Tuesday, October 26, 2010

Software QA and Testing



Software QA and Testing Frequently-Asked-Questions

Software QA and Testing


1. What is 'Software Quality Assurance'?

Software QA involves the entire software development PROCESS - monitoring and improving the process, making sure that any agreed- upon standards and procedures are followed, and ensuring that problems are found and dealt with. It is oriented to 'prevention'.

2.What is 'Software Testing'?

Testing involves operation of a system or application under controlled conditions and evaluating the results (eg, 'if the user is in interface A of the application while using hardware B, and does C, then D should happen'). The controlled conditions should include both normal and abnormal conditions. Testing should intentionally attempt to make things go wrong to determine if things happen when they shouldn't or things don't happen when they should. It is oriented to 'detection'.

3.What are some recent major computer system failures caused by software bugs?

In April of 2003 it was announced that the largest student loan company in the U.S. made a software error in calculating the monthly payments on 800,000 loans. Although borrowers were to be notified of an increase in their required payments, the company will still reportedly lose $8 million in interest. The error was uncovered when borrowers began reporting inconsistencies in their bills.

News reports in February of 2003 revealed that the U.S. Treasury Department mailed 50,000 Social Security checks without any beneficiary names. A spokesperson indicated that the missing names were due to an error in a software change. Replacement checks were subsequently mailed out with the problem corrected, and recipients were then able to cash their Social Security checks.

In March of 2002 it was reported that software bugs in Britain's national tax system resulted in more than 100,000 erroneous tax overcharges. The problem was partly attibuted to the difficulty of testing the integration of multiple systems.

A newspaper columnist reported in July 2001 that a serious flaw was found in off-the-shelf software that had long been used in systems for tracking certain U.S. nuclear materials. The same software had been recently donated to another country to be used in tracking their own nuclear materials, and it was not until scientists in that country discovered the problem, and shared the information, that U.S. officials became aware of the problems. According to newspaper stories in mid-2001, a major systems development contractor was fired and sued over problems with a large retirement plan management system. According to the reports, the client claimed that system deliveries were late, the software had excessive defects, and it caused other systems to crash.






In January of 2001 newspapers reported that a major European railroad was hit by the aftereffects of the Y2K bug. The company found that many of their newer trains would not run due to their inability to recognize the date '31/12/2000'; the trains were started by altering the control system's date settings.News reports in September of 2000 told of a software vendor settling a lawsuit with a large mortgage lender; the vendor had reportedly delivered an online mortgage processing system that did not meet specifications, was delivered late, and didn't work.
In early 2000, major problems were reported with a new computer system in a large suburban U.S. public school district with 100,000+ students; problems included 10,000 erroneous report cards and students left stranded by failed class registration systems; the district's CIO was fired. The school district decided to reinstate it's original 25-year old system for at least a year until the bugs were worked out of the new system by the software vendors.

In October of 1999 the $125 million NASA Mars Climate Orbiter spacecraft was believed to be lost in space due to a simple data conversion error. It was determined that spacecraft software used certain data in English units that should have been in metric units. Among other tasks, the orbiter was to serve as a communications relay for the Mars Polar Lander mission, which failed for unknown reasons in December 1999. Several investigating panels were convened to determine the process failures that allowed the error to go undetected.

Bugs in software supporting a large commercial high-speed data network affected 70,000 business customers over a period of 8 days in August of 1999. Among those affected was the electronic trading system of the largest U.S. futures exchange, which was shut down for most of a week as a result of the outages.

In April of 1999 a software bug caused the failure of a $1.2 billion military satellite launch, the costliest unmanned accident in the history of Cape Canaveral launches. The failure was the latest in a string of launch failures, triggering a complete military and industry review of U.S. space launch programs, including software integration and testing processes. Congressional oversight hearings were requested.

A small town in Illinois received an unusually large monthly electric bill of $7 million in March of 1999. This was about 700 times larger than its normal bill. It turned out to be due to bugs in new software that had been purchased by the local power company to deal with Y2K software issues.














4.Why is it often hard for management to get serious about quality assurance?

Solving problems is a high-visibility process; preventing problems is low-visibility. This is illustrated by an old parable:

In ancient China there was a family of healers, one of whom was known throughout the land and employed as a physician to a great lord. The physician was asked which of his family was the most skillful healer. He replied,"I tend to the sick and dying with drastic and dramatic treatments, and on occasion someone is cured and my name gets out among the lords." "My elder brother cures sickness when it just begins to take root, and his skills are known among the local peasants and neighbors." "My eldest brother is able to sense the spirit of sickness and eradicate it before it takes form. His name is unknown outside our home."

5.Why does software have bugs?

Miscommunication or no communication - as to specifics of what an application should or shouldn't do (the application's requirements).software complexity - the complexity of current software applications can be difficult to comprehend for anyone without experience in modern-day software development. Windows-type interfaces, client-server and distributed applications, data communications, enormous relational databases, and sheer size of
applications have all contributed to the exponential growth in software/system complexity. And the use of object-oriented techniques can complicate instead of simplify a project unless it is well-engineered.

Programming errors - programmers, like anyone else, can make mistakes.

Changing requirements - the customer may not understand the effects of changes, or may understand and request them anyway - redesign, rescheduling of engineers, effects on other projects, work already completed that may have to be redone or thrown out, hardware requirements that may be affected, etc. If there are many minor changes or any major changes, known and unknown dependencies among parts of the project are likely to interact and cause
problems, and the complexity of keeping track of changes may result in errors. Enthusiasm of engineering staff may be affected. In some fast-changing business environments, continuously modified requirements may be a fact of life. In this case, management must understand the resulting risks, and QA and test engineers must adapt and plan for continuous extensive testing to keep the inevitable bugs from running out of control

Time pressures - scheduling of software projects is difficult at best, often requiring a lot of guesswork. When deadlines loom and the crunch comes, mistakes will be made.





Egos - people prefer to say things like:
'no problem'
'piece of cake'
'I can whip that out in a few hours'
'it should be easy to update that old code'
Instead of:
'that adds a lot of complexity and we could end up making a lot of mistakes'
'we have no idea if we can do that; we'll wing it'
'I can't estimate how long it will take, until I
take a close look at it'
'we can't figure out what that old spaghetti code did in the first place'
If there are too many unrealistic 'no problem's', the result is bugs.

Poorly documented code - it's tough to maintain and modify code that is badly written or poorly documented; the result is bugs. In many organizations management provides no incentive for programmers to document their code or write clear, understandable code. In fact, it's usually the opposite: they get points mostly for quickly turning out code, and there's job security if nobody else can understand it ('if it was hard to write, it should be hard to read').

Software development tools - visual tools, class libraries, compilers, scripting tools, etc. often introduce their own bugs or are poorly documented, resulting in added bugs .


6.How can new Software QA processes be introduced in an existing organization?

A lot depends on the size of the organization and the risks involved. For large organizations with high-risk (in terms of lives or property) projects, serious management buy-in is required and a formalized QA process is necessary.
Where the risk is lower, management and organizational buy-in and QA implementation may be a slower, step-at-a-time process. QA processes should be balanced with productivity so as to keep bureaucracy from getting out of hand.
For small groups or projects, a more ad-hoc process may be appropriate, depending on the type of customers and projects. A lot will depend on team leads or managers, feedback to developers, and ensuring adequate communications among customers, managers, developers, and testers.
In all cases the most value for effort will be in requirements management processes, with a goal of clear, complete, testable requirement specifications or expectations .










7.What is verification? validation?

Verification typically involves reviews and meetings to evaluate documents, plans, code, requirements, and specifications. This can be done with checklists, issues lists, walkthroughs, and inspection meetings. Validation typically involves actual testing and takes place after verifications are completed. The term 'IV & V' refers to Independent Verification and Validation.

8.What is a 'walkthrough'?

A 'walkthrough' is an informal meeting for evaluation or informational purposes. Little or no preparation is usually required .

9.What's an 'inspection'?

An inspection is more formalized than a 'walkthrough', typically with 3-8 people including a moderator, reader, and a recorder to take notes. The subject of the inspection is typically a document such as a requirements spec or a test plan, and the purpose is to find problems and see what's missing, not to fix anything. Attendees should prepare for this type of meeting by reading thru The document; most problems will be found during this preparation. The result of the inspection meeting should be a written report. Thorough preparation for inspections is difficult, pain staking work but is one of the most cost effective methods of ensuring quality. Employees who are most skilled at inspections are like the 'eldest brother' in the parable in 'Why is it often hard for management to get serious about quality assurance?'. Their skill may have low visibility but they are extremely valuable to any software development organization, since bug prevention is far more cost- effective than bug detection .


10. What kinds of testing should be considered?

Black box testing - not based on any knowledge of internal design or code. Tests are based on requirements and functionality.

White box testing - based on knowledge of the internal logic of an application's code. Tests are based on coverage of code statements, branches, paths, conditions.

Unit testing - the most 'micro' scale of testing; to test particular functions or code modules. Typically done by the programmer and not by testers, as it requires detailed knowledge of the internal program design and code. Not always easily done unless the application has a well-designed architecture with tight code; may require developing test driver modules or test harnesses.






Incremental integration testing - continuous testing of an application as new functionality is added; requires that various aspects of an application's functionality be independent enough to work separately before all parts of the program are completed, or that test drivers be developed as needed; done by programmers or by testers.

Integration testing - testing of combined parts of an application to determine if they function together correctly. The 'parts' can be code modules, individual applications, client and server applications on a network, etc. This type of testing is especially relevant to client/server and distributed systems.

Functional testing - black-box type testing geared to functional requirements of an application; this type of testing should be done by testers. This doesn't mean that the programmers shouldn't check that their code works before releasing it (which of course applies to any stage of testing.)

System testing - black-box type testing that is based on overall requirements specifications; covers all combined parts of a system.

End-to-end testing - similar to system testing; the 'macro' end of the test scale; involves testing of a complete application environment in a situation that mimics real-world use, such as interacting with a database, using network communications, or interacting with other hardware, applications, or systems if appropriate.

Sanity testing - typically an initial testing effort to determine if a new software version is performing well enough to accept it for a major testing effort. For example, if the new software is crashing systems every 5 minutes, bogging down systems to a crawl, or destroying databases, the software may not be in a 'sane' enough condition to warrant further testing in its current state.

Regression testing - re-testing after fixes or modifications of the software or its environment. It can be difficult to determine how much re-testing is needed, especially near the end of the development cycle. Automated testing tools can be especially useful for this type of testing.

Acceptance testing - final testing based on specifications of the end-user or customer, or based on use by end-users/customers over some limited period of time.Load testing - testing an application under heavy loads, such as testing of a web site under a range of loads to determine at what point the system's response time degrades or fails.

Stress testing - term often used interchangeably with 'load' and 'performance' testing. Also used to describe such tests as system functional testing while under unusually heavy loads, heavy repetition of certain actions or inputs, input of large numerical values, large complex queries to a database system, etc.






Performance testing - term often used interchangeably with 'stress' and 'load' testing. Ideally 'performance' testing (and any other 'type' of testing) is defined in requirements documentation or QA or Test Plans.

Usability testing - testing for 'user-friendliness'. Clearly this is subjective, and will depend on the targeted end-user or customer. User interviews, surveys, video recording of user sessions, and other techniques can be used. Programmers and testers are usually not appropriate as usability testers.

Install/uninstall testing - testing of full, partial, or upgrade install/uninstall processes.

Recovery testing - testing how well a system recovers from crashes, hardware failures, or other catastrophic problems.

Security testing - testing how well the system protects against unauthorized internal or external access, willful damage, etc; may require sophisticated testing techniques.

Compatability testing - testing how well software performs in a particular hardware/software/operating system/network/etc. environment.

Exploratory testing - often taken to mean a creative, informal software test that is not based on formal test plans or test cases; testers may be learning the software as they test it.

Ad-hoc testing - similar to exploratory testing, but often taken to mean that the testers have significant understanding of the software before testing it.

User acceptance testing - determining if software is satisfactory to an end-user or customer.

Comparison testing - comparing software weaknesses and strengths to competing products.

Alpha testing - testing of an application when development is nearing completion; minor design
changes may still be made as a result of such testing. Typically done by end-users or others, not by programmers or testers.

Beta testing - testing when development and testing are essentially completed and final bugs and problems need to be found before final release. Typically done by end-users or others, not by programmers or testers.

Mutation testing - a method for determining if a set of test data or test cases is useful, by deliberately introducing various code changes ('bugs') and retesting with the original test data/cases to determine if the 'bugs' are detected. Proper implementation requires large computational resources .




11.What are 5 common problems in the software development process?

Poor requirements - if requirements are unclear, incomplete, too general, or not testable, there will be problems.

