by testcase how to achieve 100% branch coverage for the
following code.
Read P
Read Q
Print "P"
Print "Q"

Answers were Sorted based on User's Feedback



by testcase how to achieve 100% branch coverage for the following code. Read P Read Q Print &quo..

Answer / khan

Using Requirement tracability Matrix

Is This Answer Correct ?    3 Yes 0 No

by testcase how to achieve 100% branch coverage for the following code. Read P Read Q Print &quo..

Answer / praveen

by giving any 2 values that are p and q as per the
requirements,then we will achieving the 100 percent branch
coverage

Is This Answer Correct ?    0 Yes 1 No

Post New Answer

More Manual Testing Interview Questions

Explain BVA and ECP?

5 Answers   Logica CMG,


hai friends i completed my degre(b.com)through distance i have no inter(+2) right know iam doing mca from distance education can i elgible for software in testing process

1 Answers  


how to know testing of application is finished? because i have a situation from my lead what u r testing u r missing some bugs?

7 Answers  


How we prepare the Requirement Traceability Matrix(RTM). Write the format please.

2 Answers  


1. fault based testing is reversed of which testing? option.1 conventional software testing Option 2Operations and classes that are critical or suspect Option 3 Use-case validation Option 4White-box testing of operator algorithms 2. Testing OO class operations is made more difficult by Option 1 Encapsulation Option 2 Inheritance Option 3 Polymorphism Option 4 Both Inheritance and Polymorphism 3. Which of these techniques is not useful for partition testing at the class level Option 1 attribute-based partitioning Option 2 category-based partitioning Option 3 equivalence class partitioning Option 4 state-based partitioning 4.Client/server architectures cannot be properly tested because network load is highly variable. Option 1 true Option 2 false 5. Real-time applications add a new and potentially difficult element to the testing mix Option 1 performance Option 2 reliability Option 3 security Option 4 time 6.Which one is not key term used in internal control and security Option 1 Threat Option 2 Risk Control Option 3 Vulnerability Option 4 Exposure 7.Acceptance testing occurs only at the end point of the development process; it should be an ongoing activity that test both interim and final products. Option 1 true Option 2 false 8.Static testing requires...? Option 1 Binaries Option 2 Source code Option 3 Product Option 4 Executables 9.etesting is testing the application with multiple sets of data is called retesting Option 1 true Option 2 false

2 Answers   Infosys,


The degree to which the software LOC of a program has been tested is called A.Data flow testing B.Code coverage C.Code walk through D.Statement coverage

1 Answers   ADITI,


What is risk analysis?

2 Answers  


Based on how do we classify the bug as Major ,critical ,minor ,low ,medium ,high Severity and priority with examples ?plzzzzzzzzzz...

1 Answers   Infotech,


Write a set of test cases to test youtube?

0 Answers  


How you will report a bug if u r doing adhoc testing..u are hopping from 1 link to 2nd...so on till 100th link and then there is bug..how will u report this bug...will you write all 100 steps?

3 Answers   Fiserv,


Is compatabilitytestig and port testing are same

0 Answers  


difference between regression testing and re testing?

14 Answers   Bizpivot, CTS,


Categories