Dw Basics + Unix + Testing

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By AkshayMishra
A
AkshayMishra
Community Contributor
Quizzes Created: 1 | Total Attempts: 5,066
| Attempts: 5,066 | Questions: 200
Please wait...
Question 1 / 200
0 %
0/100
Score 0/100
1. Stratification is a Technique used to analyze/divide a universe of data into homogeneous groups(strata).Stratification is a Technique used to analyze/divide a universe of data into homogeneous groups(strata).

Explanation

Stratification is indeed a technique used to analyze and divide a universe of data into homogeneous groups or strata. This technique helps in organizing and understanding data by grouping similar data points together, which can then be analyzed separately. By dividing the data into strata, researchers can gain more accurate insights and make more informed decisions based on the characteristics of each group. Therefore, the statement "Stratification is a technique used to analyze/divide a universe of data into homogeneous groups (strata)" is true.

Submit
Please wait...
About This Quiz
Quality Assurance Quizzes & Trivia

This quiz covers key concepts in software testing and quality assurance, including traceability, verification, validation, and control charts. It assesses understanding of dynamic and static testing processes and... see morethe importance of development plans in project management. see less

2. Software Testing is a process of evaluating a system by manual or automatic means and verify that it satisfies specified requirements or identity differences between expected and actual results.

Explanation

Software testing is indeed a process of evaluating a system, whether it is done manually or automatically, to ensure that it meets the specified requirements. The purpose of software testing is to identify any differences between the expected results and the actual results. Therefore, the statement "Software Testing is a process of evaluating a system by manual or automatic means and verify that it satisfies specified requirements or identity differences between expected and actual results" is true.

Submit
3. Configuration Management Plan describes the Configuration Management procedures and structures to be used.

Explanation

The Configuration Management Plan is a document that outlines the procedures and structures to be followed for managing configurations. It provides a roadmap for managing changes, version control, and tracking of configuration items. Therefore, it is true that the Configuration Management Plan describes the Configuration Management procedures and structures to be used.

Submit
4. Path Tested = Number of Path Tested / Total Number of Paths

Explanation

The statement "Path Tested = Number of Path Tested / Total Number of Paths" is true. This equation represents a formula for calculating the proportion of paths that have been tested out of the total number of paths. By dividing the number of paths tested by the total number of paths, we can determine the percentage or fraction of paths that have been tested. Therefore, the correct answer is true.

Submit
5. Maintenance Plan predicts the maintenance requirements of the system, maintenance costs and effort required

Explanation

A maintenance plan is a strategic approach that outlines the predicted maintenance requirements of a system, including the costs and effort that will be required to perform the necessary maintenance tasks. It helps in scheduling and budgeting for maintenance activities, ensuring that the system remains in optimal working condition and minimizing any potential downtime or failures. Therefore, the statement "Maintenance Plan predicts the maintenance requirements of the system, maintenance costs and effort required" is true.

Submit
6. Validation plan describes the approach ,resources and schedule used for system validation

Explanation

The given statement is true. A validation plan outlines the strategy, resources, and timeline for validating a system. It provides a roadmap for conducting validation activities, such as testing, reviewing documentation, and ensuring that the system meets the specified requirements. By having a validation plan in place, organizations can ensure that the system is thoroughly tested and validated before it is implemented, reducing the risk of errors or failures.

Submit
7. Types of quality tools are Problem Identification Tools and Problem Analysis Tools.

Explanation

The statement is true because quality tools can be categorized into two main types: problem identification tools and problem analysis tools. Problem identification tools help in identifying and understanding the issues or problems that exist in a process or system. These tools include techniques like brainstorming, checklists, and flowcharts. On the other hand, problem analysis tools are used to analyze and investigate the root causes of the identified problems. These tools include tools like cause and effect diagrams, Pareto charts, and scatter diagrams. Therefore, the given statement is correct.

Submit
8. Quality plan describes the quality procedures and standards that will be used in a project.

Explanation

The quality plan is a document that outlines the specific quality procedures and standards that will be implemented in a project. It serves as a guide for ensuring that the project meets the desired level of quality. By describing the procedures and standards, the quality plan helps to ensure that all team members are aware of the expectations and can work towards achieving the desired quality outcomes. Therefore, the statement "Quality plan describes the quality procedures and standards that will be used in a project" is true.

Submit
9. Cost of quality Prevention Cost + Appraisal cost + Failure cost

Explanation

The given statement is true. The cost of quality is indeed calculated by adding the prevention cost, appraisal cost, and failure cost. Prevention cost refers to the expenses incurred to prevent defects or errors from occurring. Appraisal cost includes the expenses associated with evaluating, inspecting, or testing products or services to ensure they meet quality standards. Failure cost represents the expenses incurred due to defects or errors, such as warranty claims, rework, or customer dissatisfaction. By considering all these costs, organizations can assess the overall cost of maintaining or improving quality.

Submit
10. Control Charts is a statistical technique to assess, monitor, and maintain the stability of a process.

Explanation

Control Charts are indeed a statistical technique used to assess, monitor, and maintain the stability of a process. They provide a visual representation of data over time, allowing for the identification of any patterns, trends, or variations that may occur. By using control charts, organizations can determine if a process is in control or out of control, enabling them to make informed decisions and take appropriate actions to maintain process stability.

Submit
11. Product Risk affects The quality or performance of the software

Explanation

Product risk refers to the potential issues or problems that may arise with the software product during its development or use. These risks can have a direct impact on the quality or performance of the software. By identifying and managing these risks, developers can ensure that the software meets the required standards and functions effectively. Therefore, it is true that product risk can affect the quality or performance of the software.

Submit
12. Staff development plan describes how the skills and experience of the project team members will be developed.

Explanation

A staff development plan is a strategic document that outlines how an organization will enhance the skills and knowledge of its employees. In the context of a project team, a staff development plan would detail how the team members' skills and experience will be improved throughout the project. This can include training programs, workshops, mentoring, and other initiatives aimed at developing the team's capabilities. Therefore, the statement that a staff development plan describes how the skills and experience of the project team members will be developed is true.

Submit
13. Splitting project into tasks and estimate time and resources required to complete each task called as Project Scheduling

Explanation

Project scheduling involves breaking down a project into smaller tasks and determining the time and resources needed to complete each task. This process helps in organizing and planning the project timeline, assigning responsibilities, and ensuring efficient utilization of resources. Therefore, the given statement is true.

Submit
14. Earlier a defect is found the cheaper it is to fix it.

Explanation

Finding a defect earlier allows for quicker identification and resolution, which ultimately reduces the cost of fixing it. When a defect is detected early in the development process, it requires less effort and resources to rectify, as it hasn't had the chance to propagate and impact other parts of the system. Additionally, early detection minimizes the potential for customer dissatisfaction or negative consequences that could arise from a defect going unnoticed. Therefore, finding defects early is beneficial in terms of cost and overall project efficiency.

Submit
15. Requirement and Analysis, Design, Development or Coding, Testing and Maintenance is called as Software Development Life Cycle (SDLC )

Explanation

The statement is true because the process of software development involves several stages, including requirement analysis, design, development or coding, testing, and maintenance. These stages are collectively known as the Software Development Life Cycle (SDLC). The SDLC provides a structured approach to developing software, ensuring that all necessary steps are followed and that the final product meets the required specifications and quality standards.

Submit
16. Application should be stable. Clear Design and Flow of the application is needed for Automation testing

Explanation

The given statement is true because in order for automation testing to be effective, it is important that the application being tested is stable. If the application is unstable or has bugs, it can lead to inaccurate test results and unreliable automation scripts. Additionally, a clear design and flow of the application is necessary for automation testing as it helps in identifying test scenarios, creating test scripts, and executing them efficiently. Without a clear design and flow, it can be difficult to automate the testing process effectively.

Submit
17. Check Sheet(Checklist) is considered a simple , but powerful statistical tool because it differentiates between two extremes

Explanation

Check Sheet, also known as a Checklist, is considered a simple yet powerful statistical tool because it helps differentiate between two extremes. It allows for the systematic collection and organization of data, enabling easy identification of patterns, trends, and variations. By using a Check Sheet, individuals can track and record information, facilitating the identification of problems, areas for improvement, and potential solutions. This tool promotes data-driven decision-making and enhances process efficiency, making it a valuable asset in various industries and problem-solving scenarios.

Submit
18. Project Risk affects The Schedule or Resources.

Explanation

Project risk refers to the potential uncertainties or events that can impact the successful completion of a project. These risks can have various consequences, including affecting the project schedule or resources. This means that if a risk materializes, it can lead to delays in the project timeline or result in the need for additional resources to address the issue. Therefore, it is accurate to say that project risk can indeed affect the schedule or resources.

Submit
19. Cost of Production = Right The First time cost(RTF) + Cost of Quality

Explanation

The given statement is true. The cost of production is determined by the sum of two factors: the cost of producing a product or service correctly the first time (RTF) and the cost of maintaining quality. This means that in order to calculate the total cost of production, both the initial cost of producing the product correctly and the ongoing cost of ensuring its quality must be considered. Therefore, the statement is correct.

