A software system checks age in order to determine which welcome screen to display. Age groups are:
Group I: 0-12
Group II; 13-18
Group III: over 18
Which of the below represent boundary values?
Which of the following is a factor that contributes to a successful review?
For withdrawing money tram an Automated Teller Machine (ATM), the following conditions are required:
- The bank card is valid
- The PIN code is correct
- Money is available in the user's account
The following are some possible interactions between the user and the ATM:
- The entered card is invalid The card is rejected
- The PIN code is wrong The ATM asks for another PIN code
- The requested amount is more than available in the user's account: The ATM asks for another amount
- The requested amount is available in the user's account The ATM dispenses the money
Which test design technique should be used to cover all possible combinations of the in put conditions?
You are testing a system that is used in motor vehicles to warn the driver of an obstacle when re-versing. Output is provided by a series of LED lights (green, yellow, and red), each illuminated based on clearly defined conditions.
The following summary describes the functionality:
•Object within 10 metres, green LED lit.
•Object within 5 metres, yellow LED lit.
•Object within 1 metre, red LED lit.
•Setting sensitivity mode to "ON" will result in only the red LED being lit when the object is within 1 metre.
The following decision table describes the rules associated with the functioning of this proximity warning system:

Which intended functionality is tested by Rule 5 in the decision table?
An alphanumeric password must be between 4 and 7 characters long and must contain at least one numeric character, one capital (uppercase) letter and one lowercase letter of the alphabet.
Which one of the following sets of test cases represents the correct outcome of a two-value boundary value analysis applied to the password length? (Note: test cases are separated by a semicolon)
What does configuration management enable for testing?
As the last stage of a test cycle of an embedded device, you are performing exploratory testing. You observed that some character. (A, X and Z) sent via a serial port to the device do not get registered on the device whereas they should be. You suspect that this could be due to a wrong configuration of the "bit parity" parameter.
Which of the following items of an incident report would you be UNABLE to write down based on this information?
Which are the MAIN goals of risk management in a software project?
Consider the following examples of risks identified in different software development projects:
[I]. The contrast color ratio for both normal text and large text of a website does not comply with the applicable accessibility guidelines, making it difficult for many users to read the content on the pages
[II]. A development vendor fails to deliver their software system on time, causing significant delays to system integration testing activities that have been planned as part of a development project for a system of systems
[III]. People in the test team do not have sufficient skills to automate tests at the test levels required by the test automation strategy which does not allow production of an effective regression test suite
[IV]. In a web application, data from untrusted sources is not subject to proper input validation, making the application vulnerable to several security attacks
Which of the following statements is true?
Shripriya is defining the guidelines for the review process implementation in her company. Which of the following statements is LEAST likely to have been recommended by her?
| PDF + Testing Engine | 
|---|
| $57.75 | 
| Testing Engine | 
|---|
| $43.75 | 
| PDF (Q&A) | 
|---|
| $36.75 | 
| ISTQB Free Exams | 
|---|
|   |