinations of inputs to define the outputs produced.
Configuration management (CM) is a process of systems engineering to
maintain system resources, computer systems, servers, software, and
What is
product’s performance in a consistent state. It helps to record all the
configuration
changes made in the system and ensures that the system performs as
management?
expected even though changes are made over time.

What is The relationship between test cases and requirements is shown with
traceability the help of a document. This document is known as a traceability
matrix? matrix.
How can you It helps you to eliminate product risk in your project, and there is a
simple yet crucial step that can reduce the product risk in your project.
Investigate the specification documents
eliminate the
Have discussions about the project with all stakeholders including the
product risk in
developer
your project?
As a real user walk around the website

A test plan can be defined as a document describing the scope,


Explain what Test approach, resources, and schedule of testing activities and a test plan
Plan is? What is should cover the following details.
the information Test Strategy
that should be Test Objective
covered in Test Exit/Suspension Criteria
Plan? Resource Planning
Test Deliverables
Is Automation
Automation testing is very useful in agile methodology and helps in
testing in agile
achieving maximum test coverage in a lesser time of the sprint.
methodology
useful?
What is release
planning meeting?
What is sprint
planning meeting?
What is daily
stand up
meetings?
What is sprint
retrospective
meeting?
What is review
meeting?
It can be defined as a pre-preparation step to the first sprint. Activities
What is the Zero like setting development environment, preparing backlog, etc need to
sprint in Agile? be done before starting the first sprint and can be treated as Sprint
zero
What is a
Taskboard in
Agile?
Some of the disadvantages of using the agile model are as follows:
Not easy to predict: When you encounter a large project, it is not easy
to get an idea of how much effort will it require.
If the guidelines given by the customers are not properly grasped, then
What are the
final outcome of the project is not as per customer satisfaction.
disadvantages of
Sometimes focusing on design and documentation is not proper
the agile model?
High-level decisions are under the hand of Veterans, if not combined
with non-experienced ones, freshers have little scope to grasp proper
knowledge.

What is Agile Agile manifesto defines an iterative and people-centric approach to


manifesto? software development. It has 4 key values and 12 principals.
Explain ‘scrum Scrum poker, also called as planning poker, is a card-based estimation
poker’ or ‘planning technique which is based on a general agreement.
poker’ technique? To start it, the agile user story is read either by the customer or the
owner and the estimator understands its features.
Each estimator has planning cards with different no. on it like
0,1,2,3,5,8 and so on. These values on the card are ideal days or story
points.
Estimator select cards based on their estimation by discussing features
set by the product owner.
If a common value is selected, it is an estimate, if not they discuss their
max. and min. estimation.
This process is repeated until a general agreement is reached.

What is Assertion
in automation?
It is an advanced framework which is designed in a way to leverage the
benefits by both the developers and testers. It also has an inbuilt
What is TestNG?
exception handling mechanism which lets the program to run without
terminating unexpectedly.
XPath also called as XML Path is a language to query XML documents. It
is an important strategy to locate elements in selenium. It consists of a
path expression along with some conditions. Here, you can easily write
What is XPath? XPath script/query to locate any element in the webpage. It is designed
to allow the navigation of XML documents, with the purpose of
selecting individual elements, attributes, or some other part of an XML
document for specific processing. It also produces reliable locators.
What are the tools
that can be used
in performance
testing?
Can you use GET
No, GET request only allows read only rights. It enables you to retrieve
request instead of
data from a server but not create a resource. PUT or POST methods
PUT to create a
should be used to create a resource.
resource?
All Web services are APIs but not all APIs are Web services.
Web services might not contain all the specifications and cannot
What are main
perform all the tasks that APIs would perform.
differences
A Web service uses only three styles of use: SOAP, REST and XML-RPC
between API and
for communication whereas API may be exposed to in multiple ways.
Web Service?
A Web service always needs a network to operate while APIs don’t need
a network for operation.
Name some tools Some of the tools used for API Testing are as follows:
used for API Postman
Testing? Katalon Studio
SoapUI
Assertible
Tricentis Tosca
Apigee
JMeter
Rest-Assured
Karate DSL
API Fortress
Parasoft
HP QTP(UFT)
vREST
Airborne
API Science
APIary Inspector
Citrus Framework
Hippie-Swagger
HttpMaster Express
Mockbin
Ping API
Pyresttest
Rest Console
RoboHydra Server
SOAP Sonar
Unirest
WebInject
A primary key is used to uniquely identify all table records. It cannot
What is a Primary
have NULL values, and it must contain unique values. A table can have
Key?
only one primary key that consists of single or multiple fields.
A foreign key is an attribute or a set of attributes that references to the
What is a Foreign
primary key of some other table. So, basically, it is used to link
Key?
together two tables.
Unique constraints ensure that all the values in a column are
What is a unique different. For example, if we assign a unique constraint to the e_name
constraint? column in the below table, then every entry in this column should have
a unique value.
The Join clause is used to combine rows from two or more tables based
on a related column between them. There are various types of Joins
that can be used to retrieve data, and it depends upon the relationship
between tables.
There are four types of Joins:
Inner Join: Inner Join basically returns records that have matching
values in both tables.
What do you know Left Join: Left Join returns rows that are common between the tables
about Joins? and all the rows of the left-hand-side table, i.e., it returns all the rows
Define different from the left-hand-side table even if there are no matches available in
types of Joins. the right-hand-side table.
Right Join: Right Join returns rows that are common between the
tables and all the rows of the right-hand-side table, i.e., it returns all
the rows from the right-hand-side table even if there are no matches
available in the left-hand-side table.
Full Join: Full Join returns all the rows from the left-hand-side table and
all the rows from the right-hand-side table.

State the Views Tables


differences It is a virtual table that is A table is structured with a set number
between Views extracted from a database. of columns and a boundless number of
and Tables. rows.
Views do not hold data Table contains data and stores the
themselves. data in databases.
A view is also utilized to query A table holds fundamental client
certain information contained in information and the cases of a
a few distinct tables. characterized object.
In a view, we will get In a table, changing the information in
frequently queried information. the database changes the information
that appears in the view
How to deploy
dotnet application
and java
application?

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy