0% found this document useful (0 votes)
8 views67 pages

Anuja-Manual - Scrum - DB Question For Interview-1

The document provides an overview of various software testing concepts, including use case testing, the differences between STLC and SDLC, and various testing techniques such as white box and black box testing. It also discusses the importance of traceability matrices, test deliverables, and the differences between various testing types and defect categories. Additionally, it outlines the steps for effective project estimation, monitoring, and conflict resolution within testing teams.

Uploaded by

Omkar Bhujbal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views67 pages

Anuja-Manual - Scrum - DB Question For Interview-1

The document provides an overview of various software testing concepts, including use case testing, the differences between STLC and SDLC, and various testing techniques such as white box and black box testing. It also discusses the importance of traceability matrices, test deliverables, and the differences between various testing types and defect categories. Additionally, it outlines the steps for effective project estimation, monitoring, and conflict resolution within testing teams.

Uploaded by

Omkar Bhujbal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 67

2. What is "use case testing"?

In order to identify and execute the functional requirement of an application from start to finish
"use case" is used and the techniques used to do this is known as "Use Case Testing."

3. What is the difference between the STLC (Software Testing Life Cycle)
and SDLC (Software Development Life Cycle)?
SDLC deals with development/coding of the software while STLC deales with validation and
verification of the software

SDLC component- planning, analysis, design, development, testing, deployment,


and maintenance.

STLC component-plannig, test design, test implementation, test case execution, closure.

4. What is traceability matrix?


The relationship between test cases and requirements is shown with the help of a document.
This document is known as a traceability matrix.

5. What is Equivalence partitioning testing?


Equivalence partitioning testing is a software testing technique which divides the application
input test data into each partition at least once of equivalent data from which test cases can be
derived. By this testing method, it reduces the time required for software testing.
We will just use a password field. This field can accept a password of length 1 to 12. The
screen will look like-

Password Field
We will divide it into three regions. The first region will be a valid region. It will have a length
between 1 to 12. The second will be an invalid region and it will have data range below length 1.
The third region will be an invalid region and it will have data range above length 12.
See the diagram below –
Valid & Invalid Region Diagram
Then test data will be the length of between 1 to 12 only. So valid password length can be from1
to 12 only. Another length will be invalid.
BVA: Boundary Value Analysis
BVA technique reduces Test Coverage and picks data on the boundary of various
regions/classes of ECP. We can choose Data on the boundaries of classes.
It is a subset of ECP. While ECP divides data into Two regions, these regions can increase &
decrease according to data. When we divide data into the region then we can choose over test
data from the valid region. The invalid region can be rejected but in BVA, we will look for data on
the boundaries of these regions. Data can be picked just on the boundary, below the boundary,
above the boundary, and between boundaries.
We can understand BVA using examples. We will just use examples of ECP so that we can
differentiate between ECP & BVA. We are taking the same password field. This field can accept
a password of length 1 to 12. The screen will look like-
But in BVA, we have to choose from boundaries. The diagram will be-

Regions Boundaries in BVA


So, password length can be chosen 0,1,12,13. On boundaries, the length is 1 & 12. Just below
& above boundaries length are 0 & 13. Between boundaries, we can choose any length. Here
we have chosen length of 5.
So, a total of five test cases can be written over it.
Testcases are:
●​ Verify that password of length 5 is accepted in the field.
●​ Verify that password of length 1 is accepted in the field.
●​ Verify that password of length 12 is accepted in the field.
●​ Verify that password of length 0 is not accepted in the field.
●​ Verify that password of length 13 is not accepted in the field.
We have three positive test cases from the valid region and two negative test cases from the
invalid region.
For any data we apply BVA or ECP, we must divide it into classes. We can decide which is the
valid class for test coverage and which is an invalid class. It will save time. Then we must pick
data on boundaries & nearer to boundaries. We can also choose some data set from an invalid
class also. It depends on our requirements.

6. What is white box testing and list the types of white box testing?
White box testing technique involves selection of test cases based on an analysis of the internal
structure (Code coverage, branches coverage, paths coverage, condition coverage, etc.) of a
component or system. It is also known as Code-Based testing or Structural testing. Different
types of white box testing are
1.​ Statement Coverage
2.​ Decision Coverage

7. In white box testing, what do you verify?


In white box testing following steps are verified.
1.​ Verify the security holes in the code
2.​ Verify the incomplete or broken paths in the code
3.​ Verify the flow of structure according to the document specification
4.​ Verify the expected outputs
5.​ Verify all conditional loops in the code to check the complete functionality of the
application
6.​ Verify the line by line coding and cover 100% testing

8. What is black box testing? What are the different black box testing
techniques?
Black box testing is the software testing method which is used to test the software without
knowing the internal structure of code or program. This testing is usually done to check the
functionality of an application. The different black box testing techniques are
1.​ Equivalence Partitioning
2.​ Boundary value analysis
3.​ Cause-effect graphing
9. What is the difference between static and dynamic testing?
Static testing: During Static testing method, the code is not executed, and it is performed using
the software documentation.
Dynamic testing: To perform this testing the code is required to be in an executable form.

10. What are verification and validation?

verification focuses on the processes and work products to ensure adherence to specifications,

while validation focuses on evaluating the end product to confirm that it meets the customer's

requirements and expectations. Both processes are crucial for ensuring the overall quality of a

system or product.

reviews, inspections, and walkthroughs are part of verification and validation is - all
testing level

11. What are the different test levels?


There are four test levels
1.​ Unit/component/program/module testing
2.​ Integration testing
3.​ System testing
4.​ Acceptance testing

12. What is Integration testing?


Integration testing is a level of software testing process, where individual units of an application
are combined and tested. It is usually performed after unit and functional testing.

13. What Test Plans consists of?


Test design, scope, test strategies, approach are various details that Test plan document
consists of.
1.​ Test case identifier
2.​ Scope
3.​ Features to be tested
4.​ Features not to be tested
5.​ Test strategy & Test approach
6.​ Test deliverables
7.​ Responsibilities
8.​ Staffing and training
9.​ Risk and Contingencies
14. What is the difference between UAT (User Acceptance Testing) and
System testing?
System Testing:
UAT: UAT check product is meeting the end user expectations or not.

15. Mention the difference between Data Driven Testing and Retesting?
Retesting: It is a process of checking bugs that are actioned by the development team to verify
that they are fixed.
Data Driven Testing (DDT): In data driven testing process, the application is tested with multiple
test data. The application is tested with a different set of values.

16. What are the valuable steps to resolve issues while testing?
●​ Record: Log and handle any problems which have happened
●​ Report: Report the issues to higher level manager
●​ Control: Define the issue management process
●​ Find the RC
●​ Check the loggs if present

17. What is the difference between test scenarios, test cases, and test
script?
Difference between test scenarios and test cases is that
Test Scenarios: A Test Scenario is any functionality that can be tested. It is also called Test
Condition or Test Possibility.
Collection of test cases to complete the functionality.
Test Cases: It is a document that contains the steps that have to be executed to complete the
flow; it has been planned earlier. Smallest fundamental unit of testing, where each small steps
of execution is mentioned.
Test Script: It is written in a programming language and it's a short program used to test part of
the functionality of the software system. In other words a written set of steps that should be
performed manually.

18. What is Latent defect?


Latent defect: This defect is an existing defect in the system which does not cause any failure
as the exact set of conditions has never been met

19. What are the two parameters which can be useful to know the quality of
test execution?
To know the quality of test execution, we can use two parameters
●​ Defect reject ratio
●​ Defect leakage ratio
21. Explain what Test Deliverables is?
Test Deliverables are a set of documents, tools and other components that have to be
developed and maintained in support of testing.
There are different test deliverables at every phase of the software development lifecycle
●​ Before Testing
●​ During Testing
●​ After the Testing
●​ RTM , Release notes, User guide, FAQ, Scenarios document, Use cases, Tes plan,
Defect list

22. What is mutation testing?

29. What is the common risk that leads to project failure?


The common risk that leads to a project failure are
●​ Not having enough human resource
●​ Testing Environment may not be set up properly
●​ Limited Budget
●​ Time Limitations
●​ Not having good transperency

30. On what basis you can arrive at an estimation for your project?
To estimate your project, you have to consider the following points
●​ Divide the whole project into the smallest tasks
●​ Allocate each task to team members
●​ Estimate the effort required to complete each task
●​ Validate the estimation

31. Explain how you would allocate a task to team members?


Task Member

●​ Analyze software requirement specification ●​ All the members


●​ Create the test specification ●​ Tester/Test Analyst

●​ Build up the test environment ●​ Test administrator

●​ Execute the test cases ●​ Tester, a Test administrator

●​ Report defects ●​ Tester


●​

32. Explain what is testing type and what are the commonly used testing
type?
To get an expected test outcome, a standard procedure is followed which is referred to as
Testing Type.
Commonly used testing types are
●​ Unit Testing: Test the smallest code of an application
●​ API Testing: Testing API created for the application
●​ Integration Testing: Individual software modules are combined and tested
●​ System Testing: Complete testing of the system
●​ Install/UnInstall Testing: Testing done from the point of client/customer view
●​ Agile Testing: Testing through Agile technique

33. While monitoring your project what all things you have to consider?
The things that have to be taken in considerations are
●​ Is your project on schedule
●​ Are you over budget
●​ Are you working towards the same career goal
●​ Have you got enough resources
●​ Are there any warning signs of impending problems
●​ Is there any pressure from management to complete the project sooner
34. What are the common mistakes which create issues?
●​ Matching resources to wrong projects
●​ Test manager lack of skills
●​ Not listening to others
●​ Poor Scheduling
●​ Underestimating
●​ Ignoring the small problems
●​ Not following the process

35. What does a typical test report contain? What are the benefits of test
reports?
A test report contains the following things:
●​ Project Information
●​ Test Objective
●​ Test Summary
●​ Defect
The benefits of test reports are: Octquality of product are informed
●​ If required, stakeholder and customer can take corrective action
●​ A final document helps to decide whether the product is ready for release

38. When is RTM (Requirement Traceability Matrix) prepared?


RTM is prepared before test case designing. Requirements should be traceable from review
activities.
is a document that maps and traces user requirement with test cases. It captures all
requirements proposed by the client and requirement traceability in a single document,
delivered at the conclusion of the Software developement life cycle. The main purpose of
Requirement Traceability Matrix is to validate that all requirements are checked via test cases
such that no functionality is unchecked during Software testing

Why RTM is Important?


The main agenda of every tester should be to understand the client’s requirement and make
sure that the output product should be defect-free. To achieve this goal, every QA should
understand the requirement thoroughly and create positive and negative test cases.
This would mean that the software requirements provided by the client have to be further split
into different scenarios and further to test cases. Each of this case has to be executed
individually.
A question arises here on how to make sure that the requirement is tested considering all
possible scenarios/cases? How to ensure that any requirement is not left out of the testing
cycle?
A simple way is to trace the requirement with its corresponding test scenarios and test cases.
This merely is termed as ‘Requirement Traceability Matrix.'
The traceability matrix is typically a worksheet that contains the requirements with its all possible
test scenarios and cases and their current state, i.e. if they have been passed or failed. This
would help the testing team to understand the level of testing activities done for the specific
product.

Which Parameters to include in Requirement Traceability Matrix?


●​ Requirement

from your Test Suite. RTM in testing is Ready!

Drawbacks of RTM:

1.​ Maintenance is expensive


2.​ If used in xlsx then lot of manual work
3.​ Chance of mistakes
4.​ Not able to achieve what we want in excel

45. Explain what N+1 testing is?


The variation of regression testing is represented as N+1. In this technique, the
testing is performed in multiple cycles in which errors found in test cycle 'N' are
resolved and re-tested in test cycle N+1. The cycle is repeated unless there are no
errors found.

49. How will you handle a conflict amongst your team members?

●​ I will talk individually to each person and note their concerns


●​ I will find a solution to the common problems raised by team members
●​ I will hold a team meeting, reveal the solution and ask people to co-operate

50. Mention what are the categories of defects?


Mainly there are three defect categories

●​ Wrong: When a requirement is implemented incorrectly


●​ Missing: It is a variance from the specification, an indication that a
specification was not implemented or a requirement of the customer is not
met
●​ Extra: A requirement incorporated into the product that was not given by the
end customer. It is considered as a defect because it is a variance from the
existing requirements

51. Explain how does a test coverage tool work?


The code coverage testing tool runs parallel while performing testing on the actual
product. The code coverage tool monitors the executed statements of the source
code. When the final testing is done, we get a complete report of the pending
statements and also get the coverage percentage.

52. Mention what the difference between a "defect" and a "failure" in


software testing is?
In simple terms when a defect reaches the end customer, it is called a failure while
the defect is identified internally and resolved; then it is referred to as a defect.

53. Explain how to test documents in a project that span across the
software development lifecycle?
The project span across the software development lifecycle in the following manner

●​ Central/Project test plan: It is the main test plant outlines the complete test
strategy of the project. This plan is used till the end of the software
development lifecycle
●​ Acceptance test plan: This document begins during the requirement phase and
is completed at the final delivery
●​ System test plan: This plan starts during the design plan and proceeds until the
end of the project
●​ Integration and Unit test plan: Both these test plans start during the execution
phase and last until the final delivery.

54. Explain which test cases are written first black boxes or white
boxes?
Black box test cases are written first as to write black box test cases; it requires
project plan and requirement document all these documents are easily available at
the beginning of the project. While writing white box test cases requires more
architectural understanding and is not available at the start of the project.

55. Explain what the difference between latent and masked defects is?

●​ Latent defects are defects that are present in the software but are not
immediately apparent or observable during normal testing or operation. They
may become evident under specific conditions or scenarios.
●​ Masked defects are defects that go undetected during testing due to the
presence of other defects or issues. The identification of masked defects may be
delayed until the issues that are masking them are resolved.

56. Mention what bottom-up testing is?


Bottom-up testing is an approach to integration testing, where the lowest level
components are tested first, then used to facilitate the testing of higher level
components. The process is repeated until the component at the top of the hierarchy
is tested.

