Mindtree Testing questions for experienced 11th june 2005 

What is command to know the IP and MAC address of your machine in windows platform?
a) ifconfig b)Ipconfig/all c)ping d) All the above

MTFS, CDFS, EXT3, FAT32, and EXT2, which of the below are the windows file system?
a) FAT32 and EXT3 b)EXT3 c) NTFS and FAT32 d) CDFS and EXT2

The completion and base lining of the users manual and installation instructions should be an entry criteria into which of the following phase gate reviews.
a) Critical design review b) System test readiness review c) Ready to ship review d) Post project review

The product quality risk from testing point of view is highest when the system under test is a
a) Standalone b) Distributed System c) Client and server d) None of the above

Http is based on  which underline protocal
a) TCP b) SNMP c) FTP d) IP

When can you say that performance of your application is high.
a) High through put low latency b) Low through put high latency c) High through put High latency d) Low through put low latency

Which is the last/terminate state of a bug?
a) Re-open b) Defered c) Enhanced d) None of the above

Which of the following is a testing technique?
a) White box b) System testing c) unit testing d) Regression

How can you force the client to give up the dhcp lease if you have access to the client PC?
a) ipconfig/release b) ipconfig/renew c) ipconfig/delete d) ipconfig/new

Testing of Non-Functional requirements does not involove
a) Performance tests b) Reliability tests c) usability tests d) Configuration tests

DNS is used to
a) MAP IP address to machine names b) MAP IP address to MAC address c) MAP IP address to domain names d) None of the above

Based on risk exposure, which of the following risks would have the highest priority?
a) Risk A that has a 25% probability of a problem occuring that would cost $30,000
b) Risk B that has a 15% probability of a problem occuring that would cost $400,000
c) Risk C that has a 25% probability of a problem occuring that would cost $180,000
d) Risk D that has a 25% probability of a problem occuring that would cost $250,000

When a varaible is deleted using "my" in perl, then
a) It can be accessed only within the block it is declared
b) It can be accessed outside the block it is declared
c) It is visible in routines called from the block in which it is declared
d)  It can be accessed globally across the program

what is the output of this perl statement
      print join(':',split(/*/,'hi there'));
a) h:i:t:h:e:r:e
b) h:i: t:h:e:r:e
c) :h:i:t:h:e:r:e
d) h:i: :t:h:e:r:e

Which of these is reliable protocal?
a) UDP b) SNMP c) FTP d) TCP

Showing Answers 1 - 2 of 2 Answers

Hello friends,

Hope you all are doing great!

This happens to be my first chit on this powerful forum. Let's get down to business:

-----------------------------------------------------------

1. What is command to know the IP and MAC address of your machine in windows platform?
a) ifconfig b)Ipconfig/all c)ping d) All the above

Answer:  b) ipconfig/all

This will display you the details of various ips relevant to your workstation/laptop. Sample output of ipconfig/all would look as below:

Windows IP Configuration

        Host Name . . . . . . . . . . . . : byadwad
        Primary Dns Suffix  . . . . . . . : abc.com
        Node Type . . . . . . . . . . . . : Hybrid
        IP Routing Enabled. . . . . . . . : No
        WINS Proxy Enabled. . . . . . . . : No
        DNS Suffix Search List. . . . . . : xyz.com
         abc.com
         mno.com

Ethernet adapter Local Area Connection:

        Connection-specific DNS Suffix  . : dns.com
        Description . . . . . . . . . . . : 3Com 3C920 Integrated Fast Ethernet
Controller (3C905C-TX Compatible)
        Physical Address. . . . . . . . . : 00-06-5B-7C-BF-66 (This is ur MAC address (64 bit))
        Dhcp Enabled. . . . . . . . . . . : Yes
        Autoconfiguration Enabled . . . . : Yes
        IP Address. . . . . . . . . . . . : 192.138.230.162
        Subnet Mask . . . . . . . . . . . : 255.235.255.0
        Default Gateway . . . . . . . . . : 192.18.230.1
        DHCP Server . . . . . . . . . . . : 192.158.231.22
        DNS Servers . . . . . . . . . . . : 192.158.231.22
                                            192.168.231.21
                                            192.188.231.23
        Primary WINS Server . . . . . . . : 192.178.231.21
        Secondary WINS Server . . . . . . : 192.168.23.22
                                            192.148.231.23
        Lease Obtained. . . . . . . . . . : Tuesday, April 11, 2006 3:07:19 AM
        Lease Expires . . . . . . . . . . : Wednesday, April 19, 2006 3:07:19 AM

2. MTFS, CDFS, EXT3, FAT32, and EXT2, which of the below are the windows file system?
a) FAT32 and EXT3 b)EXT3 c) NTFS and FAT32 d) CDFS and EXT2

Answer: c) NTFS and FAT32

3. The completion and base lining of the users manual and installation instructions should be an entry criteria into which of the following phase gate reviews.
a) Critical design review b) System test readiness review c) Ready to ship review d) Post project review

Answer: c) Ready to ship review (I guess it)

4. The product quality risk from testing point of view is highest when the system under test is a
a) Standalone b) Distributed System c) Client and server d) None of the above

Answer: b (I guess)

5. Http is based on  which underline protocal
a) TCP b) SNMP c) FTP d) IP
Answer: a) TCP

6. When can you say that performance of your application is high.
a) High through put low latency b) Low through put high latency c) High through put High latency d) Low through put low latency
Answer: a

7. Which is the last/terminate state of a bug?
a) Re-open b) Defered c) Enhanced d) None of the above
Answer: d       It should be in "Closed" state.