Unrealistic schedule - if too much work is crammed in too little time, problems are inevitable.

Inadequate testing - no one will know whether or not the program is any good until the
customer complains or systems crash.

Featuritis - requests to pile on new features after development is underway; extremely common.

Miscommunication - if developers don't know what's needed or customer's have erroneous expectations, problems are guaranteed .

12.What are 5 common solutions to software development problems?

Solid requirements - clear, complete, detailed, cohesive, attainable, testable requirements that are agreed to by all players. Use prototypes to help nail down requirements.Realistic schedules - allow adequate time for planning, design, testing, bug fixing, re-testing, changes, and documentation; personnel should be able to complete the project without burning out.

Adequate testing - start testing early on, re-test after fixes or changes, plan for adequate time for
testing and bug-fixing.

Stick to initial requirements as much as possible - be prepared to defend against changes and additions once development has begun, and be prepared to explain consequences. If changes are necessary, they should be adequately reflected in related schedule changes. If possible, use rapid prototyping during the design phase so that customers can see what to expect. This will provide them a higher comfort level with their requirements decisions and minimize changes later on .

Communication - require walkthroughs and inspections when appropriate; make extensive use of group communication tools - e-mail, groupware, networked bug-tracking tools and change management tools, intranet capabilities, etc.; insure that documentation is available and up-to- date - preferably electronic, not paper; promote teamwork and cooperation; use protoypes early on so that customers' expectations are clarified .










13.What is software 'quality'?

Quality software is reasonably bug-free, delivered on time and within budget, meets requirements and/or expectations, and is maintainable. However, quality is obviously a subjective term. It will depend on who the 'customer' is and their overall influence in the scheme of things. A wide-angle view of the 'customers' of a software development project might include end-users, customer acceptance testers, customer contract officers, customer management, the development organization's management/accountants/testers/salespeople, future software maintenance engineers, stockholders, magazine columnists, etc. Each type of 'customer' will have their own slant on 'quality' - the accounting department might define quality in terms of profits while an end-user might define quality as user-friendly and bug-free. (See the Bookstore section's 'Software QA' category for useful books with more information.)

14.What is 'good code'?

'Good code' is code that works, is bug free, and is readable and maintainable. Some organizations have coding 'standards' that all developers are supposed to adhere to, but everyone has different ideas about what's best, or what is too many or too few rules. There are also various theories and metrics, such as McCabe Complexity metrics. It should be kept in mind that excessive use of standards and rules can stifle productivity and creativity. 'Peer reviews', 'buddy checks' code analysis tools, etc. can be used to check for problems and enforce standards. For C and C++ coding, here are some typical ideas to consider in setting rules/standards; these may or may not apply to a particular situation:
Minimize or eliminate use of global variables.
Use descriptive function and method names - use both upper and lower case, avoid abbreviations, use as many characters as necessary to be adequately descriptive (use of more than 20 characters is not out of line); be consistent in naming conventions.
Use descriptive variable names - use both upper and lower case, avoid abbreviations, use as many characters as necessary to be adequately descriptive (use of more than 20 characters is not out of line); be consistent in naming conventions.
Function and method sizes should be minimized; less than 100 lines of code is good, less than 50 lines is preferable.
Function descriptions should be clearly spelled out in comments preceding a function's code.
Organize code for readability.
Use whitespace generously - vertically and horizontally
Each line of code should contain 70 characters max.
One code statement per line.
Coding style should be consistent throught a program (eg, use of brackets, indentations, naming conventions, etc.)
In adding comments, err on the side of too many rather than too few comments; a common rule of thumb is that there should be at least as many lines of comments (including header blocks) as lines of code.
No matter how small, an application should include documentaion of the overall program function and flow (even a few paragraphs is better than nothing); or if possible a separate flow chart and detailed program documentation.
Make extensive use of error handling procedures and status and error logging.
For C++, to minimize complexity and increase maintainability, avoid too many levels of inheritance in class heirarchies
(relative to the size and complexity of the application). Minimize use of multiple inheritance, and minimize use of operator overloading (note that the Java programming language eliminates multiple inheritance and operator overloading.)
Cor C++, keep class methods small, less than 50 lines of code per method is preferable.For C++, make liberal use of exception handlers
15. What is 'good design'?
'Design' could refer to many things, but often refers to 'functional design' or 'internal design'. Good internal design is
indicated by software code whose overall structure is clear, understandable, easily modifiable, and maintainable; is robust with sufficient error-handling and status logging capability; and works correctly when implemented. Good functional design is indicated by an application whose functionality can be traced back to customer and end-user requirements. (See further discussion of functional and internal design in 'What's the big deal about requirements?' in FAQ #2.) For programs that have a user interface, it's often a good idea to assume that the end user will have little computer knowledge and may not read a user manual or even the on-line help; some common rules-of-thumb
include:
The program should act in a way that least surprises the user
It should always be evident to the user what can be done next and how to exit
The program shouldn't let the users do something stupid without warning them.


16. What is SEI? CMM? ISO? IEEE? ANSI? Will it help?
SEI = 'Software Engineering Institute' at Carnegie-Mellon University; initiated by the U.S. Defense Department to help improve software development processes.
CMM = 'Capability Maturity Model', developed by the SEI. It's a model of 5 levels of organizational 'maturity' that determine effectiveness in delivering quality software. It is geared to large organizations such as large U.S. Defense Department contractors. However, many of the QA processes involved are appropriate to any organization, and if reasonably applied can be helpful. Organizations can receive CMM ratings by undergoing assessments by qualified auditors.
Level 1 - characterized by chaos, periodic panics, and eroic efforts required by individuals to successfully complete projects. Few if any processes in place; successes may not be repeatable.
Level 2 - software project tracking, requirements management, realistic planning, and configuration management processes are in place; successful practices can be repeated.
Level 3 - standard software development and maintenance rocesses are integrated throughout an organization; a Software Engineering Process Group is is in place to oversee software processes, and training programs are used to ensure understanding and compliance.
Level 4 - metrics are used to track productivity, processes, and products. Project performance is predictable, and quality is consistently high.
Level 5 - the focus is on continouous process improvement. The impact of new processes and technologies can be predicted and effectively implemented when required.
Perspective on CMM ratings: During 1997-2001, 1018 organizations were assessed. Of those, 27% were rated at Level 1, 39% at 2, 23% at 3, 6% at 4, and 5% at 5. (For ratings during the period 1992-96, 62% were at Level 1, 23% at 2, 13% at 3, 2% at 4, and 0.4% at 5.) The median size of organizations was 100 software engineering/maintenance personnel; 32% of organizations were U.S. federal contractors or agencies. For those rated at Level 1, the most problematical key process area was in Software Quality Assurance.ISO = 'International Organisation for Standardization' - The ISO 9001:2000 standard (which replaces the previous standard of 1994)
concerns quality systems that are assessed by outside auditors, and it applies to many kinds of production and manufacturing organizations, not just software. It covers documentation, design, development, production, testing, installation, servicing, and other processes. The full set of standards consists of: (a)Q9001-2000 - Quality Management Systems: Requirements; (b)Q9000-2000 - Quality Management Systems: Fundamentals and
Vocabulary; (c)Q9004-2000 - Quality Management Systems: Guidelines for Performance Improvements. To be ISO 9001 certified, a third-party auditor assesses an organization, and certification is typically good for about 3 years, after which a complete reassessment is required. Note that ISO certification does not necessarily indicate quality products - it indicates only that documented processes are followed. Also see http://www.iso.ch/ for the latest information. In the U.S. the standards can be purchased via the ASQ web site at http://e- standards.asq.org/
IEEE = 'Institute of Electrical and Electronics Engineers' - among other things, creates standards such as 'IEEE Standard for Software Test Documentation' (IEEE/ANSI Standard 829), 'IEEE Standard of Software Unit Testing (IEEE/ANSI Standard 1008), 'IEEE Standard for Software Quality Assurance Plans' (IEEE/ANSI Standard 730), and others.
ANSI = 'American National Standards Institute', the primary industrial standards body in the U.S.; publishes some software- related standards in conjunction with the IEEE and ASQ (American Society for Quality).
Other software development process assessment methods besides CMM and ISO 9000 include SPICE, Trillium, TickIT. and Bootstrap. See the 'Other Resources' section for further information available on the web.






16.What is the 'software life cycle'?
The life cycle begins when an application is first conceived and ends when it is no longer in use. It includes aspects such as initial concept, requirements analysis, functional design, internal design, documentation planning, test planning, coding, document preparation, integration, testing, maintenance, updates, retesting, phase-out, and other aspects. (See the Bookstore section's 'Software QA', 'Software Engineering', and 'Project Management' categories for
useful books with more information.)
17. Will automated testing tools make testing easier?
Possibly. For small projects, the time needed to learn and implement them may not be worth it. For larger projects, or on- going long-term projects they can be valuable.
A common type of automated tool is the 'record/playback' type. For example, a tester could click through all combinations of menu choices, dialog box choices, buttons, etc. in an application GUI and have them 'recorded' and the results logged by a tool. The 'recording' is typically in the form of text based on a scripting language that is interpretable by the testing tool. If new buttons are added, or some underlying code in the application is changed, etc. the application can then be retested by just 'playing back' the 'recorded' actions, and comparing the logging
results to check effects of the changes. The problem with such tools is that if there are continual changes to the system being tested, the 'recordings' may have to be changed so much that it becomes very time-consuming to continuously update the scripts. Additionally, interpretation of results (screens, data, logs, etc.) can be a difficult task. Note that there are record/playback tools for text-based interfaces also, and for all types of platforms.
Other automated tools can include :
Code analyzers - monitor code complexity, adherence to standards, etc .
Coverage analyzers - these tools check which parts of the code have been exercised by a test, and may be oriented to code statement coverage,condition coverage, path coverage, etc.Memory analyzers - such as bounds-checkers and leak detectors .
Load/performance test tools - for testing client/server and web applications under various load levels.
Web test tools - to check that links are valid, HTML code usage is correct, client-side and server-side programs work, a web site's interactions are secure.
Other tools - for test case management, documentation management, bug reporting, and configuration management.



SUCCESS FOR CAREER



18. What makes a good test engineer?
A good test engineer has a 'test to break' attitude, an ability to take the point of view of the customer, a strong desire for quality, and an attention to detail. Tact and diplomacy are useful in maintaining a cooperative relationship with developers, and an ability to communicate with both technical (developers) and non-technical (customers, management) people is useful. Previous software development experience can be helpful as it provides a deeper understanding of the software development process, gives the tester an appreciation for the developers' point of view, and reduce the learning curve in automated test tool programming. Judgement skills are needed to assess high-risk areas of an application on which to focus testing efforts when time is limited.
19. What makes a good Software QA engineer?
The same qualities a good tester has are useful for a QA engineer. Additionally, they must be able to understand the entire software development process and how it can fit into the business approach and goals of the organization. Communication skills and the ability to understand various sides of issues are important. In organizations in the early stages of implementing QA processes, patience and diplomacy are especially needed. An ability to find problems as well as to see 'what's missing' is important for inspections and reviews.