Submit
20. Control charts is a statistical technique control,monitor the stability

Explanation

Control charts are indeed a statistical technique used to monitor the stability and control of a process. These charts help in identifying any variation or deviation from the expected performance of a process. By plotting data points on a control chart, it becomes easier to analyze the patterns and trends, and make informed decisions regarding process improvement or corrective actions. Therefore, the statement "Control charts is a statistical technique control, monitor the stability" is true.

Submit
21. The syntax 'head -c 5 f2.txt' is correct.

Explanation

The given syntax 'head -c 5 f2.txt' is correct. The 'head' command is used to display the first few lines of a file, and the '-c' option is used to specify the number of bytes to be displayed. In this case, it will display the first 5 bytes of the file 'f2.txt'. Therefore, the answer is true.

Submit
22. . which of the following is used to compare ?

Explanation

The correct answer is "cmp". "cmp" is commonly used in programming languages to compare two values. It compares the values and returns a result indicating whether the first value is greater than, less than, or equal to the second value. This comparison is useful for making decisions and controlling the flow of a program based on the comparison result.

Submit
23. Inode :

Explanation

The correct answer is "File owner identifier" because an inode is a data structure in a Unix-like file system that stores metadata about a file, including information about the file's owner. The inode contains the user ID of the file's owner, which serves as an identifier for the owner of the file.

Submit
24. Data warehousing and on-line analytical processing (OLAP) are _______ elements of decision support system. 

Explanation

Data warehousing and on-line analytical processing (OLAP) are essential elements of a decision support system. This is because data warehousing involves the collection, organization, and storage of large amounts of data from various sources, which is crucial for making informed decisions. OLAP, on the other hand, allows users to analyze this data through multidimensional views and complex queries, providing valuable insights for decision-making processes. Without these components, a decision support system would lack the necessary data and analytical capabilities to effectively support decision-making.

Submit
25. The process of removing the deficiencies and loopholes in the data is called as 

Explanation

Cleaning up of data refers to the process of removing any errors, inconsistencies, or inaccuracies in the data. This includes identifying and correcting missing or duplicate data, standardizing formats, and resolving any discrepancies. By cleaning up the data, it ensures that the data is accurate, reliable, and ready for analysis or use in decision-making processes.

Submit
26. . Which of the following views can you use to display reports

Explanation

The correct answer is Grid and graph because these views allow the user to display reports in a visual and organized manner. The Grid view presents the data in a tabular format, making it easy to compare and analyze different values. On the other hand, the Graph view uses visual representations such as charts and graphs to present the data, making it easier to identify trends and patterns. By using both Grid and graph views, users can have a comprehensive view of the report data and make informed decisions based on the information presented.

Submit
27.
Defects generally fall into the following categories?
 

Explanation

The correct answer is "All" because defects generally fall into all of the mentioned categories, which include extra, missing, and wrong. These categories cover a wide range of possible defects that can occur in various contexts, such as manufacturing, software development, or quality control. By categorizing defects into these groups, it becomes easier to identify and address specific issues, ensuring that products or processes meet the desired standards and specifications.

Submit
28. Why unix access I/O? 

Explanation

Unix allows access to I/O (input/output) operations for various reasons. It provides the ability to create files, which is essential for storing data and information. Unix also allows users to open files, enabling them to read and write data to these files. Additionally, Unix allows users to change the properties of files, such as permissions and ownership, providing control and security over the file system. Therefore, Unix supports all of these operations to facilitate efficient and effective management of files and data.

Submit
29. Why inode is used? 

Explanation

Inode is used to store the fileowner identifier. This identifier helps in determining the owner of the file, which can be useful for access control and permission management. The inode contains metadata information about the file, including the owner's user ID. This allows the operating system to enforce file permissions and restrict access to certain files based on the fileowner identifier.

Submit
30. Business Risk affects The Organization developing or Procuring the software.

Explanation

Business risk refers to the potential negative impact that external factors can have on a company's financial performance or ability to achieve its objectives. In the context of software development or procurement, business risk can arise from various factors such as market demand, competition, regulatory changes, and economic conditions. These risks can directly affect the organization by impacting its revenue, profitability, market share, or reputation. Therefore, it is true that business risk can affect the organization developing or procuring the software.

Submit
31.
Software testing which is done without planning and Documentation is known as
 
 

Explanation

AdHoc testing refers to a type of software testing that is performed without any formal planning or documentation. It involves randomly testing the system without following any specific test cases or scripts. This type of testing is usually carried out when there is limited time or resources available, or when there is a need to quickly identify defects or issues in the software. AdHoc testing is not systematic and may not cover all possible scenarios, but it can be effective in finding certain types of defects that may not be identified through formal testing methods.

Submit
32. Which of the following statements about prompts is true?  

Explanation

A prompt may have a default answer already selected when you first view it. This means that when you encounter a prompt, there is a possibility that it already has a pre-selected answer. This can be helpful as it saves time and effort for the user, as they can simply accept the default answer if it is suitable for their needs. However, it is important to note that not all prompts have default answers and it may vary depending on the specific prompt or situation.

Submit
33. Which of the following statements about prompts is true? 

Explanation

A prompt may have a default answer already selected when you first view it. This means that when you are presented with a prompt, there might already be a pre-selected answer in place. This can be useful in situations where a default value is commonly chosen by users, saving them time and effort. However, it is important to note that not all prompts have default answers, as it depends on the specific context and purpose of the prompt.

Submit
34. Testing is done to  

Explanation

The explanation for the given correct answer is that testing is done to ensure that all requirements are met and to build confidence about the program. Testing helps in verifying that the program functions as intended and meets the specified requirements. It helps in identifying any defects or errors in the program and ensures that it is working correctly. Additionally, testing also helps in building confidence among the stakeholders that the program is reliable and performs as expected.

Submit
35. What are the types of charts ? 

Explanation

The given answer lists different types of charts, including the Gantt chart, bar chart, pie chart, area chart, and line chart. These are all commonly used graphical representations of data in various fields. The Gantt chart is used for project management, the bar chart displays data using rectangular bars, the pie chart represents data as a circle divided into sectors, the area chart displays data as areas under a line, and the line chart shows data as a series of points connected by lines. These different types of charts are used to visually communicate and analyze data in a clear and concise manner.

Submit
36. Technology not suited for data mining?

Explanation

The correct answer is "Technology limited to specific data types such as numeric data type." This means that the technology being referred to is not capable of handling data types other than numeric data. It is designed specifically for numeric data and cannot be used for data mining tasks that involve other types of data such as text or categorical data.

Submit
37. What are the types of charts ? , 

Explanation

The types of charts mentioned in the answer are commonly used in data visualization. A Gantt chart is used to represent project schedules and timelines. A bar chart is used to compare different categories or groups. A pie chart is used to show the proportion of different parts to a whole. An area chart is used to display the change in values over time. A line chart is used to show the trend or relationship between data points over time.

Submit
38. What is multi dimensional data? 

Explanation

Multi-dimensional data refers to data that is organized and represented in multiple dimensions or axes. In this context, it means that multi-dimensional data takes up more disk space compared to other types of data. This is because multi-dimensional data requires additional storage to accommodate the extra dimensions and their corresponding values. The increased disk space is necessary to store the additional information and ensure efficient retrieval and analysis of the data.

Submit
39. What is multi demsional data

Explanation

Multi-dimensional data refers to data that is organized and stored in multiple dimensions or axes, allowing for complex analysis and insights. In this context, the correct answer is "It takes more disc space." This means that storing multi-dimensional data requires more disk space compared to other types of data. This is because multi-dimensional data includes additional dimensions and axes, resulting in a larger storage requirement.

Submit
40. Absence of a definite need for testing will lead to which of the following?

Explanation

If there is no clear need for testing, it can lead to various negative consequences. Loss of business can occur because without testing, products or services may not meet the required standards, leading to a loss of customers and potential revenue. Loss of valuable life can happen if testing is not conducted in areas such as healthcare or safety, where lives may be at risk due to faulty products or procedures. Additionally, without testing, there is a risk of financial loss as products may fail, leading to costly recalls or legal issues. Therefore, all of these consequences can result from the absence of a definite need for testing.

Submit
41. The following technology is not well-suited for data mining: 

Explanation

The technology limited to specific data types such as numeric data types is not well-suited for data mining because data mining involves analyzing and extracting patterns and insights from large and complex datasets that may contain various types of data, including text, images, and categorical data. Technology limited to specific data types would not be able to handle and process these diverse types of data effectively, limiting its usefulness in data mining tasks.

Submit
42. In a system,if 5 people are currently using the vieditor,then the no. of corresponding processes will be 

Explanation

The number of corresponding processes will be 5 because each person using the vieditor will have their own process running. Therefore, if there are 5 people currently using the vieditor, there will be 5 corresponding processes.