57. Mention what the different types of test coverage techniques are?
Different types of test coverage techniques include

●​ Statement Coverage: It verifies that each line of source code has been
executed and tested
●​ Decision Coverage: It ensures that every decision in the source code is
executed and tested
●​ Path Coverage: It ensures that every possible route through a given part of the
code is executed and tested

58. Mention what the meaning of breath testing is?


Breath testing is a test suite that exercises the full functionality of a product but does
not test features in detail

59. Explain what the meaning of Code Walk Through is?


Code Walk Through is the informal analysis of the program source code to find
defects and verify coding techniques

60. Mention what the basic components of defect report format are?
The essential components of defect report format include

●​ Project Name
●​ Module Name
●​ Defect detected on
●​ Defect detected by
●​ Defect ID and Name
●​ Snapshot of the defect
●​ Priority and Severity status
●​ Defect resolved by
●​ Defect resolved on
61. Mention what th hue purpose behind doing end-to-end testing is?
End-to-end testing is done after functional testing. The purpose behind doing
end-to-end testing is that

●​ To validate the software requirements and integration with external interfaces


●​ Testing application in real-world environment scenario
●​ Testing of interaction between application and database

62. Explain what it means by test harness?


A test harness is involves monitoring the output with expected output for
correctness. HiIn testing project testing activities, you would automate are

●​ Tests that need to be run for every build of the application


●​ Tests that use multiple data for the same set of actions
●​ Identical tests that need to be executed using different browsers
●​ Mission critical pages
●​ A transaction with pages that do not change in a short time

64. What is the MAIN benefit of designing tests early in the life cycle?
Bh being introduced into the code.

65. What is risk-based testing?


Risk-based Testing is the term used for an approach to creating a Test Strategy that is
based on prioritizing tests by risk. The basis of the approach is a detailed risk analysis
and prioritizing of risks by risk level. Tests to address each risk are then specified,
starting with the highest risk first.

66. What is the KEY difference between preventative and reactive


approaches to testing?
Preventative tests are designed early; reactive tests are designed after the software
has been produced.
67. What is the purpose of exit criteria?
The purpose of exit criteria is to define when a test level is completed.

68. What determines the level of risk?


The likelihood of an adverse event and the impact of the event determine the level of
risk.

69. When is used Decision table testing?


Decision table testing is used for testing systems for which the specification takes the
form of rules or cause-effect combinations. In a decision table, the inputs are listed in
a column, with the outputs in the same column but below the inputs. The remainder
of the table explores combinations of inputs to define the outputs produced.

Learn More About Decision Table Testing Technique in the Video Tutorial here

70. Why we use decision tables?


The techniques of equivalence partitioning and boundary value are often applied to
specific situations or inputs. However, if different combinations of inputs result in
different actions being taken, this can be more difficult to show using equivalence
partitioning and boundary value analysis, which tend to be more focused on the user
interface. The other two specification-based techniques, decision tables, and state
transition testing are more focused on business logic or business rules. A decision
table is a good way to deal with combinations of things (e.g., inputs). This technique
is sometimes also referred to as a 'cause-effect' table. The reason for this is that
there is an associated logic diagramming technique called 'cause-effect graphing'
which was sometimes used to help derive the decision table

71. What is the MAIN objective when reviewing a software


deliverable?
To identify defects in any software work product.
72. Which of the following defines the expected results of a test? Test
case specification or test design specification.
Test case specification defines the expected results of a test.

73. What is the benefit of test independence?


It avoids author bias in defining effective intests.

74. As part of which test process do you determine the exit criteria?
The exit criteria are determined on the bases of 'Test Planning'.

75. What is Alpha testing?


Pre-release testing by end user representatives at the developer's site.

76. What is beta testing?


Testing performed by potential customers at their own locations.

77. Mention what the difference between Pilot and Beta testing is?
The difference between a pilot and beta testing is that pilot testing is actually done
using the product by the group of users before the final deployment, and in beta
testing, we do not input real data, but it is installed at the end customer to validate if
the product can be used in by testing? When is it used?

Random testing is often known as monkey testing. In such type of testing data is
generated randomly often using a tool or automated mechanism. With this randomly
generated input, the system is tested, and results are analyzed accordingly. These
testing are less reliable; hence it is normally used by the beginners and to see
whether the system will hold up under adverse effects

93. Consider the following techniques. Which are static and which are
dynamic techniques?

1.​ Equivalence Partitioning.


2.​ Use Case Testing.
3.​ Data Flow Analysis.
4.​ Exploratory Testing am.
5.​ Decision Testing.
6.​ Inspections.

Data Flow Analysis and Inspections are static; Equivalence Partitioning, Use Case
Testing, Exploratory Testing and Decision Testing are dynamic.

95. What are the phases of a formal review?


In contrast to informal reviews, formal reviews follow a formal process. A typical
formal review process consists of six main steps:

1.​ Planning
2.​ Rework
3.​ Follow-up.

103. When should "Regression Testing" be performed?


After the software has changed or when the environment has changed Regression
testing should be performed.

104. What is negative and positive testing?


A negative test is when you put in an invalid input and receives errors. While positive
testing is when you put in a valid input and expect some action to be completed in
accordance with the specification

105. What is the purpose of a test completion criterion?


The purpose of test completion criterion is to determine when to stop testing
107. What is the difference between re-testing and regression testing?
Re-testing ensures the original fault has been removed; regression testing looks for
unexpected side effects can.

108. What are the Experience-based testing techniques?


In experience-based techniques, people's knowledge, skills, and background are a
prime contributor to the test conditions and test cases. The experience of both
technical and business people is important, as they bring different perspectives to
the test analysis and design hi systems, they may have insights into what could go
wrong, which is very useful for testing.

111. An input field takes the year of birth between 1900 and 2004
what the boundary values for testing this field are?
1899,1900,2004, FC çIt depends on the risks for the system being tested. There are
some criteria based on which you can stop testing.

1.​ Deadlines (Testing, Release)


2.​ Test budget has been depleted
3.​ Bug rate fall below a certain level
4.​ Test cases completed with certain percentage passed
5.​ Alpha or beta periods for testing ends
6.​ Coverage of code, functionality or requirements are met to a specified point

124. A number of critical bugs are fixed in software. All the bugs are in
one module, related to reports. The test manager decides to do
regression testing only on the reports module.
Regression testing should be done on other modules as well because fixing one
module may affect other modules.

125. Why does the boundary value analysis provide good test cases?
Because errors are frequently made during programming of the different cases near
the 'edges' of the range of values.
128. What is V-Model?
A software development model that illustrates how testing activities integrate with
software development phases

130. What is test coverage?


Test coverage measures in some specific way the amount of testing performed by a
set of tests (derived in some other way, e.g., using specification-based techniques).
Wherever we can count things and can tell whether or not each of those things has
been tested by some test, then we can measure coverage.

135. Why we split testing into distinct stages?


We split testing into distinct stages because of the following reasons,

1.​ Each test stage has a different purpose


2.​ It is easier to manage to test in stages
3.​ We can run different test into different environments
4.​ Performance and quality of the testing is improved using phased testing

144. What is the purpose of test design technique?


Identifying test conditions and Identifying test cases

145. When testing a grade calculation system, a tester determines that


all scores from 90 to 100 will yield a grade of A, but scores below 90
will not. This analysis is known as:
Equivalence partitioning

156. What does COTS represent?


Commercial Off The Shelf.
SQl Basic
1. State the differences between HAVING and WHERE clauses.

Basis for WHERE HAVING


Comparison

Implemented in Row operations Column operations

Applied to A single row The summarized row or groups

Used for Fetching specific data from Fetching the entire data and
specific rows according to the separating according to the
given condition given condition

Aggregate Cannot have them Can have them


functions

Statements Can be used with SELECT, Cannot be used without a


UPDATE, and DELETE SELECT statement

GROUP BY Comes after the WHERE clause Comes before the HAVING
clause clause

2. What is SQL?

SQL stands for ‘Structured Query Language’ and is used for communicating with
databases. According to ANSI, SQL is the standard query language used for
maintaining relational database management systems (RDBMS) and also for
performing different operations of data manipulation on different types of data. Basically,
it is a database language that is used for the creation and deletion of databases, and it
can be used to fetch and modify the rows of a table and also for multiple other things.