20. What makes a good QA or Test manager?
A good QA, test, or QA/Test(combined) manager should:
> Be familiar with the software development process
>Be able to maintain enthusiasm of their team and promote a positive atmosphere, despite what is a somewhat 'negative' process (e.g., looking for or preventing problems)
> Be able to promote teamwork to increase productivity
>Be able to promote cooperation between software, test, and QA engineers
>Have the diplomatic skills needed to promote improvements in QA processes
> Have the ability to withstand pressures and say 'no' to other managers when quality is insufficient or QA processes are not being adhered to
>Have people judgement skills for hiring and keeping skilled personnel
>Be able to communicate with technical and non-technical people, engineers, managers, and customers.
>Be able to run meetings and keep them focused
21. What's the role of documentation in QA?
Critical. (Note that documentation can be electronic, not necessarily paper.) QA practices should be documented such that they are repeatable. Specifications, designs, business rules, inspection reports, configurations, code changes, test plans, test cases, bug reports, user manuals, etc. should all be documented. There should ideally be a system for easily finding and obtaining documents and determining what documentation will have a particular piece of information. Change management for documentation should be used if possible.
22. What's the big deal about 'requirements'?
One of the most reliable methods of insuring problems, or failure, in a complex software project is to have poorly
documented requirements specifications. Requirements are the details describing an application's externally-perceived functionality and properties. Requirements should be clear, complete, reasonably detailed, cohesive, attainable, and testable. A non-testable requirement would be, for example, 'user-friendly' (too subjective). A testable requirement would be something like 'the user must enter their previously-assigned password to access the application'. etermining
and organizing requirements details in a useful and efficient way can be a difficult effort; different methods are available
depending on the particular project. Many books are available that describe various approaches to
Care should be taken to involve ALL of a project's significant 'customers' in the requirements process. 'Customers' could be in-house personnel or out, and could include end-users, customer acceptance testers, customer contract officers, customer management, future software maintenance engineers, salespeople, etc. Anyone who could later derail the project if their expectations aren't met should be included if possible.
Organizations vary considerably in their handling of requirements specifications. Ideally, the requirements are spelled out in a document with statements such as 'The product shall.....'. 'Design' specifications should not be confused with 'requirements'; design specifications should be traceable back to the requirements.
In some organizations requirements may end up in high level project plans, functional specification documents, in design documents, or in other documents at various levels of detail. No matter what they are called, some type of documentation with detailed requirements will be needed by testers in order to properly plan and execute tests. Without such documentation, there will be no clear-cut way to determine if a software application is performing correctly.
23.What steps are needed to develop and run software tests?
The following are some of the steps to consider:
Obtain requirements, functional design, and internal design specifications and other necessary documents
Obtain budget and schedule requirements
Determine project-related personnel and their responsibilities, reporting requirements, required standards and processes (such as release processes, change processes, etc.)
Identify application's higher-risk aspects, set priorities, and determine scope and limitations of tests
Determine test approaches and methods - unit, integration, functional, system, load, usability tests, etc.
Determine test environment requirements (hardware, software communications, etc.)
Determine testware requirements (record/playback tools, coverage analyzers, test tracking, problem/bug tracking, etc.)
Determine test input data requirements
Identify tasks, those responsible for tasks, and labor requirements
Set schedule estimates, timelines, milestones
Determine input equivalence classes, boundary value analyses, error classes
Prepare test plan document and have needed reviews/approvals
Write test cases
Have needed reviews/inspections/approvals of test cases
Prepare test environment and testware, obtain needed user manuals/reference documents/configuration guides/installation guides, set up test tracking processes, set up logging and archiving processes, set up or obtain test input data Obtain and install software releases
Perform tests
Evaluate and report results
Track problems/bugs and fixes
Retest as needed
Maintain and update test plans, test cases, test environment, and testware through life cycle





EXAMAPERS123.BLOGSPOT.COM





23. What's a 'test plan'?
A software project test plan is a document that describes the objectives, scope, approach, and focus of a software testing effort. The process of preparing a test plan is a useful way to think through the efforts needed to validate the acceptability of a software product. The completed document will help people outside the test group understand the 'why' and 'how' of product validation. It should be thorough enough to be useful but not so thorough that no one outside the test group will read it. The following are some of the items that might be included in a test plan, depending on the particular project:
Title
Identification of software including version/release numbers
Revision history of document including authors, dates, approvals
Table of Contents
Purpose of document, intended audience
Objective of testing effort
Software product overview
Relevant related document list, such as requirements, design documents, other test plans, etc.
Relevant standards or legal requirements
Traceability requirements
Relevant naming conventions and identifier conventions
Overall software project organization and personnel/contact- info/responsibilties
Test organization and personnel/contact-info/responsibilities
Assumptions and dependencies
Project risk analysis
Testing priorities and focus
Scope and limitations of testing
Test outline - a decomposition of the test approach by test type, feature, functionality, process, system, module, etc. as applicable
Outline of data input equivalence classes, boundary value analysis, error classes
Test environment - hardware, operating systems, other required software, data configurations, interfaces to other systems
Test environment validity analysis - differences between the test and production systems and their impact on test validity.
Test environment setup and configuration issues Software migration processes Software CM processes
Test data setup requirements
Database setup requirements
Outline of system-logging/error-logging/other capabilities, and tools such as screen capture software, that will be used to help describe and report bugs
Discussion of any specialized software or hardware tools that will be used by testers to help track the cause or source of bugs
Test automation - justification and overview
Test tools to be used, including versions, patches, etc.
Test script/test code maintenance processes and version control
Problem tracking and resolution - tools and processes
Project test metrics to be used
Reporting requirements and testing deliverables
Software entrance and exit criteria
Initial sanity testing period and criteria
Test suspension and restart criteria
Personnel allocation
Personnel pre-training needs
Test site/location
Outside test organizations to be utilized and their purpose, responsibilties, deliverables, contact persons, and coordination issues
Relevant proprietary, classified, security, and licensing issues. Open issues
Appendix - glossary, acronyms, etc.



24. What's a 'test case'?
A test case is a document that describes an input, action, or event and an expected response, to determine if a feature of an application is working correctly. A test case should contain particulars such as test case identifier, test case name, objective, test conditions/setup, input data requirements, steps, and expected results.
Note that the process of developing test cases can help find problems in the requirements or design of an application, since it requires completely thinking through the operation of the application. For this reason, it's useful to prepare test cases early in the development cycle if possible.
25. What should be done after a bug is found?
The bug needs to be communicated and assigned to developers that can fix it. After the problem is resolved, fixes should be re-tested, and determinations made regarding requirements for regression testing to check that fixes didn't create problems elsewhere. If a problem- tracking system is in place, it should encapsulate these processes. A variety of commercial problem-tracking/management software tools are available (see the 'Tools' section for web resources with listings of such tools). The following are items to consider in the tracking process:
Complete information such that developers can understand the bug, get an idea of it's severity, and reproduce it if necessary. Bug identifier (number, ID, etc.) Current bug status (e.g., 'Released for Retest', 'New', etc.) The application name or identifier and version The function, module, feature, object, screen, etc. where the bug occurred
Environment specifics, system, platform, relevant hardware specifics
Test case name/number/identifier
One-line bug description
Full bug description
Description of steps needed to reproduce the bug if not covered by a test case or if the developer doesn't have easy access to the test case/test script/test tool
Names and/or descriptions of file/data/messages/etc. used in test
File excerpts/error messages/log file excerpts/screen shots/test tool logs that would be helpful in finding the cause of the problem Severity estimate (a 5-level range such as 1-5 or 'critical'-to- 'low' is common)
26. Was the bug reproducible?
Tester name
Test date
Bug reporting date
Name of developer/group/organization the problem is assigned to
Description of problem cause
Description of fix
Code section/file/module/class/method that was fixed
Date of fix
Application version that contains the fix
Tester responsible for retest
Retest date
Retest results
Regression testing requirements
Tester responsible for regression tests
Regression testing results
A reporting or tracking process should enable notification of appropriate personnel at various stages. For instance, testers need to know when retesting is needed, developers need to know when bugs are found and how to get the needed information, and reporting/summary capabilities are needed for managers.
27. What is 'configuration management'?
Configuration management covers the processes used to control, coordinate, and track: code, requirements, documentation, problems, change requests, designs, tools/compilers/libraries/patches, changes made to them, and who makes the changes. (See the 'Tools' section for web resources with listings of configuration management
tools. Also see the Bookstore section's 'Configuration Management' category for useful books with more information.)




27. What if the software is so buggy it can't really be tested at all?
The best bet in this situation is for the testers to go through the process of reporting whatever bugs or blocking-type problems initially show up, with the focus being on critical bugs. Since this type of problem can severely affect schedules, and indicates deeper problems in the software development process (such as insufficient unit testing or insufficient integration testing, poor design, improper build or release procedures, etc.) managers should be notified, and provided with some documentation as evidence of the problem.
28. How can it be known when to stop testing?
This can be difficult to determine. Many modern software applications are so complex, and run in such an interdependent environment, that complete testing can never be done. Common factors in deciding when to stop are:
Deadlines (release deadlines, testing deadlines, etc.) Test cases completed with certain percentage passed
Test budget depleted Coverage of code/functionality/requirements reaches a specified point Bug rate falls below a certain level Beta or alpha testing period ends
29. What if there isn't enough time for thorough testing?
Use risk analysis to determine where testing should be focused. Since it's rarely possible to test every possible aspect of an application, every possible combination of events, every dependency, or everything that could go wrong, risk analysis is appropriate to most software development projects. This requires judgement skills, common sense, and experience. (If warranted, formal methods are also available.) Considerations can include:
Which functionality is most important to the project's intended purpose?
Which functionality is most visible to the user?
Which functionality has the largest safety impact?
Which functionality has the largest financial impact on users?
Which aspects of the application are most important to the customer?
Which aspects of the application can be tested early in the development cycle?
Which parts of the code are most complex, and thus most subject to errors?
Which parts of the application were developed in rush or panic mode?
Which aspects of similar/related previous projects caused problems?
Which aspects of similar/related previous projects had large maintenance expenses?
Which parts of the requirements and design are unclear or poorly thought out?
What do the developers think are the highest-risk aspects of the application?
What kinds of problems would cause the worst publicity?
What kinds of problems would cause the most customer service complaints?
What kinds of tests could easily cover multiple functionalities?
Which tests will have the best high-risk-coverage to time- required ratio?
What if the project isn't big enough to justify extensive testing?
Consider the impact of project errors, not the size of the project. However, if extensive testing is still not justified,
risk analysis is again needed and the same considerations as described previously in 'What if there isn't enough time for thorough testing?' apply.

The tester might then do ad hoc testing, or write up a limited test plan based on the risk analysis.



30. What can be done if requirements are changing continuously?
A common problem and a major headache.
Work with the project's stakeholders early on to understand how requirements might change so that alternate test plans and strategies can be worked out in advance, if possible.
It's helpful if the application's initial design allows for some adaptability so that later changes do not require redoing the
application from scratch.
If the code is well-commented and well-documented this makes changes easier for the developers.
Use rapid prototyping whenever possible to help customers feel sure of their requirements and minimize changes.
The project's initial schedule should allow for some extra time commensurate with the possibility of changes.
Try to move new requirements to a 'Phase 2' version of an application, while using the original requirements for the 'Phase 1' version.
Negotiate to allow only easily-implemented new requirements into the project, while moving more difficult new requirements into future versions of the application.
Be sure that customers and management understand the scheduling impacts, inherent risks, and costs of significant requirements changes. Then let management or the customers (not the developers or testers) decide if the changes are warranted - after all, that's their job.
Balance the effort put into setting up automated testing with the expected effort required to re-do them to deal with changes.
Try to design some flexibility into automated test scripts.
Focus initial automated testing on application aspects that are most likely to remain unchanged.
Devote appropriate effort to risk analysis of changes to minimize regression testing needs.
Design some flexibility into test cases (this is not easily done; the best bet might be to minimize the detail in the test cases, or set up only higher-level generic-type test plans)
Focus less on detailed test plans and test cases and more on ad hoc testing (with an understanding of the added risk that this entails).
31. What if the application has functionality that wasn't in the requirements?
It may take serious effort to determine if an application has significant unexpected or hidden functionality, and it would
indicate deeper problems in the software development process. If the functionality isn't necessary to the purpose of the application, it should be removed, as it may have unknown impacts or dependencies that were not taken into account by the designer or the customer. If not removed, design information will be needed to determine added testing needs or regression testing needs. Management should be made aware of any significant added risks as a result of the unexpected functionality. If the functionality only effects areas such as minor improvements in the user interface,
for example, it may not be a significant risk


32. How can Software QA processes be implemented without stifling productivity?
By implementing QA processes slowly over time, using consensus to reach agreement on processes, and adjusting and experimenting as an organization grows and matures, productivity will be improved instead of stifled. Problem prevention will lessen the need for problem detection, panics and burn-out will decrease, and there will be improved focus and less wasted effort. At the same time, attempts should be made to keep processes simple and efficient, minimize paperwork, promote computer-based processes and automated tracking and reporting, minimize time required in meetings, and promote training as part of the QA process. However, no one - especially talented technical types - likes rules or bureacracy, and in the short run things may slow down a bit. A typical scenario would be that
more days of planning and development will be needed, but less time will be required for late- night bug-fixing and calming of irate customers. (See the Bookstore section's 'Software QA', 'Software Engineering',
And 'Project Management' categories for useful books with more information.)
33. What if an organization is growing so fast that fixed QA processes are impossible?
This is a common problem in the software industry, especially in new technology areas. There is no easy solution in this situation, other than:
Hire good people
Management should 'ruthlessly prioritize' quality issues and maintain focus on the customer
Everyone in the organization should be clear on what 'quality' means to the customer
34. How does a client/server environment affect testing?
Client/server applications can be quite complex due to the multiple dependencies among clients, data communications, hardware, and servers. Thus testing requirements can be extensive. When time is limited (as it usually is) the focus should be on integration and system testing. Additionally, load/stress/performance testing may be useful in determining client/server application limitations and capabilities. There are commercial tools to assist with such testing. (See the 'Tools' section for web resources with listings that include these kinds of test tools.)
35. How can World Wide Web sites be tested?
Web sites are essentially client/server applications - with web servers and 'browser' clients. Consideration should be given to the interactions between html pages, TCP/IP communications, Internet connections, firewalls, applications that run in web pages (such as applets, javascript, plug-in applications), and applications that run on the server side (such as cgi scripts, database interfaces, logging applications, dynamic page generators, asp, etc.). Additionally, there are a wide variety of servers and browsers, various versions of each, small but sometimes significant differences between them, variations in connection speeds, rapidly changing technologies, and multiple standards and protocols. The end result is that testing for web sites can become a major ongoing effort. Other considerations might include:
What are the expected loads on the server (e.g., number of hits per unit time?), and what kind of performance is required under such loads (such as web server response time, database query response times). What kinds of tools will be needed for performance testing (such as web load testing tools, other tools already in house that can be adapted, web robot downloading tools, etc.)?
Who is the target audience? What kind of browsers will they be using? What kind of connection speeds will they by using? Are they intra- organization (thus with likely high connection speeds and similar browsers) or Internet-wide (thus with a wide variety of connection speeds and browser types)?
What kind of performance is expected on the client side (e.g., how fast should pages appear, how fast should animations, applets, etc. load and run)?
Will down time for server and content maintenance/upgrades be allowed? how much?
What kinds of security (firewalls, encryptions, passwords, etc.) will be required and what is it expected to do? How can it be tested?