Submit
43. Expansion of CRM

Explanation

The correct answer is Customer Relationship Management. CRM stands for Customer Relationship Management, which is a strategy used by businesses to manage and analyze customer interactions and data throughout the customer lifecycle. It involves various techniques and technologies to improve customer satisfaction, retention, and loyalty. CRM helps businesses build strong relationships with their customers and enhance their overall experience, leading to increased sales and profitability.

Submit
44. Features of Shell Scripting

Explanation

The features of shell scripting include interactivity, input/output redirection, the ability to create script files, and the ability to run programs in the background. These features allow users to interact with the shell, redirect input and output to different sources, create reusable script files, and run programs without blocking the shell. Therefore, the correct answer is "All" as all of these features are part of shell scripting.

Submit
45. A spelling error on the user interface screen what severity does this issue deserve. 

Explanation

A spelling error on the user interface screen is considered to have low severity. While it may affect the user experience and create a negative impression, it does not impact the functionality or usability of the system. Spelling errors can be easily fixed and do not pose any significant risk or hinder the user's ability to use the interface effectively. Therefore, it is classified as a low severity issue.

Submit
46.
How severely the bug is effecting the application is called as
 

Explanation

Severity refers to how severe or critical the bug is and how much it impacts the application. It indicates the level of impact the bug has on the functionality of the application and the urgency to fix it. The severity helps prioritize the bugs and allocate resources accordingly.

Submit
47.
------------- means under what test environment(Hardware, software set up) the application will run smoothly
 
 

Explanation

The term "test bed" refers to the specific environment, including both hardware and software setup, in which the application is tested. It ensures that the application runs smoothly and efficiently. The other options listed in the question, such as checklist, code walkthrough, and checkpoint, do not specifically address the test environment setup. Therefore, "test bed" is the most appropriate answer.

Submit
48. Which of the following holds the data which does'nt belongs to either fact table or dimensional table? 

Explanation

Junk dimensions hold data that does not belong to either a fact table or a dimensional table. These dimensions are created to store attributes that do not fit into any existing dimension. Junk dimensions are typically used to consolidate low cardinality flags, indicators, or other miscellaneous attributes that are not related to the main dimensions of the data model. They help to simplify the data model and reduce the number of dimension tables required.

Submit
49. Defect report can be? 

Explanation

A defect report can be both non-judgmental and numeric. Non-judgmental means that the report should only state the facts about the defect without assigning blame or making subjective evaluations. Numeric means that the report may include quantitative information such as the severity or frequency of the defect. Therefore, a defect report can encompass both these characteristics, providing objective information about the defect without making any judgments and potentially including numerical data.

Submit
50. Types of Data mart?

Explanation

The correct answer is "All" because there are three types of data marts: dependent, independent, and hybrid. A dependent data mart relies on a centralized data warehouse for its data, while an independent data mart is a standalone database that is created specifically for a particular business function or department. A hybrid data mart combines elements of both dependent and independent data marts, allowing for a combination of centralized and decentralized data storage and processing. Therefore, the answer "All" encompasses all three types of data marts.

Submit
51. The advantage of Binary files over text files is that

Explanation

Binary files have several advantages over text files. Firstly, they are more reliable because they store data in a raw, binary format, eliminating any potential errors or inconsistencies that may occur when converting data to and from text. Additionally, binary files can be accessed faster since they require less processing power to read and write data compared to text files that need to parse and interpret characters. Lastly, binary files are compact, meaning they take up less storage space compared to text files as they do not require additional characters for formatting or human readability.

Submit
52.
A Non-Functional Software testing done to check if the user interface is easy to use and understand
 

Explanation

Usability testing is a non-functional software testing technique that focuses on evaluating the user interface to determine if it is easy to use and understand. It involves observing real users as they interact with the software to identify any usability issues, such as confusing navigation, unclear instructions, or difficult-to-use features. This type of testing helps ensure that the software meets the needs of its intended users and provides a positive user experience.

Submit
53. In which SDLC model testing can be done in parallel?

Explanation

In the V model of the software development life cycle (SDLC), testing can be done in parallel because it follows a sequential and structured approach. The V model emphasizes the importance of testing at every stage of development, starting from the requirements gathering phase to the deployment phase. This means that testing activities can be conducted simultaneously with the corresponding development activities, allowing for early detection and resolution of defects. The V model also promotes the involvement of testers and quality assurance professionals throughout the entire SDLC, ensuring thorough and comprehensive testing.

Submit
54.
White box testing is not called as___________
 

Explanation

White box testing is not called closed box testing because white box testing is a testing technique where the internal structure and implementation details of the software are known and used to design test cases. In white box testing, testers have access to the source code and use it to ensure that all paths and conditions within the code are tested. Closed box testing, on the other hand, refers to a testing approach where the internal structure and implementation details of the software are not known to the testers. Therefore, the correct answer is closed box testing.

Submit
55. Alpha testing will be done at,

Explanation

Alpha testing is a type of software testing that is performed at the developer's site. It is conducted by the development team or a dedicated testing team before the software is released to the end users. This testing phase helps to identify and fix any issues or bugs in the software before it is deployed for beta testing or released to the users.

Submit
56.
Conducted to validate that the application, database, and network they may be running on can handle projected volumes of users and data effectively. The test is conducted jointly by developers, testers, DBA's and network associates after the system Testing called as
 
 

Explanation

Stress/Load Testing is the correct answer because it is conducted to validate that the application, database, and network can handle projected volumes of users and data effectively. This test is conducted jointly by developers, testers, DBA's, and network associates after the system testing. Stress/Load Testing specifically focuses on testing the system's performance under high load or stress conditions, such as a large number of simultaneous users or a heavy volume of data. This helps identify any performance bottlenecks or issues that may arise when the system is under heavy stress or load.

Submit
57. Naturally Evolving architecture occurred when an organization had a _______ approach to handling the whole process of hardware and software architecture. 

Explanation

In a naturally evolving architecture, an organization takes a relaxed approach to handling the whole process of hardware and software architecture. This means that they are open to changes and adaptations as they occur, rather than rigidly adhering to a predetermined plan. This approach allows for flexibility and agility in responding to the evolving needs and requirements of the organization, ultimately leading to a more organic and efficient architecture.

Submit
58. Which of the below is directory?

Explanation

Among the given options, "/usr" is a directory. In Unix-like operating systems, "/usr" is a standard directory that contains user-related programs, libraries, documentation, and other resources. It is typically used for storing non-essential, shareable data that is not system-critical.

Submit
59.
A useful tool to visualize, clarify, link, identify, and classify possible cause of a problem. This is also called as "fishbone diagram" what is this?
 

Explanation

A cause-and-effect diagram, also known as a fishbone diagram, is a useful tool for visualizing and identifying possible causes of a problem. It helps to clarify and link different factors that may contribute to the issue at hand. By categorizing the causes into different branches, it allows for a systematic analysis and classification of the potential causes. This diagram is commonly used in problem-solving and quality improvement processes to identify the root cause of a problem and develop effective solutions.

Submit
60. How can we change permissions for all files located in unix122/samples giving all permissions to users, Read&execute permissions to groups,others…

Explanation

The correct answer is "chmod 755 ~/unix122/samples/*". This command will change the permissions for all files located in the "unix122/samples" directory. It will give read, write, and execute permissions to the owner (user), and read and execute permissions to the group and others. The asterisk (*) is used to apply the command to all files within the directory.

Submit
61. Bitwise operator used for

Explanation

Bitwise operators are used for performing operations at the bit level, manipulating individual bits of data. They can be used for numerical operations, such as bitwise AND, OR, XOR, and NOT, which perform logical operations on the individual bits of binary numbers. Bitwise operators can also be used for appending bits to a binary number, modifying file system permissions by setting or clearing specific bits, and performing other bit-level operations. Therefore, the correct answer is that bitwise operators can be used for all of these purposes.

Submit
62.
It is a set of levels that defines a testing maturity hieraecy
 

Explanation

The correct answer is TMM (Testing Maturity Model). The TMM is a set of levels that defines a testing maturity hierarchy. It is a framework that helps organizations assess and improve their testing processes and capabilities. The model consists of five levels, ranging from initial to optimized, with each level representing a higher level of maturity in testing practices. This allows organizations to identify their current level of maturity and take steps to improve their testing processes to achieve higher levels of maturity. TMM provides a roadmap for organizations to continuously improve their testing capabilities and deliver high-quality software products.

Submit
63. The default permission bits of file when it is created for the first time ,is controlled by

Explanation

The default permission bits of a file when it is created for the first time are controlled by the umask value. The umask value is a permission mask that determines which permissions are not granted by default when a new file is created. It is subtracted from the maximum permissions allowed for a new file, resulting in the default permission bits. So, the umask value plays a crucial role in determining the initial permissions of a newly created file.

Submit
64.
What are the Testing Levels?
 

Explanation

The given answer lists the different levels of testing. System testing is performed on a complete and integrated system to ensure that it meets the specified requirements. Acceptance testing is conducted to determine if the system meets the user's expectations and requirements. Integration testing is done to verify the interaction between different components/modules of the system. Unit testing is performed on individual units or components of the system to ensure their functionality and reliability.