3. What are the subsets of SQL?

The main significant subsets of SQL are:

1.​ DDL(Data Definition Language) -CREATE , alter, truncate, drop.


2.​ DML(Data Manipulation Language) - Select, insert, delete, update
3.​ DCL(Data Control Language)- Revoke, commit, rollback
4.​ TCL(Transaction Control Language)

4. Explain the different types of SQL commands.

●​ Data Definition Language: DDL is that part of SQL which defines the data
structure of the database in the initial stage when the database is about to
be created. It is mainly used to create and restructure database objects.
Commands in DDL are:
○​ Create table
○​ Alter table
○​ Drop table
●​ Data Manipulation Language: DML is used to manipulate the already
existing data in the database. That is, it helps users retrieve and manipulate
the data. It is used to perform operations such as inserting data into the
database through the insert command, updating the data with the update
command, and deleting the data from the database through the delete
command.
●​ Data Control Language: DCL is used to control access to the data in the
database. DCL commands are normally used to create objects related to
user access and also to control the distribution of privileges among users.
The commands that are used in DCL are Grant and Revoke.
●​ Transaction Control Language: It is used to control the changes made by
DML commands. It also authorizes the statements to assemble in
conjunction into logical transactions. The commands that are used in TCL
are Commit, Rollback, Savepoint, Begin, and Transaction.

7. What is a default constraint?

Constraints are used to specify some sort of rules for processing data and limiting the
type of data that can go into a table. Now, let’s understand the default constraint.

The default constraint is used to define a default value for a column so that the default
value will be added to all the new records if no other value is specified. For example, if
we assign a default constraint for the E_salary column in the below table and set the
default value as 85000, then all the entries of this column will have a default value of
85000 unless no other value has been assigned during the insertion.
Now, let’s see how to set a default constraint. We will start off by creating a new table
and adding a default constraint to one of its columns.

Code:
create table stu1(s_id int, s_name varchar(20), s_marks int default
50)
select *stu1

Output:

Now, we will insert the records.

Code:
insert into stu1(s_id,s_name) values(1,’Sam’)
insert into stu1(s_id,s_name) values(2,’Bob’)
insert into stu1(s_id,s_name) values(3,’Matt’)
select *from stu1

Output:
8. What do you mean by table and field in SQL?

An organized data in the form of rows and columns is said to be a table. Here rows and
columns are referred to as tuples and attributes.

And the number of columns in a table is referred to as a field. In the record, fields
represent the characteristics and attributes.

9. What is a unique constraint?

Unique constraints ensure guy to the e_name column in the below table, then every
entry in this column should have a unique value.

First, we will create a table.


create table stu2(s_id int unique, s_name varchar(20))

Now, we will insert the records.


insert into stu2 values(1,’Julia’)
insert into stu2 values(2,’Matt’)
insert into stu2 values(3,’Anne’)

Output:
7. What is a default constraint?

Constraints are used to specify some sort of rules for processing data and limiting the
type of data that can go into a table. Now, let’s understand the default constraint.

The default constraint is used to define a default value for a column so that the default
value will be added to all the new records if no other value is specified. For example, if
we assign a default constraint for the E_salary column in the below table and set the
default value as 85000, then all the entries of this column will have a default value of
85000 unless no other value has been assigned during the insertion.

Now, let’s see how to set a default constraint. We will start off by creating a new table
and adding a default constraint to one of its columns.

Code:
create table stu1(s_id int, s_name varchar(20), s_marks int default
50)
select *stu1

Output:
Now, we will insert the records.

Code:
insert into stu1(s_id,s_name) values(1,’Sam’)
insert into stu1(s_id,s_name) values(2,’Bob’)
insert into stu1(s_id,s_name) values(3,’Matt’)
select *from stu1

Output:

8. What do you mean by table and field in SQL?

An organized data in the form of rows and columns is said to be a table. Here rows and
columns are referred to as tuples and attributes.

And the number of columns in a table is referred to as a field. In the record, fields
represent the characteristics and attributes.

9. What is a unique constraint?

Unique constraints ensure that all the values in a column are different. For example, if
we assign a unique constraint to the e_name column in the below table, then every
entry in this column should have a unique value.
First, we will create a table.
create table stu2(s_id int unique, s_name varchar(20))

Now, we will insert the records.


insert into stu2 values(1,’Julia’)
insert into stu2 values(2,’Matt’)
insert into stu2 values(3,’Anne’)

Output:

0. How would you find the second highest salary from the below table?
Code:
select * from employee
select max(e_salary) from employee where e_salary not in (select
max(e_salary) from employee)

11. What is a primary key?

A primary key is used to uniquely identify all table records. It cannot have NULL values,
and it must contain unique values. A table can have only one primary key that consists
of single or multiple fields.

Now, we will write a query for demonstrating the use of a primary key for the Employee
table:
//
CREATE TABLE Employee (
ID int NOT NULL,
Employee_name varchar(255) NOT NULL,
Employee_designation varchar(255),
Employee_Age int,
PRIMARY KEY (ID)
);

12. What is a Unique Key?


The key which can accept only the null value and cannot accept the duplicate values is
called Unique Key. The role of the unique key is to make sure that each column and row
are unique.

The syntax will be the same as the Primary key. So, the query using a Unique Key for
the Employee table will be:
//
CREATE TABLE Employee (
ID int NOT NULL,
Employee_name varchar(255) NOT NULL,
Employee_designation varchar(255),
Employee_Age int,
UNIQUE(ID)
);

13. What is the difference between Primary key and Unique Key?

Both Primary and Unique key carry unique values but the primary key can not have a
null value where the Unique key can. And in a table, there cannot be more than one
Primary key but unique keys can be multiple.

14. What is a foreign key?

A foreign key is an attribute or a set of attributes that references to the primary key of
some other table. Basically, it is used to link together two tables.

Let’s create a foreign key for the below table:


CREATE TABLE Orders (
OrderID int NOT NULL,
OrderNumber int NOT NULL,
PersonID int,
PRIMARY KEY (OrderID),
FOREIGN KEY (PersonID) REFERENCES Persons(PersonID)
)

22. What is the need for group functions in SQL?

Group functions operate on a series of rows and return a single result for each group.
COUNT(), MAX(), MIN(), SUM(), AVG() and VARIANCE() are some of the most widely
used group functions.

23. What do you understand about a character manipulation function?

Character manipulation functions are used for the manipulation of character data types.

Some of the character manipulation functions are:

UPPER: It returns the string in uppercase.


LOWER: It returns the string in lowercase.

INITCAP: It converts the first letter of the string to uppercase and retains others in
lowercase.

CONCAT: It is used to concatenate two strings.

LENGTH: It is used to get the length of a string.

SELECT LENGTH(‘Hello World’) from String

SELECT Initcap(‘dATASET’) from String

SELECT UPPER(‘demo string’) from String;

SELECT LOWER (‘DEMO STRING’) from String

25. What is the difference between DELETE and TRUNCATE commands?

●​ DELETE: This query is used to delete or remove one or more existing tables.
●​ TRUNCATE: This statement deletes all the data from inside a table.

The difference between DELETE and TRUNCATE commands are as follows:

●​ TRUNCATE is a DDL command, and DELETE is a DML command.


●​ With TRUNCATE, we cannot really execute and trigger, while with DELETE,
we can accomplish a trigger.
●​ If a table is referenced by foreign key constraints, then TRUNCATE will not
work. So, if we have a foreign key, then we have to use the DELETE
command.
DELETE FROM table_name
[WHERE condition];
Example:

select * from stu

Output:

delete from stu where s_name=’Bob’

Output:

The syntax for the TRUNCATE command:


TRUNCATE TABLE
Table_name;

Example:

select * from stu1

Output:

truncate table stu1

Output:
This deletes all the records from the table.but name of the column keep same.