How reliable are the site's Internet connections required to be?
And how does that affect backup system or redundant connection requirements and testing?
What processes will be required to manage updates to the web site's content, and what are the requirements for maintaining, tracking, and controlling page content, graphics, links, etc.?
Which HTML specification will be adhered to? How strictly? What variations will be allowed for targeted browsers?
Will there be any standards or requirements for page appearance and/or graphics throughout a site or parts of a site??
How will internal and external links be validated and updated? how often?
Can testing be done on the production system, or will a separate test system be required? How are browser caching,
variations in browser option settings, dial-up connection variabilities, and real-world internet 'traffic congestion' problems to be accounted for in testing?
How extensive or customized are the server logging and reporting requirements; are they considered an integral part of the system and do they require testing?
How are cgi programs, applets, javascripts, ActiveX components, etc. to be maintained, tracked, controlled, and tested?
Some sources of site security information include the Usenet Newsgroup 'comp.security.announce' and links concerning web site security in The 'Other Resources' section.
Some usability guidelines to consider - these are subjective and may or may not apply to a given situation (Note: more information on usability testing issues can be found in articles about web site usability in the 'Other Resources' section):
Pages should be 3-5 screens max unless content is tightly focused on a single topic. If larger, provide internal links
within the page.
The page layouts and design elements should be consistent throughout a site, so that it's clear to the user that they're
still within a site.
Pages should be as browser-independent as possible, or pages should be provided or generated based on the browser-type.
All pages should have links external to the page; there should be no dead-end pages.
The page owner, revision date, and a link to a contact person or organization should be included on each page.
35. How is testing affected by object-oriented designs?
Well-engineered object-oriented design can make it easier to trace from code to internal design to functional design to requirements.
While there will be little affect on black box testing (where an understanding of the internal design of the application is
unnecessary), white-box testing can be oriented to the application's objects. If the application was well-designed this can simplify test design.
What is Extreme Programming and what's it got to do with testing? Extreme Programming (XP) is a software development approach for small teams on risk-prone projects with unstable requirements.
It was created by Kent Beck who described the approach in his book 'Extreme Programming Explained' (See the Softwareqatest.com Books page.).
Testing ('extreme testing') is a core aspect of Extreme Programming.
Programmers are expected to write unit and functional test code first - before the application is developed. Test code is under source control along with the rest of the code. Customers are expected to be an integral part of the project team and to help develope scenarios for acceptance/black box testing. Acceptance tests are preferably automated, and are modified and rerun for each of the frequent development iterations. QA and test personnel are also required to be an integral part of the project team. Detailed requirements documentation is not used, and frequent re-scheduling,
re-estimating, and re-prioritizing is expected. For more info see the XP-related listings in the Softwareqatest.com 'Other Resources' section.






EXAMAPERS123.BLOGSPOT.COM







EXAMAPERS123.BLOGSPOT.COM

AN INTRODUCTION TO SOFTWARE TESTING



AN INTRODUCTION TO SOFTWARE TESTING




SUCCESS FOR CAREER


AN INTRODUCTION TO SOFTWARE TESTING

1. WHAT IS SOFTWARE TESTING?

There are many published definitions of software testing, however, all of these definitions boil down to essentially the same thing: software testing is the process of executing software in a controlled manner, in order to answer the question "Does the software behave as specified?".

Software testing is often used in association with the terms verification and validation. Verification is the checking or testing of items, including software, for conformance and consistency with an associated specification. Software testing is just one kind of verification, which also uses techniques such as reviews, analysis, inspections and walkthroughs. Validation is the process of checking that what has been specified is what the user actually wanted.

• Validation: Are we doing the right job?
• Verification: Are we doing the job right?




The term bug is often used to refer to a problem or fault in a computer. There are software bugs and hardware bugs. The term originated in the United States, at the time when pioneering computers were built out of valves, when a series of previously inexplicable faults were eventually traced to moths flying about inside the computer.

Software testing should not be confused with debugging. Debugging is the process of analyzing and locating bugs when software does not behave as expected. Although the identification of some bugs will be obvious from playing with the software, a methodical approach to software testing is a much more thorough means of identifying bugs. Debugging is therefore an activity which supports testing, but cannot replace testing. However, no amount of testing can be guaranteed to discover all bugs.

Other activities which are often associated with software testing are static analysis and dynamic analysis. Static analysis investigates the source code of software, looking for problems and gathering metrics without actually executing the code. Dynamic analysis looks at the behaviour of software while it is executing, to provide information such as execution traces, timing profiles, and test coverage information.

2. SOFTWARE SPECIFICATIONS AND TESTING

The key component of the above definitions is the word specified. Validation and verification activities, such as software testing, cannot be meaningful unless there is a specification for the software. Software could be a single module or unit of code, or an entire system. Depending on the size of the development and the development methods, specification of software can range from a single document to a complex hierarchy of documents.
A hierarchy of software specifications will typically contain three or more levels of software
specification documents.

• The Requirements Specification, which specifies what the software is required to do and may also specify constraints on how this may be achieved.
• The Architectural Design Specification, which describes the architecture of a design which implements the requirements. Components within the software and the relationship between them will be described in this document.
• Detailed Design Specifications, which describe how each component in the software, down to individual units, is to be implemented.

Requirements Specification
|
Architectural Design Specification
|
Detailed Design Specification
With such a hierarchy of specifications, it is possible to test software at various stages of the development, for conformance with each specification. The levels of testing which correspond to the hierarchy of software specifications listed above are:

• Unit Testing, in which each unit (basic component) of the software is tested to verify that the detailed design for the unit has been correctly implemented.

• Software Integration Testing, in which progressively larger groups of tested software components corresponding to elements of the architectural design are integrated and tested until the software works as a whole.

• System Testing, in which the software is integrated to the overall product and tested to show that all requirements are met.

A further level of testing is also concerned with requirements:

• Acceptance Testing, upon which acceptance of the completed software is based. This will often use a subset of the system tests, witnessed by the customers for the software or system.

Once each level of software specification has been written, the next step is to design the tests. An important point here is that the tests should be designed before the software is implemented, because if the software was implemented first it would be too tempting to test the software against what it is observed to do (which is not really testing at all), rather than against what it is specified to do.

Within each level of testing, once the tests have been applied, test results are evaluated. If a problem is encountered, then either the tests are revised and applied again, or the software is fixed and the tests applied again. This is repeated until no problems are encountered, at which point development can proceed to the next level of testing.

Testing does not end following the conclusion of acceptance testing. Software has to be maintained to fix problems which show up during use and to accommodate new requirements. Software tests have to be repeated, modified and extended. The effort to revise and repeat tests consequently forms a major part of the overall cost of developing and maintaining software. The term regression testing is used to refer to the repetition of earlier successful tests in order to make sure that changes to the software have not introduced side effects.

3. TEST DESIGN DOCUMENTATION

The design of tests is subject to the same basic engineering principles as the design of software. Good design consists of a number of stages which progressively elaborate the design of tests from an initial high level strategy to detailed test procedures. These stages are: test strategy, test planning, test case design, and test procedure design.

The design of tests has to be driven by the specification of the software. At the highest level this means that tests will be designed to verify that the software faithfully implements the requirements of the Requirements Specification. At lower levels tests will be designed to verify that items of software implement all design decisions made in the Architectural Design Specification and Detailed Design Specifications. As with any design process, each stage of the test design process should be subject to informal and formal review.

The ease with which tests can be designed is highly dependant on the design of the software. It is important to consider testability as a key (but usually undocumented) requirement for any software development.


3.1. TEST STRATEGY

The first stage is the formulation of a test strategy. A test strategy is a statement of the overall approach to testing, identifying what levels of testing are to be applied and the methods, techniques and tools to be used. A test strategy should ideally be organization wide, being applicable to all of an organisations software development.

Developing a test strategy which efficiently meets the needs of an organisation is critical to the success of software development within the organisation. The application of a test strategy to a software development project should be detailed in the projects software quality plan.

3.2. TEST PLANS

The next stage of test design, which is the first stage within a software development project, is the development of a test plan. A test plan states what the items to be tested are, at what level they will be tested, what sequence they are to be tested in, how the test strategy will be applied to the testing of each item, and describes the test environment.

A test plan may be project wide, or may in fact be a hierarchy of plans relating to the various levels of specification and testing:

• An Acceptance Test Plan, describing the plan for acceptance testing of the software. This would usually be published as a separate document, but might be published with the system test plan as a single document.

• A System Test Plan, describing the plan for system integration and testing. This would also usually be published as a separate document, but might be published with the acceptance test plan.

• A Software Integration Test Plan, describing the plan for integration of tested software components. This may form part of the Architectural Design Specification.

• Unit Test Plan(s), describing the plans for testing of individual units of software. These may form part of the Detailed Design Specifications.

The objective of each test plan is to provide a plan for verification, by testing the software, that the software produced fulfils the requirements or design statements of the appropriate software specification. In the case of acceptance testing and system testing, this means the Requirements Specification.

3.3. TEST CASE DESIGN

Once the test plan for a level of testing has been written, the next stage of test design is to specify a set of test cases or test paths for each item to be tested at that level. A number of test cases will be identified for each item to be tested at each level of testing. Each test case will specify how the implementation of a particular requirement or design decision is to be tested and the criteria for success of the test.

The test cases may be documented with the test plan, as a section of a software specification, or in a separate document called a test specification or test description.

• An Acceptance Test Specification, specifying the test cases for acceptance testing of
the software. This would usually be published as a separate document, but might be
published with the acceptance test plan.
• A System Test Specification, specifying the test cases for system integration and testing. This would also usually be published as a separate document, but might be published with the system test plan.

• Software Integration Test Specifications, specifying the test cases for each stage of
integration of tested software components. These may form sections of the Architectural
Design Specification.

• Unit Test Specifications, specifying the test cases for testing of individual units of
software. These may form sections of the Detailed Design Specifications.

System testing and acceptance testing involve an enormous number of individual test cases.
In order to keep track of which requirements are tested by which test cases, an index which
cross references between requirements and test cases often constructed. This is usually referred to as a Verification Cross Reference Index (VCRI) and is attached to the test specification. Cross reference indexes may also be used with unit testing and software integration testing.

It is important to design test cases for both positive testing and negative testing. Positive testing checks that the software does what it should. Negative testing checks that the software doesn't do what it shouldn't.

The process of designing test cases, including executing them as thought experiments, will often identify bugs before the software has even been built. It is not uncommon to find more bugs when designing tests than when executing tests.

3.4. TEST PROCEDURES

The final stage of test design is to implement a set of test cases as a test procedure, specifying the exact process to be followed to conduct each of the test cases. This is a fairly straight forward process, which can be likened to designing units of code from higher level functional descriptions.

For each item to be tested, at each level of testing, a test procedure will specify the process to be followed in conducting the appropriate test cases. A test procedure cannot leave out steps or make assumptions. The level of detail must be such that the test procedure is deterministic and repeatable.

Test procedures should always be separate items, because they contain a great deal of detail which is irrelevant to software specifications. If AdaTEST or Cantata are used, test procedures may be coded directly as AdaTEST or Cantata test scripts.

4. TEST RESULTS DOCUMENTATION

When tests are executed, the outputs of each test execution should be recorded in a test results file. These results are then assessed against criteria in the test specification to determine the overall outcome of a test. If AdaTEST or Cantata are used, this file will be created and the results assessed automatically according to criteria specified in the test script.

Each test execution should also be noted in a test log. The test log will contain records of when each test has been executed, the outcome of each test execution, and may also include key observations made during test execution. Often a test log is not maintained for lower levels of testing (unit test and software integration test).