Submit
65.
Standards and procedures for managing changes in an evolving software product is called?
 
 

Explanation

Configuration management refers to the standards and procedures used to manage changes in an evolving software product. It involves keeping track of software versions, documenting changes, and ensuring that all components of the software are properly configured and integrated. This helps maintain consistency and stability in the software product throughout its lifecycle.

Submit
66.
What is correct Software Process Cycle?
 

Explanation

The correct software process cycle is Plan(P)------>Do(D)------>Check(C)----->Act(A). This cycle is known as the PDCA cycle or the Deming cycle. It is a continuous improvement cycle that involves planning what needs to be done, executing the plan, checking the results, and then taking action based on the findings. This cycle allows for iterative and incremental improvements to the software development process.

Submit
67.
Which Software Development Life cycle model will require to start Testing Activities when starting development activities itself
 

Explanation

The V-model is a software development life cycle model that requires testing activities to start concurrently with development activities. In this model, the testing phase is integrated into each stage of the development process, ensuring that testing is performed at every step. This approach helps in identifying and fixing defects early in the development cycle, leading to higher software quality. Unlike other models such as the linear model, waterfall model, or spiral model, the V-model emphasizes the importance of testing from the beginning of the development process.

Submit
68.
Boundary value analysis belongs to which testing method?
 

Explanation

Boundary value analysis is a testing technique that focuses on testing the boundaries or limits of input values. It involves selecting test cases that lie on or near the boundaries of input domains to ensure that the system handles these values correctly. This technique is primarily used in black box testing, where the internal structure or implementation details of the system are not known or considered during testing. Therefore, the correct answer is Black Box testing.

Submit
69. Dependent data marts 

Explanation

Dependent data marts refer to separate data marts that are integrated into a single data warehouse. This allows an organization to consolidate and unify its data from various sources into one central location. By doing so, the organization can have a comprehensive and holistic view of its data, enabling better analysis, reporting, and decision-making. This approach eliminates data silos and promotes data consistency and integrity across the organization.

Submit
70. Unix system calls?

Explanation

The correct answer is "all". This implies that all of the mentioned system calls (EXECUTE(), CLOSE(), fcntl(), create(), and open()) are Unix system calls. Unix system calls are functions provided by the operating system that allow applications to interact with the operating system kernel and access system resources such as files, devices, and processes. Therefore, all of these system calls are part of the Unix system call interface.

Submit
71. A 'virtual house' is essentially: 

Explanation

A virtual house is a traditional relational database that provides a multidimensional view through a middleware. It is distinct from the enterprise's operational database.

Submit
72.
What are the Types of Integration Testing?
 
 

Explanation

The correct answer is Top Down Testing, Bottom Up Testing, Big Bang Testing. These are the three types of integration testing. Top Down Testing involves testing the higher-level modules first and gradually integrating the lower-level modules. Bottom Up Testing, on the other hand, starts with testing the lower-level modules and gradually integrates the higher-level modules. Big Bang Testing is a type of integration testing where all the modules are integrated together and tested as a whole.

Submit
73.
A Plan to overcome the risk called as
 

Explanation

A mitigation plan is a strategy or course of action designed to reduce or eliminate the potential negative impacts or risks associated with a particular situation or project. It involves identifying potential risks, assessing their likelihood and potential consequences, and developing proactive measures to prevent or minimize their impact. By implementing a mitigation plan, organizations can effectively manage risks and ensure the successful completion of a project or objective.

Submit
74. The default permission bits of file when it is created for the first time ,is controlled by

Explanation

The default permission bits of a file when it is created for the first time are controlled by the umask value. Umask is a permission mask that determines which permission bits are turned off or masked when a new file or directory is created. It is a value that is subtracted from the maximum permissions to determine the default permissions of a file. By setting the umask value, the user can control the default permissions assigned to newly created files and directories.

Submit
75. Which of the following tasks does testing accomplish?

Explanation

Testing accomplishes both making sure requirements are met and improving confidence in software. By testing, we can verify that the software meets the specified requirements and functions as intended. This helps to ensure that the software is reliable and performs as expected. Additionally, testing helps to identify and fix any defects or issues in the software, which in turn improves the confidence in its quality and reliability. Therefore, testing serves the purpose of achieving both these objectives.

Submit
76.
Informing to the developer which bug to be fix first is called as
 
 

Explanation

Priority refers to the order in which bugs or issues should be addressed and fixed by the developer. It helps in determining which bug needs to be fixed first based on its importance and impact on the system. By informing the developer about the priority of the bugs, the team can ensure that the most critical and high-priority issues are resolved first, thereby improving the overall quality and functionality of the software.

Submit
77.
The review and approved document (i.e. Test plan, System Requirement Specification's) is called as
 

Explanation

A baseline document refers to a review and approved document that serves as a reference point for future evaluations or comparisons. It typically includes important documents such as a test plan and system requirement specifications. This document is considered a baseline because it represents the agreed-upon starting point or foundation for a project or process. It helps ensure consistency and serves as a benchmark for measuring progress and making future decisions.

Submit
78. Choose the correct answer:

Explanation

The correct answer is that data mining is the application of data warehousing. This means that data mining is a process that is performed on data that has been stored and organized in a data warehouse. Data mining involves extracting useful patterns or knowledge from large datasets, while data warehousing involves storing and managing large amounts of data in a structured manner to facilitate data analysis. Therefore, data mining is a step that is taken after data warehousing has been completed.

Submit
79. In order to populate the data warehouse, which of the following set of operations are appropriate? 

Explanation

Query and update operations are appropriate for populating a data warehouse. Query operations are used to extract data from various sources and transform it into a suitable format for the data warehouse. Update operations are used to modify or add data to the data warehouse. Refresh and load operations are not appropriate as they suggest reloading the entire data warehouse, which is time-consuming and inefficient. Insert and delete operations are not appropriate as they suggest adding or removing individual records, which is not the primary purpose of populating a data warehouse. Create and edit operations are also not appropriate as they pertain to the design and management of the data warehouse structure, rather than the actual population of data.

Submit
80. Data Warehouse provides the best support for analysis while OLAP carries out the _________ task. 

Explanation

Data Warehouse provides the best support for analysis because it is a centralized repository of data that is specifically designed to support decision-making and data analysis. It allows for the integration of data from multiple sources, providing a comprehensive view of the organization's data. On the other hand, OLAP (Online Analytical Processing) carries out the analysis task by providing multidimensional analysis capabilities, allowing users to analyze data from different perspectives, drill down into details, and perform complex calculations and aggregations.

Submit
81. $* : means

Explanation

The answer "all parameters passed to shell script" is correct because the asterisk symbol (*) in shell scripting is used as a wildcard character to represent any number of characters or parameters. In this context, the asterisk (*) means that all parameters passed to the shell script will be considered, regardless of the number of parameters.

Submit
82.
Retesting the entire application after a change has been made called as?
 
 

Explanation

Full regression testing is the process of retesting the entire application after a change has been made. This is done to ensure that the change has not introduced any new defects or caused any regression in the existing functionality. It involves running all the test cases that were executed during the initial testing phase, as well as any additional test cases that are deemed necessary. Full regression testing helps in identifying any potential issues that may have been introduced due to the change and ensures the overall stability and reliability of the application.

Submit
83.
TQM represents
 
 

Explanation

Total Quality Management (TQM) is a management approach that focuses on continuously improving the quality of products, services, and processes within an organization. It involves the participation of all employees in the organization and aims to meet or exceed customer expectations. TQM emphasizes the importance of customer satisfaction, employee involvement, process improvement, and a systematic approach to quality management. It is a holistic approach that encompasses all aspects of an organization's operations and aims to create a culture of quality throughout the organization.

Submit
84.
Optimization, Defect Prevention, and Quality Control. Its come under the
 

Explanation

The correct answer is CMM Level 5. CMM (Capability Maturity Model) is a framework that measures the maturity of an organization's software development processes. CMM Level 5 represents the highest level of maturity in the CMM model. At this level, organizations have achieved optimization, defect prevention, and quality control in their processes. This means that they have well-defined and consistently followed processes, continuous process improvement, and a focus on preventing defects rather than fixing them.

Submit
85. Relational databases allow you to navigate the data in ____________ that is appropriate using the primary, foreign key structure within the data model. 

Explanation

Relational databases allow you to navigate the data in any direction that is appropriate using the primary, foreign key structure within the data model. This means that you can access related data both forwards and backwards, allowing for efficient and flexible querying and data retrieval. The primary and foreign keys establish relationships between tables, enabling the database to maintain referential integrity and support complex data relationships. As a result, users can navigate the data in various directions based on their needs and requirements.

Submit
86. Dev/null 

Explanation

The correct answer is "all" because it indicates that the file "dev/null" has written permission for all users in the Unix system. This means that any user can write to this file and send their output to the built-in dustbin.