What are the types of join and explain each?


There are various types of join which can be used to retrieve data and it
depends on the relationship between tables.

●​ Inner Join.

Inner join returns rows when there is at least one match of rows between the
tables.

●​ Right Join.

Right join returns rows which are common between the tables and all rows of
the Right hand side table. Simply, it returns all the rows from the right hand
side table even though there are no matches in the left hand side table.
SELECT Orders.OrderID, Employees.LastName, Employees.FirstName

FROM Orders

RIGHT JOIN Employees ON Orders.EmployeeID = Employees.EmployeeID

ORDER BY Orders.OrderID;

●​ Left Join.

Left join returns rows which are common between the tables and all rows of
the Left hand side table. Simply, it returns all the rows from the Left hand side
table even though there are no matches in the Right hand side table.

●​ Full Join.

Full join return rows when there are matching rows in any one of the tables.
This means, it returns all the rows from the left hand side table and all the
rows from the right hand side table.

22. What is a stored procedure?


Stored Procedure is a function consisting of many SQL statements to access
the database system. Several SQL statements are consolidated into a stored
procedure and execute them whenever and wherever required.

23. What is a trigger?


A DB trigger is a code or programs that automatically execute with response
to some event on a table or view in a database. Mainly, triggers help to
maintain the integrity of the database.

Example: When a new student is added to the student database, new records
should be created in the related tables like Exam, Score and Attendance
tables.
43. What is the difference between TRUNCATE and DROP
statements?
TRUNCATE removes all the rows from the table, and it cannot be rolled back.
DROP command removes a table from the database and the operation cannot
be rolled back.

Queries:

1.​ Find common records between 2 diff tables

Select studentID from student INTERSECT Select StudentID


from Exam

Fetch Alternate even record from table

Select studentId from (Select rowno, studentId from


student) where mod(rowno,2)=0

Fetch Alternate Odd record from table

Select studentId from (Select rowno, studentId from


student) where mod(rowno,2)=1

Unique record:
Select DISTINCT StudentID, StudentName from Student.

Fetch 1st 5 char from the string:

Select SUBSTRING(StudentName,1,5) as studentname from


student
Write a SQL query to get the nth highest salary of an employee from
employee_table?

SELECT TOP 1 salary

FROM(

SELECT TOP n salary

FROM employee_table

ORDER BY salary DESC) AS emp

ORDER BY salary ASC;

Example of BETWEEN:
SELECT * FROM Students where ROLL_NO BETWEEN 10 AND 50;

Example of IN:
SELECT * FROM students where ROLL_NO IN (8,15,25);

How to Rename the Table:

ALTER TABLE employee RENAME TO employee_information;

Q41. What is the difference between ‘HAVING’ CLAUSE and a


‘WHERE’ CLAUSE?
HAVING clause can be used only with SELECT statement. It is usually used in
a GROUP BY clause and whenever GROUP BY is not used, HAVING
behaves like a WHERE clause.
Having Clause is only used with the GROUP BY function in a query whereas
WHERE Clause is applied to each row before they are a part of the GROUP
BY function in a query.

The GROUP BY statement is often used with aggregate functions (COUNT(),


MAX(), MIN(), SUM(), AVG()) to group the result-set by one or more
columns.
SELECT COUNT(CustomerID), Country
FROM Customers
GROUP BY Country
ORDER BY COUNT(CustomerID) DESC;
SELECT COUNT(CustomerID), Country
FROM Customers
GROUP BY Country
HAVING COUNT(CustomerID) > 5;
=
Insert statement:

INSERT INTO Customers (CustomerName, ContactName, Address, City,


PostalCode, Country)
VALUES ('Cardinal', 'Tom B. Erichsen', 'Skagen 21', 'Stavanger',
'4006', 'Norway');

Update Statement:

UPDATE Customers
SET ContactName = 'Alfred Schmidt', City= 'Frankfurt'
WHERE CustomerID = 1;

Create DB:

CREATE DATABASE testDB;

To delete a column in SQL we will be using DROP COLUMN method:

ALTER TABLE employees DROP COLUMN age;

This is how we can extract all tables in SQL Server:

SELECT * FROm Information_schema.tables;


Drop existing DB
DROP DATABASE databasename;

Create Table:
CREATE TABLE Persons (
​ PersonID int,
​ LastName varchar(255),
​ FirstName varchar(255),
​ Address varchar(255),
​ City varchar(255)
);

Create table With primary key

CREATE TABLE Persons (


​ ID int NOT NULL PRIMARY KEY,
​ LastName varchar(255) NOT NULL,
​ FirstName varchar(255),
​ Age int
);

Create table with forign key

CREATE TABLE Orders (


​ OrderID int NOT NULL,
​ OrderNumber int NOT NULL,
​ PersonID int,
PRIMARY KEY (OrderID),
FOREIGN KEY (PersonID) REFERENCES Persons(PersonID)
);

SELECT Count(*) AS DistinctCountries


FROM (SELECT DISTINCT Country FROM Customers);
The ALTER TABLE statement is used to add, delete, or modify columns in an
existing table.

ALTER TABLE Persons


ADD DateOfBirth date; --add column in Existing table

ALTER TABLE Persons


ALTER COLUMN DateOfBirth year; ----change data type

Scrum Interview Questions And Answers

Defination of scrum:

Scrum is a lightweight framework that helps people, teams and organizations generate
value through adaptive solutions for complex problems.

How Do You Prioritize a Product Backlog?

1.​ Stack Ranking -There can only be one number one

2.​ Kano Model -pick one from each of the important categories (must be,

one directional,)
3.​ MoSCoW Method
4.​ Cost of Delay

Q #1) How is scrum different from waterfall?

Answer: The major differences are:


●​ The feedback from the customer is received at an early stage in Scrum than
waterfall, whereas the feedback from the customer is received towards the
end of the development cycle.
●​ Accommodating the new or changed requirement in scrum is easier than the
waterfall.
●​ Scrum focuses on collaborative development rather than waterfall where the
entire development cycle is divided into phases.
●​ At any point of time, we can roll back the changes in scrum rather than in
waterfall.
●​ Testing is considered a phase in the waterfall, unlike scrum.

Q #2) How is scrum different from the Iterative model?

Answer: Scrum is a type of iterative model but it is iterative + incremental.

Q #3) Do you know any other agile methodology apart from Scrum?

Answer: Other Agile methodology includes KanBan, XP, Lean.

Q #4) What are the ceremonies you perform in the scrum?

Answer: There are 3 major ceremonies performed in Scrum:

●​ Planning Meeting: Here, the entire scrum teams along with the scrum master
and product owner meet to discuss each item from the product backlog that
they can work on in the sprint. When the story is estimated and is well
understood by the team, the story then moves into the Sprint Backlog.
●​ Review Meeting: Here, the scrum team demonstrates their work done to the
stakeholders.
●​ Retrospective meeting: Here, the scrum teams along with the scrum master
and product owner meet to retrospect the last sprint they worked on. They
majorly discuss on the 3 things:
○​ What went well?
○​ What could be done better?
○​ Action Items
Apart from these three ceremonies, we have one more called “Backlog grooming” meeting.

In this meeting, the scrum team along with the scrum master and product owner. The
product owner put forward the business requirements as per the priority and the team
discussed it, identifying the complexity, dependencies, and efforts. The team may also do
the story pointing at this stage.