Test reports may be produced at various points during the testing process. A test report will summarise the results of testing and document any analysis. An acceptance test report often forms a contractual document within which acceptance of software is agreed.



5. FURTHER RESULTS AND CONCLUSION

Software can be tested at various stages of the development and with various degrees of rigour. Like any development activity, testing consumes effort and effort costs money. Developers should plan for between 30% and 70% of a projects effort to be expended on verification and validation activities, including software testing.

From an economics point of view, the level of testing appropriate to a particular organisation and software application will depend on the potential consequences of undetected bugs. Such consequences can range from a minor inconvenience of having to find a work-round for a bug to multiple deaths. Often overlooked by software developers (but not by customers), is the long term damage to the credibility of an organization which delivers software to users with bugs in it, and the resulting negative impact on future business. Conversely, a reputation for reliable software will help an organization to obtain future business.

Efficiency and quality are best served by testing software as early in the life cycle as practical, with full regression testing whenever changes are made. The later a bug is found, the higher the cost of fixing it, so it is sound economics to identify and fix bugs as early as possible. Designing tests will help to identify bugs, even before the tests are executed, so designing tests as early as practical in a software development is a useful means of reducing the cost of identifying and correcting bugs.

In practice the design of each level of software testing will be developed through a number of layers, each adding more detail to the tests. Each level of tests should be designed before the implementation reaches a point which could influence the design of tests in such a way as to be detrimental to the objectivity of the tests. Remember: software should be tested against what it is specified to do, not against what it actually observed to do.

The effectiveness of testing effort can be maximised by selection of an appropriate testing strategy, good management of the testing process, and appropriate use of tools such as AdaTEST or Cantata to support the testing process. The net result will be an increase in quality and a decrease in costs, both of which can only be beneficial to a software developers business.

The following list provides some rules to follow as an aid to effective and beneficial software testing.

• Always test against a specification. If tests are not developed from a specification, then it is not testing. Hence, testing is totally reliant upon adequate specification of software.

• Document the testing process: specify tests and record test results.

• Test hierarchically against each level of specification. Finding more errors earlier will ultimately reduce costs.

• Plan verification and validation activities, particularly testing.

• Complement testing with techniques such as static analysis and dynamic analysis.

• Always test positively: that the software does what it should, but also negatively: that it doesn't do what it shouldn't.

• Have the right attitude to testing - it should be a challenge, not the chore it so often becomes.





EXAMAPERS123.BLOGSPOT.COM

THE BASIC LANGUAGE



THE BASIC LANGUAGE



THE BASIC  C LANGUAGE
 object oriented programming.
 Encapsulation.
 Polymorphism.
 CPP Preprocessor Directives.
 Comments.
 CPP Data types
 New and Delete expressions
 Type convertions.

Object oriented programming: It is nothing but doing the programs with the help of objects. So first of all we have to know what is an object? How it is implemented in C++ programming? All these details are given below.
CLASS: A class is an expanded concept of a data structure: instead of holding only data, it can hold both data and functions.
OBJECT: An object is an instantiation of a class. In terms of variables, a class would be the type, and an object would be the variable.
By using these objects we can access the class members and member functions.

Classes are generally declared using the keyword class, with the following format:

class class_name { EG: Class student
access_specifier_1: {
member 1; charname;
access_specifier_2: int marks:
member2; float average;
… }s;
}object_names;
In the above eg: “S” is the object so we can access entire data of the student class by using this object. We discuss about the access specifiers in next concepts in detail.
Encapsulation: Wrapping up of a data in to single logical unit (i.e class) is called encapsulation. So writing class is known as encapsulation.
Polymorphism: Simply it one thing different actions let me explain consider one person (assume that person is one thing)he will exibit different actions depending on situations like his son called him daddy, and his father called him son, and his wife called him husband. I will explain how this concept is implemented in our C++ concepts in the upcoming chapters.

Inheritance: A key feature of C++ classes is inheritance. Inheritance allows creating classes which are derived from other classes, so that they automatically include some of its “parent’s” members, plus its own. We will the implementation of this concept in detail in the upcoming chapters.

Comments: comments are parts of the source code disregarded by the compiler. They simply do nothing. Their purpose is only to allow the programmer to insert notes or descriptions embedded within the source code.




EXAMAPERS123.BLOGSPOT.COM




C++ supports two ways to insert comments:
//line comment
/*block comment*/
The first of them, known as line comment, discards everything from where the pair of slash signs (//) is found up to the end of that same line. The second one, known as block comment, discards everything between the /* characters and the first appearance of the */ characters, with the possibility of including more than one line.

We are going to add comments to our second program:

If you include comments within the source code of your programs with out using the comment characters combinations //,/* or */, the compiler will take them as if they were C++ expressions, most likely causing one or several error messages when you compile it.
Preprocessor directives:
Preprocessor directives are lines included in the code of our programs that are not program statements but directives for the processor. These lines are always preceded by a pound sign (#). The processor executed before the actual compilation of code is generated by the statements.

These processor directives extend only across a single line of code. As soon as a new line character is found, the processor directive is considered to end. No semicolon (;) is expected at the end of a preprocessor directive. The only way a preprocessor directive can extend through more than one line is by preceding the new line character at the end of the line by a backslash (/)
Macro definitions (#define, #undef)
To define preprocessor macros we can use #define. Its formate is:
#define identifier replacement.
When the preprossor encounters this direccive , it replaces any occurrence of identifier in the rest of the code by replacement can be an expresson , a statement , a block or simply anything. The processor does not understand C++ , it simply replaces any occurrence of identifier by replacement.
#define TABLE_SIZE 100
int table 1 [TABLE_SIZE];
int table 2 [TABLE_SIZE];
After the preprocessor has replased TABLE_SIZE, the code becomes equivalent to:
Int table 1[100];
Int table 2 [100];
This use of #define as constant definer is already known by us from previous tutorials, but #define can work also with parameters to define function macros:
#define getmax(a,b) a>b?a:b
This would replace any occurrence of getmax followed by two arguments by the replacement expression, but also replasing each argument by its identifier, exactly as you would expect if it was a function:
//function macro
#include
Using namespace std;

#define getmax(a,b) ((a)>(b)?(a)b))

Int main()
{
Int x=5,y;
Y=getmax (x,2);
Cout << y << endl;
Cout<< getmax(7,x)<Return 0;
} 5
6

Defined macros are not affected by block structure. A macro lasts until it is undefined with the #undef preprosseor directive:
#define table_size 100
Int table 1 [TABLE_SIZE];
#undef TABLE_SIZE
#define TABLE_SIZE 200
Int table 2[TABLE_SIZE];

This would generate the same code as:

Int table 1 [100];
Int table 2 [200];

Function macro definitions accept two special operators (# and ##) in the replacement sequence:
If the operator # is used before a parameter is used in the replacement sequence, that parameter is replaced by a string literal (as if it were enclosed between double quotes)
#define str (x) #x
Cout << str(test);

This would be translated into:
Cout << “test”;

The operator ## concatenates two arguments leaving no blank spaces between them:

#define glue(a,b) a## b
Glue(c,out) << ”test’’;
This would also be translated into:
Cout <<”test”;
Because preprocessor replacements happen before any C++ syntax check, macro definitions can be a tricky feature, but be careful: code that relies heavily on complicated macros may result obscure to other programmers, since the syntax they expect in C++.
Conditional inclusions (#ifdef, #ifdef, #if, #endif, #else and #elif)
These directives allow to include or discard part of the code of a program if a certain condition is met.
#ifdef allowes a section of a program to be compiled only if the macro that is specified as the parameter has been defined, no matter which its value is. For example:
#ifdef TABLE_SIZE
int table [TABLE_SIZE];
#endif
In this case , the line of code int table [TABLE_SIZE]; is only compiled if TABLE_SIZE was previously defined with #define, independently of its value. If it was not defined, that line will not be included in the program compilation.
#ifndef serves for the exact opposite: the code between #indef and #endif directives is only compiled if the specified identifier has not been previously defined. For example:
#ifndef TABLE_SIZE
#define TABLE_SIZE 100
#endif
Int table [TABLE_SIZE];


/* My second program in C++
With more comments*/
#include
Using namespace std;
Int main ()
{
Cout <<”Hello World!”; // prints Hello World!
Count <<”I’m a C++program”; //prints I’m a C++ program
return 0;
} Hellow World! I’m a C++ program








EXAMAPERS123.BLOGSPOT.COM

World Wide Web





The World Wide Web




World Wide Web

"The World Wide Web" and "WWW" redirect here. For other uses, see Web and WWW (disambiguation). "Web surfing" redirects here. For the Web browser, see WorldWideWeb.


WWW's historic logo designed by Robert Cailliau
The World Wide Web (commonly shortened to the Web) is a system of interlinked hypertext documents accessed via the Internet. With a Web browser, a user views Web pages that may contain text, images, videos, and other multimedia and navigates between them using hyperlinks. The World Wide Web was created in 1989 by British scientist Sir Tim Berners-Lee, working at the European Organization for Nuclear Research (CERN, Conseil Européen pour la Recherche Nucléaire) in Geneva, Switzerland, and released in 1992. Since then, Berners-Lee has played an active role in guiding the development of Web standards (such as the markup languages in which Web pages are composed), and in recent years has advocated his vision of a Semantic Web.
Contents
[hide]
• 1 How the Web works
• 2 History
o 2.1 History in literature
• 3 Standards
• 4 Java
• 5 JavaScript
• 6 Publishing Web pages
• 7 Statistics
• 8 Speed issues
• 9 Caching
• 10 Link rot and Web archival
• 11 Academic conferences
• 12 Security
• 13 Web Accessibility
• 14 WWW prefix in Web addresses
• 15 Pronunciation of "www"
• 16 See also
• 17 Notes
• 18 References
• 19 External links



EXAMAPERS123.BLOGSPOT.COM



[edit] How the Web works
Viewing a Web page on the World Wide Web normally begins either by typing the URL of the page into a Web browser, or by following a hyperlink to that page or resource. The Web browser then initiates a series of communication messages, behind the scenes, in order to fetch and display it.
First, the server-name portion of the URL is resolved into an IP address using the global, distributed Internet database known as the domain name system, or DNS. This IP address is necessary to contact and send data packets to the Web server.
The browser then requests the resource by sending an HTTP request to the Web server at that particular address. In the case of a typical Web page, the HTML text of the page is requested first and parsed immediately by the Web browser, which will then make additional requests for images and any other files that form a part of the page. Statistics measuring a website's popularity are usually based on the number of 'page views' or associated server 'hits', or file requests, which take place.
Having received the required files from the Web server, the browser then renders the page onto the screen as specified by its HTML, CSS, and other Web languages. Any images and other resources are incorporated to produce the on-screen Web page that the user sees.