Submit
87.
Which is Black-Box Testing method?
 

Explanation

Equivalence partitioning is a Black-Box Testing method where the input data is divided into different classes or partitions, and test cases are designed to cover each partition at least once. This method ensures that all possible scenarios within each partition are tested, without the need to test every single input value. It helps identify defects and errors by focusing on the boundaries and representative values of each partition, making it an effective technique for testing software systems.

Submit
88. The need to synchronize data upon update is called 

Explanation

Data coherency refers to the need to synchronize data upon update. It ensures that all copies of the data are consistent and up-to-date. When multiple users or systems have access to the same data, it is important to maintain coherency to avoid conflicts and inconsistencies. This can be achieved through various techniques such as locking mechanisms, transaction management, and data replication.

Submit
89. Which of the following are not filter programs?

Explanation

The program "date" is not a filter program because it does not take input from standard input and filter or modify it. Instead, it simply displays the current date and time. Filter programs, on the other hand, take input from standard input, perform some filtering or processing on it, and then output the result. "sort", "cat", and "grep" are examples of filter programs as they take input from standard input and perform various filtering operations on it.

Submit
90. Which symbol represents filename followed to point to the locationof the shell where the script is interpreted? 

Explanation

The symbol "/" represents the filename followed to point to the location of the shell where the script is interpreted. In Unix-like operating systems, the "/" symbol is used as a directory separator in file paths. In this context, it indicates the root directory, which is the top-level directory in the file system hierarchy. Therefore, using "/" before the filename allows the script to be executed from the root directory.

Submit
91.
Name the events that will be analyzed, Count the named incidents, Rank the count by frequency using a bar chart & Validate reasonableness of the analysis is called as
 

Explanation

Pareto Analysis is a method used to identify and prioritize the most significant factors or events based on their frequency or impact. In this process, the events are named and counted, and then ranked by frequency using a bar chart. Pareto Analysis helps in focusing on the vital few factors that contribute the most to a problem or situation, allowing for effective decision-making and problem-solving. It helps in identifying the key areas that require attention and resources, leading to more efficient and targeted actions.

Submit
92. The content of a data warehouse is said to be 'non-volatile', because 

Explanation

The content of a data warehouse is said to be 'non-volatile' because it is a read-only data. This means that the data in the data warehouse cannot be modified or changed. It remains static and does not get updated or deleted, even after the system crashes or is switched off. The purpose of a data warehouse is to store historical and consolidated data for analysis and reporting, and it is designed to be a stable and reliable source of information. Therefore, the data in a data warehouse is kept in a read-only format to ensure its integrity and consistency.

Submit
93.
Beta testing will be done by
 

Explanation

Beta testing is the final stage of testing before a software or product is released to the public. It involves real users, who are not part of the development team, testing the product in a real-world environment. The purpose of beta testing is to identify any issues or bugs that may have been missed during the earlier stages of testing. Therefore, the correct answer is "User" as they are the ones who will be testing the product in a real-world setting.

Submit
94. Which one manages both current and historic transactions? 

Explanation

OLAP (Online Analytical Processing) is the correct answer because it is a technology used to manage both current and historic transactions. OLAP allows users to analyze large volumes of data from various perspectives and dimensions, including historical data. It provides advanced data analysis capabilities and supports complex queries, making it suitable for managing both current and historic transactions.

Submit
95. Variance from product specifications is called?

Explanation

Variance from product specifications is referred to as a defect. This means that the product does not meet the required specifications and is considered faulty or flawed. A defect can occur in various aspects of the product, such as its design, functionality, or performance. It is important to identify and address defects to ensure that the product meets the desired quality standards and customer expectations.

Submit
96. To which of the following applications can you export report results?

Explanation

You can export report results to PDF, Microsoft Word, and Microsoft Access. This means that you have the option to save and share your report in different formats depending on your needs. PDF is a popular format for sharing documents as it preserves the formatting and can be easily viewed on different devices. Microsoft Word allows for further editing and customization of the report. Microsoft Access is a database management system that can be used to store and analyze data, so exporting report results to Access can be useful for further analysis and integration with other data.

Submit
97. What is the PID of Kernel?

Explanation

The PID (Process IDentifier) of the Kernel is 0. In most operating systems, including Linux, the Kernel is the first process that gets executed during system boot. It is responsible for managing system resources and providing essential services to other processes. The Kernel is a special process that runs in a privileged mode, and its PID is usually assigned as 0 to signify its unique status as the core of the operating system.

Submit
98.
Unit Testing will be done by
 

Explanation

Developers are responsible for writing and executing unit tests. Unit testing is a software testing technique where individual components or units of a software system are tested independently to ensure they are functioning correctly. Since developers are the ones who write the code, they are in the best position to create and perform these tests. Unit testing helps identify any bugs or issues in the code early in the development process, allowing developers to fix them before the software is handed over to testers, customers, or end users for further testing or use.

Submit
99. A data warehouse is built as a separate repository of data, different from the operational data of an enterprise because 

Explanation

A data warehouse is built as a separate repository of data, different from the operational data of an enterprise because it contains summarized data whereas the operational database contains transactional data. This means that the data warehouse stores aggregated and organized data that has been processed and transformed for analytical purposes, while the operational database holds detailed and real-time transactional data used for day-to-day operations. By separating the two, the data warehouse can provide a more efficient and optimized environment for reporting, analysis, and decision-making without affecting the operational systems.

Submit
100. Which of the following is not a cursor moment?

Explanation

The given options are symbols that represent different cursor movements. "$" represents the end of the line, "j" represents moving the cursor down, and "A" represents moving the cursor to the end of the line and switching to insert mode. However, "N" is not a valid cursor movement command in most text editors or command line interfaces. Therefore, "N" is not a cursor movement.

Submit
101. In a 3-tier architecture of the data warehouse, the OLAP engine is related to: 

Explanation

The correct answer is the Second layer of the architecture. In a 3-tier architecture of a data warehouse, the second layer is known as the OLAP (Online Analytical Processing) engine. This layer is responsible for performing complex analytical queries and generating reports based on the data stored in the data warehouse. It provides multidimensional analysis capabilities, allowing users to slice, dice, and drill down into the data for decision-making purposes. The OLAP engine acts as an intermediary between the user interface and the data storage layer, facilitating efficient data retrieval and analysis.

Submit
102. In Transformation alternate drill-down paths/alternate hierarchies must have the aConvergence level that is 

Explanation

In Transformation, alternate drill-down paths or alternate hierarchies must have the "Unique" convergence level. This means that there should not be any repetition or duplication of elements in the drill-down paths or hierarchies. Each element should be distinct and not repeated, ensuring that the transformation process is accurate and reliable.

Submit
103. Requirements Specification, Planning, Test case Design, Execution,Bug Reporting & Maintenance This Life Cycle comes Under

Explanation

The given correct answer is STLC, which stands for Software Testing Life Cycle. This life cycle encompasses various stages such as Requirements Specification, Planning, Test case Design, Execution, Bug Reporting, and Maintenance. It specifically focuses on the testing phase of the software development process, ensuring that the software meets the specified requirements and functions correctly.

Submit
104.
50) This Testing Technique examines the basic program structure and it derives the test data from the program logic; Ensuring that all statements and conditions executed at least once. It is called as
 
 

Explanation

White box testing is a testing technique that examines the internal structure and logic of a program. It derives test data from the program's code and ensures that all statements and conditions are executed at least once. Unlike black box testing, which focuses on testing the functionality without knowledge of the internal implementation, white box testing requires knowledge of the code and its structure. This technique is useful for uncovering errors and defects within the program's logic and ensuring thorough test coverage.

Submit
105.  Which One of the following is NOT true? 

Explanation

The statement "UNIX and LINUX are both freely distributed" is not true. While Linux is generally freely distributed and open source, UNIX is a proprietary operating system that requires a license for use.

Submit
106.
Management and Measurement, It will come under
 
 
 
 

Explanation

The correct answer is CMM Level 4 because at this level, organizations have established a quantitative understanding of their processes and use statistical techniques to control and manage them. They have implemented process measurement and analysis, and use the data collected to make informed decisions and improvements. This level focuses on proactive process management and continuous improvement, which aligns with the concept of management and measurement.

Submit
107. The most common source of change data in refreshing a data warehouse is: 

Explanation

Snapshot change data is the most common source of change data in refreshing a data warehouse. This type of data captures the state of the data at a specific point in time, providing a snapshot of the data at that moment. It is commonly used in data warehousing to track changes and updates to the data over time. By comparing snapshots taken at different points in time, the changes in the data can be identified and incorporated into the data warehouse, ensuring that it stays up to date.

Submit
108. Which of following is used to change directory?

Explanation

The correct answer is -cd, -cd ~, -cd .. These commands are used to change the directory in a command line interface. "-cd" is used to change to a specific directory, "-cd ~" is used to change to the home directory, and "-cd .." is used to change to the parent directory. "ch" is not a valid command for changing directories.