Q #5) Do you know the Three Amigos/piler in Scrum?

Answer: The three Amigos are – Product Owner, Scrum Master, and Scrum Team.

Q #6) What do you think should be the ideal size of a Scrum team?

Answer: The ideal size is 7 to 9 with +/- 2

Q #7) What do you discuss in the daily stand up meeting?

Answer: We discuss the following three things:

●​ What did I do today?


●​ What do I plan to do tomorrow?
●​ Any impediments/roadblock

Q #8) What is the “Time Boxing” of a scrum process called?

Answer: It’s called “Sprint”

Q #9) What should be an ideal duration of a sprint?

Answer: It is recommended to have 2 – 4 weeks of the sprint cycle.

Q #10) How requirements are defined in a scrum?

Answer: Requirements are termed as “User Stories” in Scrum.

Q #11) What are the different artifacts in scrum?


Answer: There are two artifacts maintained in Scrum:

●​ Product Backlog: Containing the prioritized list of business requirements


●​ Sprint Backlog: Contains the user stories to be done by the scrum team for a
sprint.

Q #12) How do you define a user story?

Answer: The user stories are defined in the format of

As a <User / type of user>

I want to <action/feature to implement>

So that < objective>

Q #13) What are the roles of a Scrum Master and Product owner?

Answer:

Scrum Master: Acts as a Servant Leader for the scrum team. He presides over all the
scrum ceremonies and coaches the team to understand and implement scrum values and
principals.

Product Owner: Is the point of contact for a scrum team. He/she is the one who works
closest to the business. The main responsibility of a product owner is to identify and refine
the product backlog items.

Q #14) How do you measure the work done in a sprint?

Answer: It’s measured by Velocity.

Q #15) What is Velocity?

Answer: Velocity is the sum of story points that a scrum team completes (meets the
definition of done) over a sprint.
Q #16) So in scrum, which entity is responsible for the deliverables? Scrum Master or
Product Owner?

Answer: Neither the scrum master, nor the product owner. It’s the responsibility of the team
who owns the deliverable.

Q #17) How do you measure the complexity or effort in a sprint? Is there a way to
determine and represent it?

Answer: Complexity and effort are measured through “Story Points”. In Scrum, it’s
recommended to use the Fibonacci series to represent it.

Q #18) How do you track your progress in a sprint?

Answer: The progress is tracked by a “Burn-Down chart”.

Q #19) How do you create the Burn-Down chart?

Answer: Burn-down chart is a graph that shows the estimated v/s actual effort of the scrum
tasks.

It is a tracking mechanism by which for a particular sprint; day to day tasks are tracked to
check whether the stories are progressing towards the completion of the committed story
points or not. Here, we should remember that the efforts are measured in terms of user
stories and not hours.

Q #20) What do you do in a sprint review and retrospective?

Answer: During Sprint review we walk-through and demonstrate the feature or story
implemented by the scrum team to the stakeholders.

During Retrospective, we try to identify in a collaborative way what went well, what could be
done better and action items to have continuous improvement.

Q #21) Do you see any disadvantages of using scrum?


Answer: I don’t see any disadvantage of using scrum. The problems mainly arise when the
scrum team do not either understand the values and principles of the scrum or are not
flexible enough to change.

Q #22) Do you think scrum can be implemented in all the software development
processes?

Answer: Scrum is used mainly for

●​ Complex projects.
●​ Projects which have early and strict deadlines.
●​ When we are developing any software from scratch.

Q #23) During Review, suppose the product owner or stakeholder does not agree
with the feature you implemented, what would you do?

Answer: First thing we will not mark the story as done.

We will first confirm the actual requirement from the stakeholder and update the user story
and put it into the backlog. Based on the priority, we would be pulling the story in the next
sprint.

Q #24) In case the scrum master is not available, would you still conduct the daily
stand up meeting?

Answer: Yes, we can very well go ahead and do our daily stand up meeting.

Q #25) Where does automation fit into scrum?

Answer: Automation plays a vital role in Scrum. In order to have continuous feedback and
ensure the quality deliverables we should try to implement TDD, BDD, and ATDD
approaches during our development. Automation in scrum is not only related to testing but it
is for all aspects of software development.
As I said before, introducing TDD, BDD and ATDD will speed up our development process
along with maintaining the quality standards; automating the build and deployment process
will also speed up the feature availability in different environments – QA to production.

As far as testing is concerned, regression testing should be the one that will have the most
attention. With the progress of every sprint, the regression suite keeps on increasing and it
becomes practically very challenging to execute the regression suite manually for every
sprint. Because we have the sprint duration of 2 – 4 weeks, automating it would be imperial.

Q #26) Apart from planning, review, and retrospective, do you know any other
ceremonies in scrum?

Answer: We have the Product Backlog Refinement meeting (backlog grooming meeting)
where the team, scrum master and product owner meets to understand the business
requirements, splits it into user stories, and estimates it.

Q #27) Can you give an example of where scrum cannot be implemented? In that
case, what do you suggest?

Answer: Scrum can be implemented in all kinds of projects. It is not only applicable to
software but is also implemented successfully in mechanical and engineering projects.

Q #28) Tell me one big advantage of using scrum?

Answer: The major advantage is – Early feedback and producing the Minimal Viable
Product to the stakeholders.

Q #29) What is DoD? How is this achieved?

Answer: DoD stands for Definition of Done. It is achieved when

●​ The story is development complete


●​ QA complete
●​ The story meets and satisfies the acceptance criteria
●​ Regression around the story is complete
●​ The feature is eligible to be shipped/deployed in production.
Q #30) What is MVP in scrum?

Answer: A Minimum Viable Product is a product that has just the bare minimum required
feature which can be demonstrated to the stakeholders and is eligible to be shipped to
production.

Q #31) What are Epics?

Answer: Epics are equivocal user stories or we can say these are the user stories that are
not defined and are kept for future sprints.

Q #32) How do you calculate a story point?

Answer: A story point is calculated by taking into consideration the development effort
testing effort + resolving dependencies and other factors that would require to complete a
story.

Q #33) Is it possible that you come across different story points for development and
testing efforts? In that case, how do you resolve this conflict?

Answer: Yes, this is a very common scenario. There may be a chance that the story point
given by the development team is, say 3 but the tester gives it 5. In that case, both the
developer and tester have to justify their story point, have discussions in the meeting and
collaborate to conclude a common story point.

Q #34) You are in the middle of a sprint and suddenly the product owner comes with
a new requirement, what will you do?

Answer: In an ideal case, the requirement becomes a story and moves to the backlog.
Then based on the priority, teams can take it up in the next sprint.

But if the priority of the requirement is really high, then the team will have to accommodate it
in the sprint but it has to very well communicate to the stakeholder that incorporating a story
in the middle of the sprint may result in spilling over a few stories to the next sprint.

Q #35) In case you receive a story on the last day of the sprint to test and you find
there are defects, what will you do? Will you mark the story as done?
Answer: A story is done only when it is development complete + QA complete +
acceptance criteria is met + it is eligible to be shipped into production. In this case, if there
are defects, the story is partially done and not completely done, so I will spill it over to the
next sprint

Mobile Application Testing:

Mobile Testing Interview Questions

1. What are the various types of mobile operating systems?

●​ Android OS – Developed by Google Inc.


●​ iOS – Developed by Apple Inc.

2. What is the latest version of the Android mobile


operating system?

The initial version of Android 12.0 was released on October 19, 2021, on
Google's Pixel smartphones.