Most Web pages will themselves contain hyperlinks to other related pages and perhaps to downloads, source documents, definitions and other Web resources. Such a collection of useful, related resources, interconnected via hypertext links, is what was dubbed a "web" of information. Making it available on the Internet created what Tim Berners-Lee first called the WorldWideWeb (a term written in CamelCase, subsequently discarded) in 1990.[1]
[edit] History
Main article: History of the World Wide Web


This NeXTcube used by Sir Tim Berners-Lee at CERN became the first Web server.
The underlying ideas of the Web can be traced as far back as 1980, when, at CERN in Switzerland, Sir Tim Berners-Lee built ENQUIRE (a reference to Enquire Within Upon Everything, a book he recalled from his youth). While it was rather different from the system in use today, it contained many of the same core ideas (and even some of the ideas of Berners-Lee's next project after the World Wide Web, the Semantic Web).
In March 1989, Berners-Lee wrote a proposal[2] which referenced ENQUIRE and described a more elaborate information management system. With help from Robert Cailliau, he published a more formal proposal for the World Wide Web on November 12, 1990.[3] The proposal was modeled after EBT's (Electronic Book Technology, a spin-off from the Institute for Research in Information and Scholarship at Brown University) Dynatext SGML reader that CERN had licensed. The Dynatext system, however technically advanced (a key player in the extension of SGML ISO 8879:1986 to Hypermedia within HyTime) was considered too expensive and with an inappropriate licensing policy for general HEP (High Energy Physics) community use: a fee for each document and each time a document was charged.
A NeXTcube was used by Berners-Lee as the world's first Web server and also to write the first Web browser, WorldWideWeb, in 1990. By Christmas 1990, Berners-Lee had built all the tools necessary for a working Web:[4] the first Web browser (which was a Web editor as well), the first Web server, and the first Web pages[5] which described the project itself.
On August 6, 1991, he posted a short summary of the World Wide Web project on the alt.hypertext newsgroup.[6] This date also marked the debut of the Web as a publicly available service on the Internet.
The first server outside of Europe was created at SLAC in December 1991 [7].
The crucial underlying concept of hypertext originated with older projects from the 1960s, such as the Hypertext Editing System (HES) at Brown University--- among others Ted Nelson and Andries van Dam--- Ted Nelson's Project Xanadu and Douglas Engelbart's oN-Line System (NLS). Both Nelson and Engelbart were in turn inspired by Vannevar Bush's microfilm-based "memex," which was described in the 1945 essay "As We May Think".
Berners-Lee's breakthrough was to marry hypertext to the Internet. In his book Weaving The Web, he explains that he had repeatedly suggested that a marriage between the two technologies was possible to members of both technical communities, but when no one took up his invitation, he finally tackled the project himself. In the process, he developed a system of globally unique identifiers for resources on the Web and elsewhere: the Uniform Resource Identifier.
The World Wide Web had a number of differences from other hypertext systems that were then available. The Web required only unidirectional links rather than bidirectional ones. This made it possible for someone to link to another resource without action by the owner of that resource. It also significantly reduced the difficulty of implementing Web servers and browsers (in comparison to earlier systems), but in turn presented the chronic problem of link rot. Unlike predecessors such as HyperCard, the World Wide Web was non-proprietary, making it possible to develop servers and clients independently and to add extensions without licensing restrictions.
On April 30, 1993, CERN announced[8] that the World Wide Web would be free to anyone, with no fees due. Coming two months after the announcement that the Gopher protocol was no longer free to use, this produced a rapid shift away from Gopher and towards the Web. An early popular Web browser was ViolaWWW, which was based upon HyperCard.
Scholars generally agree, however, that the turning point for the World Wide Web began with the introduction[9] of the Mosaic Web browser[10] in 1993, a graphical browser developed by a team at the National Center for Supercomputing Applications at the University of Illinois at Urbana-Champaign (NCSA-UIUC), led by Marc Andreessen. Funding for Mosaic came from the High-Performance Computing and Communications Initiative, a funding program initiated by the High Performance Computing and Communication Act of 1991, one of several computing developments initiated by Senator Al Gore.[11] Prior to the release of Mosaic, graphics were not commonly mixed with text in Web pages, and its popularity was less than older protocols in use over the Internet, such as Gopher and Wide Area Information Servers (WAIS). Mosaic's graphical user interface allowed the Web to become, by far, the most popular Internet protocol.
The World Wide Web Consortium (W3C) was founded by Tim Berners-Lee after he left the European Organization for Nuclear Research (CERN) in October, 1994. It was founded at the Massachusetts Institute of Technology Laboratory for Computer Science (MIT/LCS) with support from the Defense Advanced Research Projects Agency (DARPA) -- which had pioneered the Internet -- and the European Commission.
[edit] History in literature
The concept of a home-based global information system goes back at least as far as Isaac Asimov's short story "Anniversary" (Amazing Stories, March 1959), in which the characters look up information on a home computer called a "Multivac outlet" — which was connected by a "planetwide network of circuits" to a mile-long "super-computer" somewhere in the bowels of the Earth. One character is thinking of installing a Multivac, Jr. model for his kids.
The story was set in the far distant future when commercial space travel was commonplace, and yet the machine "prints the answer on a slip of tape" that comes out a slot — there is no video display — and the owner of the home computer says that he doesn't spend the kind of money to get a Multivac outlet that talks.
[edit] Standards
Main article: Web standards
Many formal standards and other technical specifications define the operation of different aspects of the World Wide Web, the Internet, and computer information exchange. Many of the documents are the work of the World Wide Web Consortium (W3C), headed by Berners-Lee, but some are produced by the Internet Engineering Task Force (IETF) and other organizations.
Usually, when Web standards are discussed, the following publications are seen as foundational:
• Recommendations for markup languages, especially HTML and XHTML, from the W3C. These define the structure and interpretation of hypertext documents.
• Recommendations for stylesheets, especially CSS, from the W3C.
• Standards for ECMAScript (usually in the form of JavaScript), from Ecma International.
• Recommendations for the Document Object Model, from W3C.
Additional publications provide definitions of other essential technologies for the World Wide Web, including, but not limited to, the following:
• Uniform Resource Identifier (URI), which is a universal system for referencing resources on the Internet, such as hypertext documents and images. URIs, often called URLs, are defined by the IETF's RFC 3986 / STD 66: Uniform Resource Identifier (URI): Generic Syntax, as well as its predecessors and numerous URI scheme-defining RFCs;
• HyperText Transfer Protocol (HTTP), especially as defined by RFC 2616: HTTP/1.1 and RFC 2617: HTTP Authentication, which specify how the browser and server authenticate each other.
[edit] Java
A significant advance in Web technology was Sun Microsystems' Java platform. It enables Web pages to embed small programs (called applets) directly into the view. These applets run on the end-user's computer, providing a richer user interface than simple Web pages. Java client-side applets never gained the popularity that Sun had hoped for a variety of reasons, including lack of integration with other content (applets were confined to small boxes within the rendered page) and the fact that many computers at the time were supplied to end users without a suitably installed Java Virtual Machine, and so required a download by the user before applets would appear. Adobe Flash now performs many of the functions that were originally envisioned for Java applets, including the playing of video content, animation, and some rich GUI features. Java itself has become more widely used as a platform and language for server-side and other programming.
[edit] JavaScript
JavaScript, on the other hand, is a scripting language that was initially developed for use within Web pages. The standardized version is ECMAScript. While its name is similar to Java, JavaScript was developed by Netscape and has very little to do with Java, although the syntax of both languages is derived from the C programming language. In conjunction with a Web page's Document Object Model (DOM), JavaScript has become a much more powerful technology than its creators originally envisioned.[citation needed] The manipulation of a page's DOM after the page is delivered to the client has been called Dynamic HTML (DHTML), to emphasize a shift away from static HTML displays.
In simple cases, all the optional information and actions available on a JavaScript-enhanced Web page will have been downloaded when the page was first delivered. Ajax ("Asynchronous JavaScript and XML") is a group of interrelated web development techniques used for creating interactive web applications that provide a method whereby parts within a Web page may be updated, using new information obtained over the network at a later time in response to user actions. This allows the page to be more responsive, interactive and interesting, without the user having to wait for whole-page reloads. Ajax is seen as an important aspect of what is being called Web 2.0. Examples of Ajax techniques currently in use can be seen in Gmail, Google Maps, and other dynamic Web applications.
[edit] Publishing Web pages
Web page production is available to individuals outside the mass media. In order to publish a Web page, one does not have to go through a publisher or other media institution, and potential readers could be found in all corners of the globe.
Many different kinds of information are available on the Web, and for those who wish to know other societies, cultures, and peoples, it has become easier.
The increased opportunity to publish materials is observable in the countless personal and social networking pages, as well as sites by families, small shops, etc., facilitated by the emergence of free Web hosting services.
[edit] Statistics
According to a 2001 study, there were massively more than 550 billion documents on the Web, mostly in the invisible Web, or deep Web.[12] A 2002 survey of 2,024 million Web pages[13] determined that by far the most Web content was in English: 56.4%; next were pages in German (7.7%), French (5.6%), and Japanese (4.9%). A more recent study, which used Web searches in 75 different languages to sample the Web, determined that there were over 11.5 billion Web pages in the publicly indexable Web as of the end of January 2005.[14] As of June 2008, the indexable web contains at least 63 billion pages.[15] On July 25, 2008, Google software engineers Jesse Alpert and Nissan Hajaj announced that Google Search had discovered one trillion unique URLs.[16]
Over 100.1 million websites operated as of March 2008.[17] Of these 74% were commercial or other sites operating in the .com generic top-level domain.[17] Among services paid for by advertising, Yahoo! could collect the most data about commercial Web users, about 2,500 bits of information per month about each typical user of its site and its affiliated advertising network sites. Yahoo! was followed by MySpace with about half that potential and then by AOL-TimeWarner, Google, Facebook, Microsoft, and eBay.[18] About 27% of websites operated outside .com addresses.[17]
[edit] Speed issues
Frustration over congestion issues in the Internet infrastructure and the high latency that results in slow browsing has led to an alternative, pejorative name for the World Wide Web: the World Wide Wait.[citation needed] Speeding up the Internet is an ongoing discussion over the use of peering and QoS technologies. Other solutions to reduce the World Wide Wait can be found on W3C.
Standard guidelines for ideal Web response times are:[19]
• 0.1 second (one tenth of a second). Ideal response time. The user doesn't sense any interruption.
• 1 second. Highest acceptable response time. Download times above 1 second interrupt the user experience.
• 10 seconds. Unacceptable response time. The user experience is interrupted and the user is likely to leave the site or system.
These numbers are useful for planning server capacity.
[edit] Caching
If a user revisits a Web page after only a short interval, the page data may not need to be re-obtained from the source Web server. Almost all Web browsers cache recently-obtained data, usually on the local hard drive. HTTP requests sent by a browser will usually only ask for data that has changed since the last download. If the locally-cached data is still current, it will be reused.
Caching helps reduce the amount of Web traffic on the Internet. The decision about expiration is made independently for each downloaded file, whether image, stylesheet, JavaScript, HTML, or whatever other content the site may provide. Thus even on sites with highly dynamic content, many of the basic resources only need to be refreshed occasionally. Web site designers find it worthwhile to collate resources such as CSS data and JavaScript into a few site-wide files so that they can be cached efficiently. This helps reduce page download times and lowers demands on the Web server.
There are other components of the Internet that can cache Web content. Corporate and academic firewalls often cache Web resources requested by one user for the benefit of all. (See also Caching proxy server.) Some search engines, such as Google or Yahoo!, also store cached content from websites.
Apart from the facilities built into Web servers that can determine when files have been updated and so need to be re-sent, designers of dynamically-generated Web pages can control the HTTP headers sent back to requesting users, so that transient or sensitive pages are not cached. Internet banking and news sites frequently use this facility.
Data requested with an HTTP 'GET' is likely to be cached if other conditions are met; data obtained in response to a 'POST' is assumed to depend on the data that was POSTed and so is not cached.
[edit] Link rot and Web archival
Main article: Link rot
Over time, many Web resources pointed to by hyperlinks disappear, relocate, or are replaced with different content. This phenomenon is referred to in some circles as "link rot" and the hyperlinks affected by it are often called "dead links".
The ephemeral nature of the Web has prompted many efforts to archive Web sites. The Internet Archive is one of the most well-known efforts; it has been active since 1996.
[edit] Academic conferences
The major academic event covering the Web is the World Wide Web Conference, promoted by IW3C2.
[edit] Security
The Web has become criminals' preferred pathway for spreading malware. Cybercrime carried out on the Web can include identity theft, fraud, espionage and intelligence gathering.[20] Web-based vulnerabilities now outnumber traditional computer security concerns,[21] and as measured by Google, about one in ten Web pages may contain malicious code.[22] Most Web-based attacks take place on legitimate websites, and most, as measured by Sophos, are hosted in the United States, China and Russia.[23]
The most common of all malware threats is SQL injection attacks against websites.[24] Through HTML and URIs the Web was vulnerable to attacks like cross-site scripting (XSS) that came with the introduction of JavaScript[25] and were exacerbated to some degree by Web 2.0 and Ajax web design that favors the use of scripts.[26] Today by one estimate, 70% of all websites are open to XSS attacks on their users.[27]
Proposed solutions vary to extremes. Large security vendors like McAfee already design governance and compliance suites to meet post-9/11 regulations,[28] and some, like Finjan have recommended active real-time inspection of code and all content regardless of its source.[20] Some have argued that for enterprise to see security as a business opportunity rather than a cost center,[29] "ubiquitous, always-on digital rights management" enforced in the infrastructure by a handful of organizations must replace the hundreds of companies that today secure data and networks.[30] Jonathan Zittrain has said users sharing responsibility for computing safety is far preferable to locking down the Internet.[31]
[edit] Web Accessibility
Main article: Web accessibility
Many countries regulate web accessibility as a requirement for web sites.
[edit] WWW prefix in Web addresses
The letters "www" are commonly found at the beginning of Web addresses because of the long-standing practice of naming Internet hosts (servers) according to the services they provide. So for example, the host name for a Web server is often "www"; for an FTP server, "ftp"; and for a USENET news server, "news" or "nntp" (after the news protocol NNTP). These host names appear as DNS subdomain names, as in "www.example.com".
This use of such prefixes is not required by any technical standard; indeed, the first Web server was at "nxoc01.cern.ch",[32] and even today many Web sites exist without a "www" prefix. The "www" prefix has no meaning in the way the main Web site is shown. The "www" prefix is simply one choice for a Web site's host name.
Some Web browsers will automatically try adding "www." to the beginning, and possibly ".com" to the end, of typed URLs if no host is found without them. All major web browser will also prefix "http://www." and append ".com" to the address bar contents if the Control and Enter keys are pressed simultaneously. For example, entering "example" in the address bar and then pressing either just Enter or Control+Enter will usually resolve to "http://www.example.com", depending on the exact browser version and its settings.