Submit
109.  What report manipulation involves moving individual attributes or metrics from rows to columns or columns to rows or the page-by field?

Explanation

Data pivoting involves moving individual attributes or metrics from rows to columns or columns to rows. This allows for a different representation of the data, making it easier to analyze and compare different attributes or metrics. Sorting refers to arranging data in a particular order, while swapping rows and columns is a specific action within data pivoting. Exporting refers to saving data in a different file format or location.

Submit
110. Which has pid 1?

Explanation

The given options are shell, root, and hilt/hault/init. Among these options, hilt/hault/init is the only one that could potentially have a PID (Process ID) of 1. In a Unix-like operating system, the init process is the first process that is executed during the booting process and it always has a PID of 1. Therefore, hilt/hault/init is the correct answer.

Submit
111.
The testing which is done by going through the code is known as,
 
 

Explanation

White box testing is a type of testing where the tester has access to the internal structure and code of the software being tested. This allows the tester to examine the code and verify if it is functioning correctly and meeting the specified requirements. It involves testing individual components, functions, and pathways within the code to ensure that they are working as expected. This type of testing is often performed by developers to ensure the quality and reliability of their code.

Submit
112. Command to get short description of chat? 

Explanation

The correct answer is "man-f". The "man" command is used to display the manual pages for various commands in Unix-like operating systems. The "-f" option is used to display a short description or "brief" information about the command specified.

Submit
113. Phase Definition. It will come under

Explanation

The given answer, CMM LEVEL 2, is the correct answer because the question is asking about the phase definition and which level of the Capability Maturity Model (CMM) it falls under. CMM LEVEL 2, also known as the "Repeatable" level, focuses on establishing basic project management processes and practices. At this level, organizations have defined processes for managing projects, including requirements management, project planning, project tracking, and configuration management. Therefore, the phase definition would fall under CMM LEVEL 2 as it aligns with the establishment of project management processes.

Submit
114. -This folder contains reports, documents, and other objects that are accessible to you and other users. 

Explanation

This folder, called "Shared Reports," contains reports, documents, and other objects that are accessible to both you and other users. It is a shared space where multiple users can access and collaborate on these resources.

Submit
115. Which of the following process includes data cleaning, data integration, data selection, data transformation, data mining, pattern evolution and knowledge presentation? 

Explanation

The correct answer is KDD process. KDD stands for Knowledge Discovery in Databases, and it is a process that involves various steps such as data cleaning, data integration, data selection, data transformation, data mining, pattern evaluation, and knowledge presentation. These steps are followed to extract useful and meaningful patterns and knowledge from large datasets. ETL process (Extract, Transform, Load) is mainly focused on data integration and transformation, while MDX process (Multidimensional Expressions) is a query language for OLAP databases. KTL process is not a commonly known process in the context of data analysis.

Submit
116. Which type of prompt display option enables users to enter a single value? (For example, number, text, or date).

Explanation

The text box prompt display option enables users to enter a single value, such as a number, text, or date. It provides a blank space where users can directly input their desired value. This option is commonly used when the user needs to provide a specific input that is not limited to a predefined set of choices.

Submit
117. In unix the status of a process may be 

Explanation

The given answer correctly lists the various possible statuses of a process in Unix. A "zombie" process is one that has completed its execution but still has an entry in the process table. A "sleeping" process is one that is waiting for an event or resource to become available. An "orphan" process is one that has been abandoned by its parent process. A "running" process is one that is currently being executed by the CPU. "Waiting" refers to a process that is waiting for a particular event or resource. Finally, "Dead" indicates that a process has terminated.

Submit
118.
To check whether we are developing the right product according to the customer requirements are not. It is a static process
 

Explanation

Verification is the process of evaluating a system or component to determine whether it satisfies the specified requirements. In this context, it is used to check whether the product being developed aligns with the customer requirements. Verification is a static process, meaning it does not involve actually running or testing the product, but rather focuses on reviewing and analyzing the documentation, design, and other artifacts to ensure they meet the specified criteria.

Submit
119.
To check whether we have developed the product according to the customer requirements r not. It is a Dynamic process.
 
 

Explanation

Validation is the process of evaluating a system or product during or at the end of the development process to determine whether it satisfies the specified requirements. It involves checking whether the product has been developed according to the customer requirements and if it meets their needs and expectations. Validation is a dynamic process that ensures the product is fit for its intended purpose and meets the customer's expectations. It is different from verification, which focuses on checking whether the product has been developed correctly according to the specified requirements.

Submit
120. Which of the following are true regarding ods?

Explanation

The given answer states that class 3 ODS syncs over the night, class 2 ODS uses the store and forward technique with a sync time of 3-4 hours, class 1 ODS uses hand in hand sync which is quick, and class 4 ODS is ad-hoc. This means that each class of ODS has a different synchronization method and time frame. Class 3 syncs overnight, class 2 uses the store and forward technique with a 3-4 hour sync time, class 1 has a quick hand in hand sync, and class 4 is ad-hoc.

Submit
121.
Which is non-functional software testing?
 

Explanation

Performance testing is a type of non-functional software testing that focuses on evaluating the system's performance under various conditions such as load, stress, and scalability. It aims to identify any performance bottlenecks, measure response times, and ensure that the system meets the required performance criteria. Regression testing, black box testing, and unit testing, on the other hand, are functional testing techniques that focus on verifying the correctness and functionality of the software.

Submit
122. Wc is used for?

Explanation

The command "wc" is used to count the number of lines, words, and characters in a file or input.

Submit
123.
This type of testing method attempts to find incorrect or missing functions, errors in data structures or external database access, interface errors, Performance errors and initialization and Termination errors. It is called as
 
 

Explanation

Black box testing is a testing method where the internal structure or implementation details of the system being tested are not known to the tester. Instead, the tester focuses on testing the functionality and behavior of the system by providing inputs and observing the outputs. This type of testing is useful for finding incorrect or missing functions, errors in data structures or external database access, interface errors, performance errors, and initialization and termination errors. The term "black box" refers to the idea that the tester does not have visibility into the inner workings of the system, similar to how a black box conceals its internal mechanisms.

Submit
124.
Acceptance testing is known as
 
 

Explanation

Beta testing is a type of acceptance testing where the software is tested by end-users in a real-world environment before its official release. It helps to identify any potential issues or bugs that were not discovered during the earlier testing phases. Beta testing allows the developers to gather feedback from the users and make necessary improvements to ensure the software meets the user's expectations. Therefore, the correct answer for this question is Beta Testing.

Submit
125. Taken jointly, the extract programs or naturally evolving systems formed a spider web, also known as

Explanation

The given statement suggests that the extract programs or naturally evolving systems formed a spider web. This implies that these systems have been in existence for a long time and have been gradually developed or modified over time. This aligns with the concept of legacy systems, which refers to older systems that may still be in use but are outdated or difficult to maintain. Therefore, the correct answer is Legacy Systems Architecture.

Submit
126. Feature applying to data in data warehouse..

Explanation

In a data warehouse, data are rarely deleted. This is because data warehouses are designed to store large amounts of historical data for analysis and reporting purposes. Deleting data from a data warehouse can lead to the loss of valuable insights and trends that can be derived from historical data. Instead, data in a data warehouse is typically archived or stored indefinitely to allow for comprehensive analysis and comparisons over time.

Submit
127. What is 'ROLAP'?  

Explanation

not-available-via-ai

Submit
128. Which command use the value of one variable as a variable name?

Explanation

The eval command is used to evaluate and execute a string as code. In this case, it takes the value of one variable and treats it as a variable name, allowing the program to dynamically access and manipulate the variable with that name. This can be useful when the specific variable to be accessed is not known in advance and needs to be determined at runtime.

Submit
129.
SPICE Means
 

Explanation

SPICE stands for Software Process Improvement and Capability Determination. This model is used to assess and improve software development processes within an organization. It focuses on evaluating the capability and maturity of the processes and provides guidelines for improvement. The other options mentioned in the question are not correct because they do not accurately represent the meaning of SPICE.

Submit
130.
It provides a set of levels and an assessment model, and presents a set of recommended practices that allow organizations to improve their testing processes.
 
 

Explanation

The given answer, TIM (Testing Improving Model), is the correct answer because it aligns with the provided explanation. The explanation states that the model provides a set of levels and an assessment model, and presents recommended practices for organizations to enhance their testing processes. This aligns with the purpose of the Testing Improving Model, which is to provide guidance and recommendations for improving testing practices within organizations.

Submit
131. Which is dependent data mart? 

Explanation

A dependent data mart is a data mart that depends on other sources rather than the data warehouse. It is used to unite the organization into one data warehouse by combining data from sources other than the data warehouse. This means that the data mart relies on external data sources to gather the necessary information for analysis and reporting, instead of solely relying on the data warehouse.

Submit
132. Verification is

Explanation

Verification is a process based approach that involves reviewing and evaluating the activities, documents, and deliverables of a project to ensure that they meet the specified requirements and standards. This approach focuses on examining the processes followed during the development and implementation of a product or system, rather than just inspecting the final product or its records. By adopting a process based verification, organizations can identify and rectify any deviations or issues in the project processes, thereby ensuring the overall quality and effectiveness of the deliverables.