3. List of earlier versions of the Android operating system?

●​ Android 1.0
●​ Android 1.1
●​ Android 1.5 Cupcake
●​ Android 1.6 Donut
●​ Android power 2.0 Eclair
●​ Android 2.2 Froyo
●​ Android 2.3 Gingerbread
●​ Android 3.0 Honeycomb
●​ Android 4.0 Ice Cream Sandwich
●​ Android 4.1 Jelly Bean
●​ Android 4.4 KitKat
●​ Android 5.0 Lollipop
●​ Android 6.0 Marshmallow
●​ Android Nougat 7.0
●​ Android 8.0 Oreo
●​ Android 9 Pie
●​ Android 10
●​ Android 11
●​ Android 12

4. What is the latest version of iOS and iPadOS?

iOS 15/14 iPadOS 15 for iphone 12

5. What are the different types of mobile devices?

Mobile devices are usually handheld computers. They have many types depending on

their characteristics such as physical dimensions, hardware and software capabilities,

what they mean, and more.

●​ Tablets
●​ Mobile

7. What are the types of mobile testing?


There are 2 types of mobile testing:

●​ Automated testing
●​ Manual test

8. When are manual testing and automation testing done?

Manual testing is performed when new functionality is developed for the application and

only a few times testing is required.

Automatic testing is used on applications in critical scenarios where regression tests

have to be repeated

11. Difference between a web app, native app, and hybrid


app?

Web Apps:

Web applications are not real applications; They are websites that open on your

smartphone with the help of a web browser. Mobile websites have a wide audience of

all primary types of applications.

●​ Example – Great Education


●​ Benefits – Easy access.
●​ Easy development.
●​ Easy update
●​ Downside – Access to file systems and local resources is not
available on websites.
●​ Many existing websites do not support offline capabilities.
●​ The website only needs to be opened in a web browser.

While native and hybrid apps appear on the App Store and Google Play, web apps will

not. Therefore, redistribution is not so sensible.

Native Apps:

A native app has been developed specifically for one platform. It can be installed

through an application store (such as the Google Play Store or Apple’s App Store).

Examples – Whatsapp, Facebook.

●​ Benefits – Can be accessed via the original application icon.


●​ They can take full advantage of all device features – camera, GPS,
accelerometer, compass, list of contacts, and so on.
●​ Can use the device’s notification system and work offline.
●​ The best user experience.
●​ As it is found in the App Store, redistribution is easy.

Downsides:

●​ High cost for the creation of the app.


●​ Maintenance is high.

Hybrid App:

These apps are a way of exposing content from existing websites in an app format.

They can be described as a mixture of web apps and native apps.

Examples – Instagram, Wikipedia.


●​ Benefit –
●​ It is cheaper to develop a hybrid app than to develop a native app. It
can be built for cross-platform use.
●​ Maintenance is simple, as there are not many versions to maintain.
●​ It can take advantage of some features available on the device.
●​ It can be found in the App Store, making delivery easier.
●​ It only has a browser embedded within the app.

Downside:

●​ Graphics are less accustomed to operating systems than native


apps.
●​ Hybrid apps are slower than native apps.

12. What is Mobile Device Testing?

This type of testing is usually being done to ensure the quality of the mobile device.

Testing includes hardware and software testing for mobile. We will discuss here the

different types of tests that are typically being done on mobile devices.

●​ unit-testing
●​ Factory testing
●​ Mobile app testing
●​ Hardware testing
●​ Battery (charging) test
●​ Receiving signal
●​ network test
●​ Protocol test
●​ Mobile game testing
●​ Mobile software compatibility test
●​ Certification testing before going into the mobile device market.

13. What is Mobile App Testing?

Mobile application testing is a process by which application software developed for

handheld mobile devices is tested for its functionality, usability, and stability. The

different types of tests performed on mobile devices are as follows:

●​ functional testing
●​ laboratory testing
●​ Performance test
●​ Memory leak test
●​ Trial interruption
●​ Usability test
●​ Installation test
●​ Certification test
●​ Security test
●​ main point

14. What is the difference between device testing and


application testing?

While device testing is typically being done to test mobile devices, mobile app testing

will include testing an app that will be running on the selected device.
When we call it instrument testing, hardware becomes a part of testing. In the case of

mobile application testing, it depends, that is, if hardware integration is required for the

application under test, then hardware testing will be involved.

Automation is possible for mobile device testing as well as mobile application testing.

15. What are a simulator and an emulator?

Simulator: It is an electronic network simulation tool or base station tool for CDMA /

CDMA mobile phones. It can and does help with home network latching without roaming

services; Data call, SMS,

Emulator: This is software for testing mobile apps without a live handset

16. Why do we need an emulator/simulator?

If we are developing an application. Once the product is fully developed, as a part of

mobile testing, we need to see if the application works with all major devices such as

Android phones, iOS, Blackberry phones, and other different types of tablets and iPads.

Is working as expected. To perform this type of investigation, we need to obtain each

device which is very expensive to purchase and test such a large number of mobile

devices. To solve this problem, we need a simulator/emulator.

17. How is testing done on an emulator/simulator different


from testing on a real device?

Real Device:
●​ You have to spend a lot to get a real device
●​ It has a fast processing speed
●​ Network latency may be normal
●​ Debugging is not so easy
●​ Web applications can be tested in the usual way
●​ It always gives accurate results

Emulator / Emulation:

●​ It is almost free
●​ It is slower than real devices
●​ It has lower latency than actual devices
●​ It provides step-by-step debugging of the application
●​ Web applications are very easy to test
●​ It cannot simulate all types of user interactions; So it can sometimes
give wrong results.
●​ It scores low when it comes to reliability.

18. What features cannot we test on a simulator/emulator?

A simulator/emulator cannot mimic the following features –

●​ Mobile device battery


●​ Mobile device camera
●​ Interruptions such as incoming calls and SMS
●​ Not so realistic simulation for mobile device memory usage.

19. What is cloud-based mobile testing?


Testing mobile applications with cloud-based devices seems to be the optimal option.

This can help you overcome the disadvantages of real devices and simulators.

What are the benefits of using cloud-based devices?

1.​ Easy Availability


2.​ Ability to run mobile devices on multiple systems and networks
3.​ Not only does the cloud have the ability to test apps, but also the
ability to update and manage
4.​ effective cost
5.​ High scalability
6.​ The same script can be run on multiple devices in parallel.

20. What are the disadvantages of cloud-based devices?

●​ Less Control
●​ There is no high level of protection
●​ Internet connection dependency

Some useful cloud-based tools – Xamarin Test Cloud, Perfecto Mobile Continuous

Quality Laboratory, Core Mobile Testing.

21. What is an interruption test?

An application, while working, may face many interruptions such as incoming calls or

network coverage outages and recovery. For this, it can be distinguished again –

●​ Incoming and outgoing SMS and MMS


●​ Incoming and outgoing calls
●​ Incoming notifications
●​ Battery drain
●​ Cable Entry and Removal for Data Transfer

22. What is a usability test?

Usability testing evaluates the application based on the following criteria for the

efficiency of the target audience.:

1.​ Effectiveness
2.​ Satisfaction

It is very important to get usability testing in place from the initial stage of application

design, and this should not be done only when the application is completed. Usability

testing requires excessive involvement of users, and output can affect application

design, which is very difficult to change in later stages of the project.

23. What are installation tests and uninstall tests?

Installation testing verifies that the installation process goes smoothly without the user

experiencing any difficulty. The uninstall test can be summarized in one line because

“uninstalling should sweep the app-related data only once”.

