logo

CuriousTab

CuriousTab

Discussion


Home Technical Questions Software Testing Comments

  • Question
  • What is risk analysis? What does it have to do with Severity and Priority?


  • Correct Answer
  • Risk analysis is a method to determine how much risk is involved in something In testing, it can be used to determine when to test something or whether to test something at all Items with higher risk values should be tested early and often Items with lower risk value can be tested later, or not at all It can also be used with defects Severity tells us how bad a defect is: "how much damage can it cause?" Priority tells us how soon it is desired to fix the defect: "should we fix this and if so, by when?" Defects with High Severity and Priority are tested first 


  • Software Testing problems


    Search Results


    • 1. What's the role of CMM Level in Testing?
    • Discuss
    • 2. What is the difference in writing the test cases for Integration testing and system testing?
    • Discuss
    • 3. What is the value of a testing group? How do you justify your work and budget?
    • Discuss
    • 4. What is the type of the algorithm used in solving the 8 Queens problem ?

    • Options
    • A. Dynamic Programming
    • B. BackTracking
    • C. Branch and Bound
    • D. None
    • Discuss
    • 5. Which of the following is not part of performance testing?

    • Options
    • A. simulating many users
    • B. measuring response times
    • C. generating many transactions
    • D. recovery testing
    • Discuss
    • 6. Explain a.) Quality Assurance b.) Quality Control c.) Test Case d.) Test Condition e.) Test Script f.) Test Data g.) Test Bed
    • Discuss
    • 7. Reporting Discrepancies as incidents is a part of which phase?

    • Options
    • A. Test Implementation and execution
    • B. Evaluating exit criteria and reporting
    • C. Test Analysis and Design
    • D. Test Closure Activities
    • Discuss
    • 8. Which is not a task of a configuration management?

    • Options
    • A. Reporting
    • B. Version control
    • C. Quality control
    • D. Change management
    • Discuss
    • 9. Data flow analysis studies

    • Options
    • A. The use of data on paths through the code
    • B. Possible communications bottlenecks in a program
    • C. The intrinsic complexity of the code
    • D. The rate of change of data values as a program executes
    • Discuss
    • 10. The SQL statements that take care of security and authorization are

    • Options
    • A. DDL
    • B. DML
    • C. DCL
    • D. None
    • Discuss


    Comments

    There are no comments.

Enter a new Comment