Submit
133. Graphs are important because--

Explanation

Graphs are important because they provide a pictorial representation of data, making it easier to understand. By visually representing data points and trends, graphs allow for quick and intuitive interpretation of information. This visual format helps in identifying patterns, relationships, and trends that may not be immediately apparent in raw data. Additionally, graphs enable effective communication of complex data to a wide range of audiences, making them a valuable tool in various fields such as science, business, and research.

Submit
134.
The process that deals with the technical and management issues of software development called as?
 

Explanation

The correct answer is "Software Process." This is because the software process refers to the set of activities, methods, and practices that are used to develop, test, and deliver software. It encompasses both the technical aspects of software development, such as coding and testing, as well as the management aspects, such as project planning and quality assurance. Therefore, the software process is the comprehensive process that deals with all the technical and management issues of software development.

Submit
135. A file in Command Window looks like this..DW002TheBestBatchOfTheCognizantTrainingAcademaySaid By Namrata ;) Command to display line 3 to 7 

Explanation

The correct answer is "both". Both commands, "tail -8 abc.txt |head -5" and "head -7 abc.txt | tail -5", will display lines 3 to 7 of the file in the Command Window. The first command uses the "tail" command to display the last 8 lines of the file and then pipes it to the "head" command to display the first 5 lines from that result. The second command uses the "head" command to display the first 7 lines of the file and then pipes it to the "tail" command to display the last 5 lines from that result. Both commands achieve the same result of displaying lines 3 to 7 of the file.

Submit
136. Objects and reports can be used for scheduling using Options---

Explanation

The given options suggest different ways in which objects and reports can be used for scheduling. Among these options, "Report scheduler" is the most appropriate answer because it specifically refers to a tool or feature that is designed for scheduling reports. This implies that there is a dedicated functionality or system in place for scheduling reports, separate from other general scheduling options like "Scheduler" or "CRON". Therefore, "Report scheduler" is the correct answer.

Submit
137. ________ gives total view of an organization. 

Explanation

A data warehouse gives a comprehensive view of an organization by integrating data from various sources and storing it in a centralized location. It is designed to support analytical processing and reporting, allowing users to analyze large volumes of data and gain insights into business trends and performance. Unlike a database or OLTP (Online Transaction Processing), which are focused on transactional processing and managing day-to-day operations, a data warehouse is optimized for complex queries and decision-making processes. Therefore, a data warehouse is the correct answer as it provides a holistic view of an organization's data.

Submit
138.
An Important metric is the number of defects found in internal testing compared to the defects found in customer tests, Status of test activities against the plan, Test coverage achieved so far, comes under
 

Explanation

The given answer is "Test Metric" because the statement mentions the number of defects found in internal testing compared to customer tests and the status of test activities against the plan. These are specific metrics that are used to evaluate the effectiveness and efficiency of testing activities. Therefore, it falls under the category of Test Metric.

Submit
139. All reports in MicroStrategy are made up of a filter and the following object:  

Explanation

All reports in MicroStrategy are made up of a filter and a template. The template provides the structure and formatting for the report, including the layout, headers, footers, and any other visual elements. It allows users to define the presentation of the data and customize the report's appearance. By selecting a template, users can easily create consistent and visually appealing reports across the organization.

Submit
140. Which of the following objects provides descriptive information from the data warehousing that can be displayed on a report?

Explanation

An attribute in data warehousing is a characteristic or property of a data element. It provides descriptive information about the data, such as its name, type, and format. This descriptive information can be used to create reports that display the data in a meaningful way. Therefore, an attribute is the correct answer as it provides descriptive information from the data warehousing that can be displayed on a report.

Submit
141.
Integration, It will come under
 

Explanation

The correct answer is CMM Level 3. This is because integration is a key process area in CMM (Capability Maturity Model) Level 3. At this level, organizations have defined and documented standard processes for managing projects and have implemented process improvement initiatives. Integration refers to the coordination and integration of different processes and activities within the organization. This level focuses on establishing a culture of continuous process improvement and ensuring that processes are well-defined, standardized, and integrated across the organization.

Submit
142.
Executing the same test case by giving the number of inputs on same build called as
 

Explanation

Retesting is the process of running the same test case again to ensure that a defect has been fixed. In this scenario, the test case is being executed again with the same number of inputs on the same build. This suggests that the purpose is to verify that a specific defect has been resolved, rather than testing new functionality or conducting a broader test. Therefore, the correct answer is Retesting.

Submit
143.
The name of the testing which is done to make sure the existing features are not affected by new changes
 

Explanation

Regression testing is the correct answer because it is a type of testing that is performed to ensure that the existing features of a software system are not affected by any new changes or updates. It involves retesting the previously tested functionalities to check for any regression or unintended impacts caused by the modifications. This helps in identifying and fixing any defects or issues that may have been introduced due to the changes, ensuring the overall stability and reliability of the software.

Submit
144. Logical data model consist of

Explanation

A logical data model consists of attributes and entities. Attributes represent the characteristics or properties of an entity, while entities represent the objects or concepts in the system being modeled. This model helps to define the structure and relationships between different entities and their attributes. The answer is correct as it accurately identifies the components of a logical data model.

Submit
145. This functionality enables a report to be divided into separate pages for viewing purposes based on an object, such as an attribute or metric. 

Explanation

Page-by functionality allows a report to be divided into separate pages for viewing purposes based on an object, such as an attribute or metric. This means that users can navigate through the report by going from one page to another, each page representing a specific object or category. It helps to organize and present the data in a more structured and manageable way, making it easier for users to analyze and understand the information presented in the report.

Submit
146. Data transformation includes which of the following?

Explanation

Data transformation refers to the process of converting data from one format or structure to another. In this case, the correct answer states that data transformation involves changing data from a detailed level to a summary level. This means that the process involves aggregating or summarizing the data to provide a higher-level view or overview of the information.

Submit
147. Automation Testing should be done before starting Manual testing.

Explanation

Automation testing is typically done after manual testing. Manual testing is the process of executing test cases manually to identify defects, while automation testing involves using tools and scripts to automate test cases. It is generally recommended to first perform manual testing to identify any critical defects and then automate repetitive and time-consuming test cases for efficient testing. Therefore, the statement "Automation Testing should be done before starting Manual testing" is incorrect.

Submit
148. Choose the incorrect statements

Explanation

The correct answer is "shell scripts are compiled." This statement is incorrect because shell scripts are not compiled but interpreted. Shell scripts are written in a scripting language and are executed line by line by the shell interpreter. They are not converted into machine code before execution, unlike compiled languages. The other statements are correct: Shell is indeed a programming language, shell scripts are interpreted, and shell scripts can accept arguments.

Submit
149. Head +n +5 f2.txt

Explanation

The command "head +n +5 f2.txt" is used to display the first 10 lines of the file "f2.txt". The "+n" option is used to specify the starting line number, and in this case, it is set to 5. Therefore, the command will display the lines starting from line 5 and up to line 14 (10 lines in total).

Submit
150. The following is true of three-tier data warehouses: 

Explanation

In a three-tier data warehouse architecture, data marts are subsets of the data warehouse that are designed to serve specific business functions or departments. Once created, the data marts are typically updated periodically from the data warehouse to ensure that they have the most up-to-date information. This allows the data marts to provide accurate and timely data to the end-users without directly accessing the operational databases.

Submit
151.
This type of test include, how well the user will be able to understand and interact with the system?
 

Explanation

Usability testing is a type of test that assesses how well a user can understand and interact with a system. It focuses on the user's experience and identifies any usability issues or difficulties they may encounter. This test is crucial in ensuring that the system is user-friendly and meets the needs of its intended users. Beta testing, alpha testing, and user acceptance testing may involve other aspects of testing, but they do not specifically focus on the user's ability to understand and interact with the system like usability testing does.

Submit
152. The approach/document used to make sure all the requirements are covered when writing test cases

Explanation

A Traceability Matrix is a document that is used to ensure that all the requirements are covered when writing test cases. It helps in establishing a link between the requirements and the test cases, allowing the testers to track the progress and coverage of the testing process. By using a Traceability Matrix, the testers can easily identify any missing or incomplete requirements and ensure that they are adequately tested. This document also helps in managing the impact of any changes or updates to the requirements, as it provides a clear overview of the test coverage.

Submit
153.
AdHoc testing is a part of
 

Explanation

Exploratory testing is a type of testing where testers explore the software application without any predefined test cases. It is an unscripted and informal approach to testing, where testers rely on their domain knowledge, experience, and intuition to find defects. AdHoc testing, on the other hand, refers to testing that is performed without any formal test design techniques. It is an unplanned and spontaneous approach to testing. Therefore, the correct answer is Exploratory Testing as it aligns with the description provided.

