A supermarket rewards its customers with discounts on certain products depending on how much the customer spends over a twelve-month period. The discounts are:
* 5% discount - once 500 has been spent.
* 10% discount - once a further 500 has been spent.
* 15% discount - once a further 1000 has been spent.
* 20% discount - once a further 2000 has been spent.
The following test cases have been written: TC1 -500 spent TC2 - 2000 spent
How many more test cases must be written to achieve 100% 2-pomt boundary value analysis for the discount scheme?
2-point boundary value analysis is a technique that tests the boundary values of valid and invalid partitions with two values each: one at the boundary and one just outside the boundary. For example, if the valid range is 1 to 10, the 2-point boundary values are 1, 2, 9, 10 for the valid partition, and 0, 11 for the invalid partitions. The advantage of this technique is that it reduces the number of test cases compared to 3-point boundary value analysis, which tests one value inside the boundary as well. However, it may miss some defects that occur only with the values inside the boundary.
In this question, the valid partitions are the ranges of spending that correspond to different discounts, and the invalid partitions are the ranges of spending that are below or above the valid partitions. The boundaries are the values of spending that trigger a change in the discount rate. The 2-point boundary values for each partition are:
Invalid partition below 500: 0, 499
Valid partition for 5% discount: 500, 501
Valid partition for 10% discount: 1000, 1001
Valid partition for 15% discount: 2000, 2001
Valid partition for 20% discount: 4000, 4001
Invalid partition above 4000: 4001, 4002
The test cases TC1 and TC2 already cover two of the boundary values: 500 and 2000. Therefore, to achieve 100% 2-point boundary value analysis, we need to write seven more test cases to cover the remaining boundary values: 0, 499, 501, 1000, 1001, 4000, and 4002. Note that 4001 is a boundary value for both the valid and invalid partitions, so we only need to test it once.
Which one of the following is an example of how product risk analysis can influence the testing approach?
The other options are not examples of how product risk analysis can influence the testing approach, because they are either not related to product risks or not based on risk levels. They are:
Tests have been specified for the latest software release and users have prioritised these
However, there are some dependencies between tests as shown in the table below (e.g. Test ID. X cannot be run until Test ID. Y has been successfully completed).
Which test execution schedule best meets the prioritisation and dependency conditions?
The test execution schedule should follow the priority order of the tests, as well as the dependency constraints. The priority order is given by the user value column, where higher values indicate higher priority. The dependency constraints are given by the dependency column, where a test ID indicates that the test cannot be run until the test with that ID has been successfully completed. Therefore, the test execution schedule should start with the highest priority test that has no dependency, which is test 5. Then, it should continue with the next highest priority test that has no dependency or has a satisfied dependency, which is test 1. Then, it should proceed with test 2, which depends on test 1, and then test 3, which depends on test 2. Finally, it should end with test 4, which depends on test 3. Thus, the test execution schedule that best meets the prioritisation and dependency conditions is 5,1,2,3,4.
Which one of the following would you typically expect to find in a test completion report for a test level?
A test completion report for a test level typically includes a summary of all the testing activities that have been performed. It should detail any deviations from the original test schedule, including any changes in the planned duration or effort that were required to complete the test activities. This report serves as a record of what was tested, how it was tested, and any issues that were encountered.
You are testing a mobile app that displays a person's status in respect of Covid-19. There are five possibilities: Fully Vaccinated, Partly Vaccinated, Infected & Recovered. Last Tested Positive or Last Tested Negative. You have found that, after receiving data about successful administration of a second injection, the person's status has not changed from Partly Vaccinated to Fully Vaccinated, although it should have done. The project uses a popular proprietary defect management tool where you have drafted an incident report with the following information:
* Test id., test environment used and date/time of run
* Expected and actual results with steps to reproduce.
* Severity level 4 (Critical - an entire functional area is unusable)
* Version data for the application under test and the testware that was used
Which one of the following important items of information is missing?
Priority is an important item of information that is missing from the incident report. Priority indicates the importance or urgency of resolving the incident, based on the business needs and the impact on the stakeholders. Priority is usually assigned by the project manager or the customer, and it helps to determine the order in which incidents should be addressed. Priority may differ from severity, which indicates the degree of impact of the incident on the system or the component under test. Severity is usually assigned by the tester or the developer, and it helps to assess the risk of the incident. For example, an incident may have a high severity but a low priority, if it affects a critical function but only occurs in a rare situation. Conversely, an incident may have a low severity but a high priority, if it affects a minor function but occurs frequently or affects many users. Therefore, both priority and severity are useful information for incident management and resolution.
The other options are not essential information for the incident report, although they may be helpful or desirable in some cases. Recommendations are suggestions or proposals for resolving the incident, which may be provided by the tester, the developer, or other stakeholders. However, recommendations are not mandatory, and they may not be feasible or acceptable in some situations. Name of tester is the identifier of the person who reported the incident, which may be useful for communication or accountability purposes. However, name of tester is not critical, and it may be replaced by other identifiers, such as email address, employee number, or role. Change history is the record of the changes made to the incident report, such as status, resolution, or comments. Change history is valuable for tracking and auditing purposes, but it is not part of the initial incident report, rather it is updated as the incident progresses.
Full Exam Access, Actual Exam Questions, Validated Answers, Anytime Anywhere, No Download Limits, No Practice Limits
Get All 365 Questions & Answers