24. What is an update test?

We need to be very cautious about mobile app updates. People often complain about

applications not working satisfactorily after an update. Therefore, it is very important that

under update testing, we ensure that the app was working before. In short, it should not
break anything. Mobile application updates can occur in two ways – automatic update

and manual update.

25. What is a certification test?

To obtain a certificate of compliance, each mobile device needs to be tested against the

guidelines set by various mobile platforms.

26. What is a UI test?

In this type of testing, we check the user experience to ensure that we provide an

excellent experience to our users, mobile UI testing is highly recommended.

It is your job as a tester to confirm that your application meets certain expectations,

such as –

●​ Overall color scheme/theme of the device


●​ Style and color of the mouse
●​ The progress indicator on page loading
●​ Menus and how they are implemented and are specific items
●​ The overall response of applications on this device
●​ Screen orientation / resolution.

27. What are the different types of UI verification tools?

Browserstack:
This is another great tool for testing the mobile UI. It provides amazing results. Although

it is a payment tool, you can take advantage of the free trial by registering on

BrowserStack with a valid email address.

30. What is test planning?

Preparing to test mobile devices.

Methods and tools continue to be developed to facilitate usability testing on phones and

tablets. When planning a mobile device test, you should keep the following points in

mind-

●​ Your deadline and budget


●​ The physical setup of the space and how you are going
●​ Your target audience and device.

Another important aspect after test planning is test equipment management.

31. What is a device management tool?

MDM i.e. Mobile device management is a type of security software that is used in IT to

manage, monitor and secure employees’ mobile devices across multiple mobile

operating systems being used by many mobile service providers and in the

organization. Are posted.

MDM is usually combined with additional security services and devices such as mobile

application management to create complete mobile device and secure enterprise

mobility management solutions.


32. What are the hardware components of mobile devices?

If you take any cell phone, it will mostly contain the following parts:

●​ Circuit board / CPU


●​ Touch screen display
●​ Memory card
●​ Sim Card
●​ The battery

34. What are the other ways to test mobile devices?

Some tests are available as apps for both iOS and Android platforms. To use them you

have to download the desired app. Then follow the instructions to run the exam and

save your result.

Test speed equipment

Speed ​Test SpeedSmart WiFi and Mobile Network SpeedTest – It is compatible with

Apple iPhone and iPad. It is a paid application. SpeedSmart is the ultimate iOS speed

test utility to evaluate your cellular (3G, 4G, and LTE) and Wi-Fi connections on all your

iOS devices. A smart speed test and a global server network method ensure accurate

results.

37. Mention what should be the selection criteria for test


automation tools for mobile testing?

1.​ Multi-platform support


2.​ Script utility
3.​ Need to run
4.​ Source code changes
5.​ Lead time for new OS version

38. When do you choose automation testing manual


testing?

Manual Testing

1.​ If the application has new functionality


2.​ If the application requires testing once or twice

Automated testing

1.​ If the regression test is repeated


2.​ A test app for complex scenarios

40. Tell us what is involved in mobile security testing?

Mobile security tests include:

1.​ Check for multi-user support between them without interfering with
the data
2.​ Check access to files stored in the app by any unexpected users
3.​ Encryption or encryption method used for sensitive data
communication
4.​ Find sensitive areas in the tested application so that they do not
receive any malicious content
45. What features should you have in a mobile application?

All of them have some quite necessary features. This includes:

●​ Reliability
●​ Compatibility with other technologies
●​ Scalability
●​ Fragrance
●​ Mode of operation
●​ Open-source technology
●​ Wide adaptability
●​ Fast operation

46. What are the tests normally performed in standard


Android strategy?

These are integration testing, unit testing, system testing, and operations testing. There

is also another test based on the usage and features of the mobile application which is

usually done in this environment.

47. What do you mean by the word compatibility and


compatibility test?

There is widespread use and scope of the term compatibility when it comes to

application testing. It simply means the ability to survive together with something similar.

Compatibility testing is quite common and is a type of test that assures the ability of an

application to run on different operating systems, platforms, networks as well as

hardware. It is also considered non-functional testing.


49. Encountered issues with cross-platform testing?

Generally, the issue depends on different OS/device versions, it can do the same thing

while working on one OS, while it may not work on another version. For example, we

encountered a problem that our application was working fine on iOS 6.x version

devices, but some modules were exploited when the application crashed on iOS 5.x

devices and the same happened with 2.3.5

50. What are common bugs found during the mobile testing
process?

In general, some mobile testers classify the most frequently found insects into four

types:

Critical bug: The operating system of the device crashes while testing a particular

feature of the application.

Block bug: Non-equalization of the display occurs even when the state of the device is

still on.

Major bug: A distinguishing feature of the application is its inability to demonstrate its

functionality.

Minor bugs: GUI bugs are usually the main case of falling into a minor bug list.

Additionally, some other types of bugs are also found during the mobile application

testing process, for example:


●​ Slow performance of an application
●​ Battery consumption by an application
●​ Completely unresponsive behavior of an application

51. When should the QA team choose manual tests or


automation tests for their mobile testing projects?

Automation testing has greatly increased the speed and quality of testers over the past

decades. Understanding when to make such a transition is the first step to maximize the

efficiency of your team, from manual testing to automated testing. For a comprehensive

guideline, see the article A Complete Guide to Choosing Test Cases for Automation.

Here are some key points:

Manual test

The application has new functionality.

The application requires testing once or twice.

Automated testing

Release cycle regression requires a large amount of testing.

The test application requires complex scenarios.

56. How do you test CPU usage on mobile?


To test CPU usage on mobile, I will use advanced applications like CPU Monitor,

CPU-Z, CPU Statistics, etc. as they can record all the details about the processes

running on mobile devices.

60. How can you do A/B testing on the iOS application?

A/B testing on iOS app can be done using the following 4 steps:

Configuration: Create 2 versions of the iOS app, namely A and B.

Define Success Metrics: Identify the objectives and metrics against which app

success will be measured.

Execution: Test both versions simultaneously.

Analysis: Evaluate and identify a better version to issue.

61. What is the extension of Android and iOS application


files?

The Android file is .apk - android package kit, extended and an iOS file is .ipa. iOS app

store package

66. How do you tell an app crash to a developer?


Interviewers ask this mobile test interview question to understand your method of

communicating with developers in case of discrepancies.

67. Can you name 2 apps for each Android and iOS to
record the crash log?

To record the crash log, you can use Android Studio and Eclipse for Android devices

and the iOS logo and Xcode iOS devices.

68. What do you know about mobile API testing?

The API stands for Application Programming Interface.

Mobile API testing assesses a set of APIs to analyze its performance, performance, and

security to determine if it matches the set expectations.

API Testing-

API error code:

200 - OK/Success

201- Created

204- Success but no response and deny to send the response

400- ​BAd request- when invalid request sent


401- Unauthorised

403- Forbidden , not having proper permission

404- Not found

500- Internal server error- Server is down

502 - Bad gateway

●​ GET an entity corresponding to the requested resource is sent in


the response;

How you will ensure the security using API testing-

I will just try to insert the data and the invalid format like, get payload
and all, there should be proper authentication error should I receive.

Also there is one team already working on all application to check the
security compliance.

UNION ALL SELECT


NULL,concat(schema_name),NULL,NULL FROM
information_schema.schemata#
What is mean by paramenterization and how will use it

How will you handle the status code and erode handling
in api testing.

How will you handle the pagination and rate limiting in


API testing

What is authentication and authorization in API testing.

You might also like