EXAMAPERS123.BLOGSPOT.COM

General Awareness GK



SUCCESS FOR CAREER










General Awareness



Part I :
1. Article 17 of the constitution of India provides for
(a) equality before law.
(b) equality of opportunity in matters of public employment.
(c) abolition of titles.
(d) abolition of untouchability.
2. Article 370 of the constitution of India provides for
(a) temporary provisions for Jammu & Kashmir.
(b) special provisions in respect of Nagaland.
(c) special provisions in respect of Manipur.
(d) provisions in respect of financial emergency.
3. How many permanent members are there in Security Council?
(a) Three
(b) Five
(c) Six
(d) Four
4. The United Kingdom is a classic example of a/an
(a) aristocracy
(b) absolute monarchy
(c) constitutional monarchy
(d) polity.
5. Social Contract Theory was advocated by
(a) Hobbes, Locke and Rousseau.
(b) Plato, Aristotle and Hegel.
(c) Mill, Bentham and Plato.
(d) Locke, Mill and Hegel.
6. The Speaker of the Lok Sabha is elected by the
(a) President
(b) Prime Minister.
(c) Members of both Houses of the Parliament.
(d) Members of the Lok Sabha.
7. Who is called the ‘Father of History'?
(a) Plutarch
(b) Herodotus
(c) Justin
(d) Pliny
8. The Vedas are known as
(a) Smriti.
(b) Sruti.
(c) Jnana.
(d) Siksha.
9. The members of Estimate Committee are
(a) elected from the Lok Sabha only.
(b) elected from the Rajya Sabha only.
(c) elected from both the Lok Sabha and the Rajya Sabha.
(d) nominated by the Speaker of the Lok Sabha.
10. Who is the chief advisor to the Governor?
(a) Chief Justice of the Supreme Court.
(b) Chief Minister.
(c) Speaker of the Lok Sabha.
(d) President.
11. Foreign currency which has a tendency of quick migration is called
(a) Scarce currency.
(b) Soft currency.
(c) Gold currency.
(d) Hot currency.
12. Which of the following is a better measurement of Economic Development?
(a) GDP
(b) Disposable income
(c) NNP
(d) Per capita income
13. In India, disguised unemployment is generally observed in
(a) the agriculture sector.
(b) the factory sector.
(c) the service sector.
(d) All these sectors.
14. If the commodities manufactured in Surat are sold in Mumbai or Delhi then it is
(a) Territorial trade.
(b) Internal trade.
(c) International trade.
(d) Free trade.
15. The famous slogan "GARIBI HATAO" (Remove Poverty) was launched during the
(a) First Five-Year Plan (1951-56)
(b) Third Five-Year Plan (1961-66)
(c) Fourth Five-Year Plan (1969-74)
(d) Fifth Five-Year Plan (1974-79)
16. Bank Rate refers to the interest rate at which
(a) Commercial banks receive deposits from the public.
(b) Central bank gives loans to Commercial banks.
(c) Government loans are floated.
(d) Commercial banks grant loans to their customers.
17. All the goods which are scare and limited in supply are called
(a) Luxury goods.
(b) Expensive goods.
(c) Capital goods.
(d) Economic goods.
18. The theory of monopolistic competition is developed by
(a) E.H.Chamberlin
(b) P.A.Samuelson
(c) J.Robinson
(d) A.Marshall
19. Smoke is formed due to
(a) solid dispersed in gas.
(b) solid dispersed in liquid.
(c) gas dispersed in solid.
(d) gas dispersed in gas.
20. Which of the following chemical is used in photography?
(a) Aluminum hydroxide
(b) Silver bromide
(c) Potassium nitrate
(d) Sodium chloride.




EXAMAPERS123.BLOGSPOT.COM




21. Gober gas (Biogas) mainly contains
(a) Methane.
(b) Ethane and butane.
(c) propane and butane.
(d) methane, ethane, propane and propylene.
22. Preparation of ‘Dalda or Vanaspati' ghee from vegetable oil utilises the following process
(a) Hydrolysis
(b) Oxidation
(c) Hydrogenation
(d) Ozonoloysis
23. Which colour is the complementary colour of yellow?
(a) Blue
(b) Green
(c) Orange
(d) Red
24. During washing of cloths, we use indigo due to its
(a) better cleaning action.
(b) proper pigmental composition.
(c) high glorious nature.
(d) very low cost.
25. Of the following Indian satellites, which one is intended for long distance telecommunication and for transmitting TV programmes?
(a) INSAT-A
(b) Aryabhata
(c) Bhaskara
(d) Rohini
26. What is the full form of ‘AM' regarding radio broadcasting?
(a) Amplitude Movement
(b) Anywhere Movement
(c) Amplitude Matching
(d) Amplitude Modulation.
27. Who is the author of Gandhi's favorite Bhajan Vaishnava jana to tene kahiye?
(a) Purandar Das
(b) Shyamal Bhatt
(c) Narsi Mehta
(d) Sant Gyaneshwar
28. Which one of the following is not a mosquito borne disease?
(a) Dengu fever
(b) Filariasis
(c) Sleeping sickness
(d) Malaria
29. What is the principal ore of aluminium?
(a) Dolomite
(b) Copper
(c) Lignite
(d) Bauxite
30. Which country is the facilitator for peace talks between the LTTE and the Sri Lankan Government?
(a) The US
(b) Norway
(c) India
(d) The UK
31. The highest body which approves the Five-Year Plan in India is the
(a) Planning Commission
(b) National Development Council
(c) The Union Cabinet
(d) Finance Ministry
32. Ceteris Paribus is Latin for
(a) " all other things variable "
(b) "other things increasing"
(c) "other things being equal"
(d) "all other things decreasing"
33. Who has been conferred the Dada Saheb Phalke Award (Ratna) for the year 2007?
(a) Dev Anand
(b) Rekha
(c) Dilip Kumar
(d) Shabana Azmi
34. Purchasing Power Parity theory is related with
(a) Interest Rate.
(b) Bank Rate.
(c) Wage Rate.
(d) Exchange Rate.
35. India's biggest enterprise today is
(a) the Indian Railways.
(b) the Indian Commercial Banking System.
(c) the India Power Sector.
(d) the India Telecommunication System.
36. The official agency responsible for estimating National Income in India is
(a) Indian Statistical Institute.
(b) Reserve Bank of India.
(c) Central Statistical Organisation.
(d) National Council for Applied Economics and Research.
37. Which of the following has the sole right of issuing currency (except one rupee coins and notes) in India?
(a) The Governor of India
(b) The Planning Commission
(c) The State Bank of India
(d) The Reserve Bank of India
38. In the budget figures of the Government of India the difference between total expenditure and total receipt is called.
(a) Fiscal deficit
(b) Budget deficit
(c) Revenue deficit
(d) Current deficit
39. Excise duty on a commodity is payable with reference to its
(a) production.
(b) production and sale.
(c) Production and transportation.
(d) Production, transportation and sale.
40. In the US, the President is elected by
(a) The Senate.
(b) Universal Adult Franchise.
(c) The House of Representatives.
(d) The Congress.
41. Fascism believes in
(a) Peaceful change
(b) Force
(c) Tolerance
(d) Basic Rights for the individual
42. Which is the most essential function of an entrepreneur?
(a) Supervision
(b) Management
(c) Marketing
(d) Risk bearing
43. Knowledge, technical skill, education ‘etc.' in economics, are regarded as
(a) social-overhead capital.
(b) human capital.
(c) tangible physical capital.
(d) working capital.
44. What is the range of Agni III, the long-range ballistic missile, test-fired by India recently?
(a) 2,250 km
(b) 3,500 km
(c) 5,000 km
(d) 1,000 km
45. Nathu Laa, a place where India-China border trade has been resumed after 44 years, is located on the Indian border in
(a) Sikkim.
(b) Arunachal Pradesh.
(c) Himachal Pradesh
(d) Jammu and Kashmir.
46. M. Damodaran is the
(a) Chairman, Unit Trust of India.
(b) Deputy Governor of Reserve Bank of India.
(c) Chairman, Securities and Exchange Board of India.
(d) Chairman, Life Insurance Corporation of India.
47. What is the name of the Light Combat Aircraft developed by India indigenously?
(a) BrahMos
(b) Chetak
(c) Astra
(d) Tejas
48. Who is the Prime Minister of Great Britain?
(a) Tony Blair
(b) Jack Straw
(c) Robin Cook
(d) Gordon Brown.
49. The 2010 World Cup Football Tournament will be held in
(a) France.
(b) China.
(c) Germany.
(d) South Africa.
50. Who is the present Chief Election Commissioner of India?
(a) Navin Chawla
(b) N.Gopalswamy
(c) T.S.krishnamoorty
(d) B.B.Tandon




51. The title of the book recently written by Jaswant Singh, former Minister of External Affair, is
(a) A call of Honour - In the Service of Emergent Inida
(b) Whither Secular India?
(c) Ayodhya and Aftermath
(d) Shining India and BJP.
52. What was the original name of "Nurjahan"?
(a) Jabunnisa
(b) Fatima Begum
(c) Mehrunnisa
(d) Jahanara
53. Which of the following pairs is not correctly matched ?
(a) Lord Dallhousie- Doctrine of Lapse
(b) Lord Minto- Indian Councils Act, 1909
(c) Lord Wellesley- Subsidiary Alliance
(d) Lord Curzon- Vernacular Press Act, 1878
54. The province of Bengal was partitioned into two parts in 1905 by
(a) Lord Lytton.
(b) Lord Ripon.
(c) Lord Dufferin.
(d) Lord Curzon.
55. The essential features of the Indus Valley Civilization was
(a) worship of forces of nature.
(b) organized city life.
(c) pastoral farming.
(d) caste society.
56. Name the capital of Pallavas.
(a) Kanchi.
(b) Vattapi.
(c) Trichnapalli.
(d) Mahabalipuram.
57. The Home Rule League was started by
(a) M.K.Gandhi
(b) B.G.Tilak
(c) Ranade
(d) K.T.Telang
58. The Simon Commission was boycotted by the Indians because
(a) it sought tocurb civil liberties.
(b) it proposed to partition India.
(c) it was an all-white commission Indian representation.
(d) it proposed measures for nationalism.
59. Storm of gases are visible in the chamber of the Sun during
(a) Cyclones
(b) Anti-cyclones
(c) Lunar-eclipse
(d) Solar eclipse.
60. The Indian Councils Act of 1990 is associated with
(a) The Montagu Decleration.
(b) The Montagu- Chelmsford Reforms.
(c) The Morley-Minto Reforms.
(d) The Rowlatt Act.
61. The age of tree can be determined more or less accurately by
(a) counting the number of branches.
(b) measuring the height ,of the tree.
(c) measuring the diameter of the trunk.
(d) counting the number of rings in the trunk.
62. Of all micro-organisms, the most adaptable and versatile are
(a) Viruses
(b) Bacteria
(c) Algae d) Fungi
63. What is an endoscope?
(a) It is an optical instrument used to see inside the alimentary canal
(b) it is device which is fitted on the chest of the patient to regularize the irregular heart beats
(c) It is an instrument used for examining ear disorders
(d) It is an instrument for recording electrical signals produced by the human muscles.
64. The disease in which the sugar level increase is known as
(a) Diabetes mellitus
(b) Diabetes insipidus
(c) Diabetes imperfectus
(d) Diabetes sugarensis
65. The President of India is elected by
(a) members of both Houses of the Parliament.
(b) members of both houses of Parliament of State Legislatures.
(c) members of both Houses of the State Legislative Assemblies.
(d) Elected members of both Houses of the Parliament and members of Legislative Assemblies.
66. The nitrogen present in the atmosphere is
(a) of no use to plants.
(b) injurious of plants.
(c) directly utilized by plants.
(d) utilized through micro-organisms.
67. Diamond and Graphite are
(a) allotropes
(b) isomorphous
(c) isomers
(d) isobars
68. Kayak is kind of
(a) tribal tool.
(b) boat.
(c) ship.
(d) weapon.
69. Which of the following has the highest calorific value?
(a) Carbohydrates
(b) fats
(c) Proteins
(d) Vitamins.
70. Rotation of crops means
(a) growing of different crops in succession to maintain soil fertility.
(b) some crops are growing again and again.
(c) two or more crops are grown simultaneously to increase productivity.
(d) None of these.
71. Suez Canal connects
(a) Pacific Ocean and Atlantic Ocean.
(b) Mediterranean Sea and Red Sea.
(c) Lake Huron and Lake Erie.
(d) Lake Erie and Lake Ontario.
72. Which of the following ports has the largest hinterland?
(a) Kandla
(b) Kochi
(c) Mumbai
(d) Vishkhapatnam.
73. "Slash and Burn agriculture" is the name given to
(a) method of potato cultivation.
(b) process of deforestation.
(c) mixed framing.
(d) shifting cultivation.
74. The main reason for deforestation in Asia is
(a) excessive fuel wood collection.
(b) excessive soil erosion.
(c) floods.
(d) construction of roads.
75. Recharging of water table depends on
(a) amount of rainfall.
(b) relief of the area.
(c) vegetation of the area.
(d) amount of percolation.
Answers Part - I
1. (d) 2. (d) 3. (b) 4. (c) 5. (a)
6. (d) 7. (b) 8. (b) 9. (a) 10. (b)
11. (d) 12. (a) 13. (a) 14. (b) 15. (c)
16. (a) 17. (d) 18. (a) 19. (a) 20. (b)
21. (a) 22. (b) 23. (b) 24. (a) 25. (d)
26. (c) 27. (c) 28. (d) 29. (d) 30. (a)
31. (c) 32. (c) 33. (c) 34. (a) 35. (c)
36. (d) 37. (b) 38. (a) 39. (a) 40. (b)
41. (d) 42. (a) 43. (b) 44. (a) 45. (c)
46. (c) 47. (d) 48. (d) 49. (b) 50. (a)
51. (c) 52. (d) 53. (d) 54. (b) 55. (a)
56. (b) 57. (c) 58. (d) 59. (c) 60. (d)
61. (a) 62. (a) 63. (a) 64. (d) 65. (d)
66. (a) 67. (b) 68. (b) 69. (a) 70. (b)
71. (d) 72. (d) 73. (a) 74. (d) 75. (a)