8. Which of the following is a testing technique?
a) White box b) System testing c) unit testing d) Regression
Answer : a) White box [Rest all are the levels of testing]

9. How can you force the client to give up the dhcp lease if you have access to the client PC?
a) ipconfig/release b) ipconfig/renew c) ipconfig/delete d) ipconfig/new

Answer : c

10. Testing of Non-Functional requirements does not involove
a) Performance tests b) Reliability tests c) usability tests d) Configuration tests
Answer : d

11. DNS is used to
a) MAP IP address to machine names b) MAP IP address to MAC address c) MAP IP address to domain names d) None of the above

Answer : d   Domain Name System (or Service or Server), an Internet service that translates domain names into IP addresses

12. Based on risk exposure, which of the following risks would have the highest priority?
a) Risk A that has a 25% probability of a problem occuring that would cost $30,000
b) Risk B that has a 15% probability of a problem occuring that would cost $400,000
c) Risk C that has a 25% probability of a problem occuring that would cost $180,000
d) Risk D that has a 25% probability of a problem occuring that would cost $250,000

Answer: Not sure

13. When a varaible is declared using "my" in perl, then
a) It can be accessed only within the block it is declared
b) It can be accessed outside the block it is declared
c) It is visible in routines called from the block in which it is declared
d)  It can be accessed globally across the program
Anwer : a


14. what is the output of this perl statement
      print join(':',split(/*/,'hi there'));
a) h:i:t:h:e:r:e
b) h:i: t:h:e:r:e
c) :h:i:t:h:e:r:e
d) h:i: :t:h:e:r:e

Answer: Not sure

Output on my system (Linux RH 9):

Quantifier follows nothing in regex; marked by <-- HERE in m/* <-- HERE / at test.pl line 2.

15. Which of these is reliable protocal?
a) UDP b) SNMP c) FTP d) TCP

Answer: c and d
More info : http://www.erg.abdn.ac.uk/users/gorry/course/inet-pages/tcp.html

  Was this answer useful?  Yes

sjena

  • Apr 24th, 2006
 

Question: Mindtree Testing questions for experienced 11th june 2005 

1.        What is command to know the IP and MAC address of your machine in windows platform?
a) ifconfig b)Ipconfig/all c)ping d) All the above
1


Answer: b

2.         MTFS, CDFS, EXT3, FAT32, and EXT2, which of the below are the windows file system?
a) FAT32 and EXT3 b)EXT3 c) NTFS and FAT32 d) CDFS and EXT2

        Answer: c

 

3.         The completion and base lining of the users manual and installation instructions should be an entry criteria into which of the following phase gate reviews.
a) Critical design review b) System test readiness review c) Ready to ship review d) Post project review
Answer:c

4.         The product quality risk from testing point of view is highest when the system under test is a
a) Standalone b) Distributed System c) Client and server d) None of the above

Answer: b

5.         Http is based on  which underline protocal
a) TCP b) SNMP c) FTP d) IP

Answer: a

6.         When can you say that performance of your application is high.
a) High through put low latency b) Low through put high latency c) High through put High latency d) Low through put low latency

Answer: a

7.         Which is the last/terminate state of a bug?
a) Re-open b) Defered c) Enhanced d) None of the above

Answer: d

8.         Which of the following is a testing technique?
a) White box b) System testing c) unit testing d) Regression

Answer: a

9.         How can you force the client to give up the dhcp lease if you have access to the client PC?
a) ipconfig/release b) ipconfig/renew c) ipconfig/delete d) ipconfig/new

Answer: a

10.     Testing of Non-Functional requirements does not involove
a) Performance tests b) Reliability tests c) usability tests d) Configuration tests

        Answer: b

11.     DNS is used to
a) MAP IP address to machine names b) MAP IP address to MAC address c) MAP IP address to domain names d) None of the above

Answer: d

12.     Based on risk exposure, which of the following risks would have the highest priority?
a) Risk A that has a 25% probability of a problem occuring that would cost $30,000
b) Risk B that has a 15% probability of a problem occuring that would cost $400,000
c) Risk C that has a 25% probability of a problem occuring that would cost $180,000
d) Risk D that has a 25% probability of a problem occuring that would cost $250,000

    Answer: d

13.     When a varaible is deleted using "my" in perl, then
a) It can be accessed only within the block it is declared
b) It can be accessed outside the block it is declared
c) It is visible in routines called from the block in which it is declared
d)  It can be accessed globally across the program

Answer: a

14.     what is the output of this perl statement
      print join(':',split(/*/,'hi there'));
a) h:i:t:h:e:r:e
b) h:i: t:h:e:r:e
c) :h:i:t:h:e:r:e
d) h:i: :t:h:e:r:e

       Answer: I think the question is not correct. Syntax is not correct /*/


 

15.     Which of these is reliable protocal?
a) UDP b) SNMP c) FTP d) TCP

     Answer: d

  Was this answer useful?  Yes

Give your answer:

If you think the above answer is not correct, Please select a reason and add your answer below.

 

Related Answered Questions

 

Related Open Questions