EXAMAPERS123.BLOGSPOT.COM

Monday, September 27, 2010

iGATE



iGATE







SUCCESS FOR CAREER




They will ask mainly abt ur project work in interview.
For us, there were 6 groups of 10 members for group discussion and the no of people selected depend on their performance.. 4 from one group, 3 from another , yet 7 from a third grp and so on.
My topic was " Why indian sports poeple fails to perform in foreign grounds"
Another topic was merits and demerits of internet.

For technical there were 20 multiple choice questions: Out of which about 6 was electronics and 14 was from computer related areas

1. Full form of TTL and CMOS
2. Which is a good conductor (Extrinsic or Intrinsic)
3. What are the different types of capacitors (Electrolytic, dielectric...etc)
4. Select a passive component from the following (four choices were there)
5. Minimum no. of lines required for communication using RS232 (Ans: i think its 2)
6. To convert 1's complement to 2's complement and vice versa
7. During which time we use 'size of' command. (ans: runtime)
8. Out of four choice we have to identify which is a macro.
9. There was one pointer __expression related question.
10. To find post fix __expression.
11. What type of operating system is unix (ans: pre-emptive,[not sure])
a)pre-emptive b)non-preemptive c)batch
12. Defnition of turing machine.
13. Where we use DFD(Data flow design)
a)structural languages b)object oriented languages c)UML d)all of the above
14. Name the error which occurs when we write on a page
a) segment fault b)permission fault c) page fault
15. A question based on the representation of an array in C
An array whose elements are fn pointers which inturn returns a character

Sonata Aptitude test (IGate's aptitude test is very similar to this test).......Actually there were almost 25 questions repeated from this........

1. Last month of an year
(a) January (b) February (c) December (d) November
2. Select the odd one
(a) January (b) February (c) Wednesday (d) November
3. Select the antonym of capture from the following
(a) attack (b) Release (c) condemn (d) None
4. Find the antonym of autumn
(a) Spring (b) Winter (c) Summer (d) None of the above
5. One skirt requires 3.75 yards of cloth. How many skirts you can make from 45 yards?Ans: 12 skirts

6. How can you make a square from two triangles?

7. Is the meaning of Client and Customer,
(a) same (b) contradictory (c) no relation
8. Is the meaning of It's and Its,
(a) same (b) contradictory (c) no relation
9. Is the meaning of Canvas and Canvass,
(a) same (b) contradictory (c) no relation
10. Is the meaning of Ingenious and Ingenuous,
(a) same (b) contradictory (c) no relation
11. Is the meaning of Credible and Credulous,
(a) same (b) contradictory (c) no relation
12. Select the odd one out.
(a) 1/4 (b) 1/3 (c) 1/6 (d) 1/18
13. Select the least from the following.
(a) 0.99 (b) 1 (c) 81 (d) 0.333
14. Find the next number in the series. 1, 0.5, 0.25, 0.125 Ans: 0.0625
15. One dollar is saved in one month. Then how much dollar is saved in one day?
Ans: 1/30 =0.0333$
16. Y catches 5 times more fishes than X. If total number of fishes caught by X and Y is 48, then number of fishes caught by X? Ans: 8
17. Y catches 5 times more fishes than X. If total number of fishes caught by X and Y is 42, then number of fishes caught by X? Ans: 7
18. If a train covers 600m in 0.5 seconds, how long it will cover in 10 seconds? Ans: 3000m = 3km
19. The girl's age is twice that of boy, if the boy is four years old. After four years the age
of the girl is Ans: 12 years
20. Sister's age is twice than that of the brother. If the brother's age is six, what is the sister's age after two years? Ans: 14 Yrs.
21. Two lemons cost 10 cents. Then one and a half dozen cost Ans: 90 cents
22. A clock is late by 1 minute 27 seconds in a month. Then how much will it be late in 1 day?
Ans: 2.9 seconds
23. Which of the following figures together will make a triangle? Ans: a,b,c,d
24. Make a square by drawing only one line Ans: line 2-5, square 2-3-4-5-2
25. Which of the following is the odd one?
crew, constellation, companion, league, participants. Ans: companion
26. Opposite of Remote?
(a) Far (b) Near (c) Huge (d) Village
27. Statement A: All great men are ridiculous;
Statement B: I am ridiculous ;
Inference : I am a great man;
(a) True (b) False (c) Not clear
28. Statement: Normal children are active;
Inference: All children are active;
(a) True (b) False (c) Uncertain
29. Next number in the series 1, 1/2, 1/4, 1/8 ? Ans: 1/16
30. In 6 seconds a light flashes once. In one hour how many times it will flash? Ans: 601 times
31. At 20% discount, a cycle is sold at a selling price of Rs.2500. The actual price? Ans: Rs. 3125
32. Statement A: A & B have same age;
Statement B: B is younger than C;
Inference : A is younger than C;
(a) True (b) False (c) Uncertain
33. All chickens lay eggs (True/False) Ans: False
34. A invests $12000, B invests $8000, C invests $6000 and they got a profit of $1200. How much share A got more than B and C? Ans: 2/13 and 3/13






EXAMAPERS123.BLOGSPOT.COM

Monday, August 02, 2010

C LANGUAGE PROGRAMS


C LANGUAGE PROGRAMS

1. What is the output of the program given below
#include
main()
{
char i=0;
for(;i>=0;i++) ;
printf("%d\n",i);
}
2. What is the output of the following program
#include
main()
{
int i=0;
fork();
printf("%d",i++);
fork();
printf("%d",i++);
fork();
wait();
}
3. What is the memory allocated by the following definition ?
int (*x)[10];
4. What is the memory allocated by the following definition ?
int (*x)();
5. In the following program segment
#include
main()
{
int a=2;
int b=9;
int c=1;
while(b)
{
if(odd(b))
c=c*a;
a=a*a;
b=b/2;
}
printf("%d\n",c);
}
How many times is c=c*a calculated?
6. In the program segment in question 5 what is the value of a at the end of the
whileloop?

7. What is the output for the program given below
typedef enum grade{GOOD,BAD,WORST,}BAD;
main()
{
BAD g1;
g1=1;
printf("%d",g1);
}
8. Give the output for the following program.
#define STYLE1 char
main()
{
typedef char STYLE2;
STYLE1 x;
STYLE2 y;
clrscr();
x=255;
y=255;
printf("%d %d\n",x,y);
}
9. Give the output for the following program segment.
#ifdef TRUE
int I=0;
#endif
main()
{
int j=0;
printf("%d %d\n",i,j);
}
10. In the following program
#include
main()
{
char *pDestn,*pSource="I Love You Daddy";
pDestn=malloc(strlen(pSource));
strcpy(pDestn,pSource);
printf("%s",pDestn);
free(pDestn);
}
(a)Free() fails (b)Strcpy() fails (c)prints I love You Daddy (d)error






11. What is the output for the following program
#include
main()
{
char a[5][5],flag;
a[0][0]='A';
flag=((a==*a)&&(*a==a[0]));
printf("%d\n",flag);
}


SUCESS FOR CARRER

Micro processor questions


Future Software PAPERS



1. S --> AB|AS
A --> a|aA
B --> b
What is the grammer accepted by the above?
Ans. aa*b

2. How many address lines are needed to address a 64Kb segment with
each register storing upto 512 bytes.
Ans. 14 address lines

3. Find the expression representing the following K-map
1 1 1
1 1
1 1 1

4. For the POS form of the expression given below
_ _ _
X.Y.Z + X.Y.Z + X.( Y + Z )

5. In a computer system the ROM :
(a) contains boot software (b) is permanent
(c) Both of the above (d) None of the above

6. The binary equivalent of 3B7F is
Ans. 0011 1011 0111 1111

7. The register used by the shift reduce passing method is
Ans. Stack

8. A microprogram can be defines as to consist of
Ans. A primitive operation

9. Find the output for the following C program
int array[4][4] = {1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16};
for (i=2;i<0 br="" i--="">for (j=2;j<=0;j--)
printf("%d", arr[i][j]);

10. Find the output for the following C program
#include
void main()
{int i,x,sum=0;
int arr[6]=[1,2,3,4,5,6]
for (i=0;i<4 br="" i="">sum+ = func(arr[i]);
printf("%d", sum);
}
func(int x)
{ int val,x;
val = 2;
return(x+ val++);
}

11. Given the following data:
Process P1 takes 2
seconds
Process P2 takes 3 seconds
Process P3 takes 4 seconds
Process P4 takes 1 second
Process P5 takes 6 seconds
Find the average time in case of shortest job first (SJF) scheduling.

12. Given a string STOCK and a stack of size 4.
Which of the following strings cannot be generated using this stack.
(a) TSOCK (b) TOSKC (c) STOCK (d) TKOSC (e) None of these

13. Inversion of a matrix will take which of the following time complexities?
(a) O(n) (b) O(n²) (c) O(log n) (d) O(n³) (e) None of these

14. A drum rotates at 4000 rpm. What is its average access time.

15. What range of integral values can be stored using 32 bits?

16. Where are the following variables stored
Automatic
Global
Static

17. If a layer 4 transfers
data at the rate of 3000 bytes/sec.
What will be the size of data block transferred by Layer 2

18. What is the greatest disadvantage of dynamic RAM over static RAM
Ans. High Power and need to refresh every 2 ms.

19. What happens when the CPU gets interrupted?

20. Find the Postfix of the following string
(a + b) * ((-d) *f
(ab - cd))

21. E --> E + E| E * E | E/E | E - E| .... then which is correct
(a) It is ambiguous (b) It is inherently ambigous
(c) It is non inherently ambiguous (d) None of the above

22. If there are n nodes and K edges in a graph then what is the order of traversing
Ans. O(n²)

23. A graph is represented as an adjacency list with n vertices and e edges
What is its time complexity
Ans. O(n + e)

24. An array with address KV[a] had n elements. Which of the following correctly addresses the
ith element of the array.
(a) KV(a) - 2a + 2i (b) KV(a) +2i (c) KV(a) - 2a (d) None of these

25. Give an example of a primitive instruction in microprocessors.
26. A computer has 8 bit data bus and 16 bit address line.
How many machine cycles will it take to store the contents to a memory location?
27. Where is a variable defined in a function stores?
Ans. Process Swappable Area

28. For the following C progralm
int d=0;
for(int i=0;i<31 br="" i="">for(int j=0;j<31 br="" j="">for(int k=0;k<31 br="" k="">if (((i+j+k) % 3)==0)
d=d+1;
Find value of d

29. e= | | <(e)> |
What forms do the expressions created by the above definition fit in
Ans. All arithematic expressions

30. If a set of numbers are in sorted order then which of the following
sorting method is best
Ans. Bubble Sort

31. A magnetic tape is similar to which of the following structures
Ans. List

32. The s/n id 3 dB Find the capacity of the line.