Submit
154.
It measures the quality of processes used to create a quality product.It is a system of management activities,It is a preventive process, It applies for entire life cycle & Deals with Process.
 

Explanation

Quality Assurance is the correct answer because it involves the management activities that ensure the quality of processes used to create a quality product. It is a preventive process that applies throughout the entire life cycle of a product and deals with the processes involved in its creation. Quality Assurance focuses on preventing defects and ensuring that the product meets the required standards and specifications. Verification and validation are also important aspects of Quality Assurance, but they are specific activities within the overall process.

Submit
155. In which approach of data warehousing, the transaction data is partitioned into facts 

Explanation

In the dimensional approach of data warehousing, the transaction data is partitioned into facts. This approach organizes data into a star or snowflake schema, where the fact table contains the measurable data (facts) and the dimension tables provide the context for analyzing the facts. This allows for efficient querying and analysis of data, as well as easy navigation and understanding of the data model.

Submit
156.
It measures the quality of a productIt is a specific part of the QA procedure, It is a corrective process,It applies for particular product & Deals with the product.
 

Explanation

Quality Control is the correct answer because it refers to the process of checking and monitoring the quality of a product to ensure that it meets the required standards and specifications. It is a specific part of the Quality Assurance (QA) procedure, which focuses on preventing defects and ensuring quality throughout the entire product development process. Quality Control is a corrective process that involves inspecting, testing, and analyzing the product to identify and rectify any issues or deviations from the desired quality. It applies to a particular product and deals with the product itself rather than the overall QA process.

Submit
157. Tree is used as an index to provide access to records

Explanation

A tree structure is commonly used as an index in databases to provide efficient access to records. This index allows for quick retrieval of specific data without the need to scan the entire table. Instead, the tree structure allows for a more organized and optimized search, reducing the time and resources required to find the desired information. Therefore, the correct answer is "Without scanning the entire table."

Submit
158. What is data scrubbing? 

Explanation

Data scrubbing is a process that involves upgrading the quality of data before it is moved into a data warehouse. This process helps to identify and correct any errors, inconsistencies, or inaccuracies in the data, ensuring that the data is clean and reliable. By scrubbing the data before it is loaded into the data warehouse, organizations can improve the overall quality of their data and enhance the effectiveness of their data analysis and decision-making processes.

Submit
159. You want to display all the lines in a file, Proj_det, which begin with the word Projfollowed by any three digits. Which of the following will you use? 

Explanation

The correct answer is "grep “^Proj[0-9][0-9][0-9]” Proj_det". This command will search for lines in the file "Proj_det" that begin with the word "Proj" followed by any three digits. The caret (^) symbol is used to specify the beginning of a line, and the square brackets [0-9] are used to specify any digit from 0 to 9. By using three sets of square brackets, the command ensures that there are exactly three digits following the word "Proj".

Submit
160. After you run a report,what report manipulation enables you to view data at levelsOther than the original level of the report?

Explanation

Drilling is the report manipulation technique that enables users to view data at levels other than the original level of the report. It allows users to navigate through the data hierarchy and drill down into more detailed information or drill up to see a summary of the data. This functionality provides flexibility in analyzing and exploring data from different perspectives, helping users gain deeper insights and make more informed decisions.

Submit
161. Types of reporting tools.

Explanation

The given list provides examples of different types of reporting tools that can be used for data analysis and reporting purposes. These tools include MS-Excel, Business Objects (Crystal Reports), Cognos (Impromptu, Power Play), Microstrategy, MS reporting services, Informatica Power Analyzer, Actuate, Hyperion (BRIO), Oracle Express OLAP, and Proclarity. Each tool has its own features and capabilities, allowing users to generate and present reports in various formats and styles. These tools are commonly used in business intelligence and data analytics to extract insights and make informed decisions based on the data.

Submit
162. Which of these are unix shells

Explanation

The correct answer is Cshell and KShell. Cshell, also known as C shell, is a Unix shell that provides a C-like syntax and is known for its interactive command-line editing and history features. KShell, also known as Korn shell, is another Unix shell that was developed as a superset of the Bourne shell and includes features such as command-line editing, history, and job control. Ushell and Mshell are not recognized as Unix shells.

Submit
163. Types of editors

Explanation

The given answer lists vi, ex, and ed as types of editors. Vi is a popular text editor used in Unix-like operating systems, known for its powerful features and extensive customizability. Ex is a line editor that is often used as the command-line interface for vi. Ed is a simple and minimalistic text editor that is commonly used in Unix systems for quick editing tasks. Therefore, vi, ex, and ed are all valid examples of different types of editors.

Submit
164. What is a data mart? 

Explanation

A data mart is the access layer of the data warehouse environment that is used to get data out to the users. This means that it serves as a subset of the data warehouse, containing specific data that is relevant to a particular department or group of users. Data marts are designed to provide users with easy access to the data they need for analysis and reporting, without having to navigate the entire data warehouse. They are typically smaller in size and focused on a specific subject area, making it easier for users to find and retrieve the data they need.

Submit
165. Which of the following are properties of data mart?

Explanation

Data marts are subsets of data warehouses that are designed for specific departments or functions within an organization. They are typically easier to design compared to full data warehouses because they focus on a specific area and have a smaller scope. Data marts also tend to be more detailed as they are tailored to the specific needs of a department. Additionally, data marts are limited for use within a department, meaning they are not accessible or used by other departments. However, the statement "Difficult to manage" and "Expensive" are not properties of data marts.

Submit
166. Data warehouse bus matrix is a combination of

Explanation

A data warehouse bus matrix is a tool used to organize and understand the relationships between dimensions and data marts within a data warehouse. It provides a clear and structured view of how dimensions and data marts are related and interconnected. By using a bus matrix, organizations can effectively plan and design their data warehouse architecture, ensuring that all necessary dimensions and data marts are included and properly integrated. Therefore, the correct answer is dimensions and data marts.

Submit
167. Among the following, which is NOT the objective of clustering?

Explanation

Clustering is a data analysis technique used to group similar objects together based on their characteristics. The objective of clustering is to find consistent and valid organizations of the data, to cover natural groupings, and to initiate hypotheses about the data. However, facilitating OLAP operations is not a direct objective of clustering. OLAP (Online Analytical Processing) is a different data analysis technique used for multidimensional data analysis and reporting. While clustering can be used as a preliminary step in preparing data for OLAP analysis, it is not its primary objective.

Submit
168. An operational system is which of the following?

Explanation

not-available-via-ai

Submit
169. A data warehouse is said to contain a 'subject-oriented' collection of data because 

Explanation

A data warehouse is said to contain a 'subject-oriented' collection of data because its contents have a common theme. This means that the data in the data warehouse is organized and categorized based on specific subjects or topics. This allows for easier analysis and retrieval of data related to a particular subject, making it more efficient for decision-making and reporting purposes. By having a common theme, the data warehouse can provide a comprehensive and integrated view of the data, enabling users to gain insights and make informed decisions.

Submit
170.
Retesting modules connected to the program or component after a change has been made?
 
 

Explanation

Regional Regression is the correct answer because it refers to retesting only the modules that are directly affected by a change in the program or component. This approach is more focused and efficient compared to full regression testing, which involves retesting the entire system. Unit regression testing, on the other hand, refers to retesting individual units or components, while retesting simply refers to the general act of testing again.

Submit
171. The load and index is which of the following?

Explanation

The load and index refer to a process in which data is loaded into a data warehouse and necessary indexes are created. This process involves transferring data from various sources into the data warehouse and organizing it in a way that allows for efficient querying and analysis. Indexes are created to improve the performance of data retrieval operations. Therefore, the correct answer is "A process to load the data in the data warehouse and to create the necessary indexes."

Submit
172.
A metric used to measure the characteristic of the methods, Techniques and tools employed in developing, implementing and maintaining the software system called as
 

Explanation

Process metric is the correct answer because it refers to a metric used to measure the characteristic of the methods, techniques, and tools employed in developing, implementing, and maintaining a software system. This metric focuses on evaluating the efficiency and effectiveness of the software development process itself, rather than the quality or performance of the final product. Test metrics, product metrics, and none of these are not the correct answers as they do not specifically relate to the measurement of the software development process.

Submit
173. Transient data is which of the following?

Explanation

Transient data refers to data in which changes to existing records cause the previous version of the records to be eliminated. This means that when changes are made to a record, the previous version of that record is removed or replaced with the updated version. Transient data does not retain previous versions of records, and any changes made are immediately reflected in the data without keeping a history of the changes.

Submit
174. Process involving extracting data from data repositories and making them compatible

Explanation

OLAP stands for Online Analytical Processing, which is a process involving extracting data from data repositories and making them compatible. OLAP allows users to analyze multidimensional data from different perspectives, enabling them to gain insights and make informed decisions. It involves aggregating, summarizing, and manipulating large volumes of data to provide a comprehensive view of the information. OLAP systems are commonly used in business intelligence and data analytics to support complex reporting and data analysis requirements.

Submit
175. ODS is used for ______ and ______

Explanation

ODS, which stands for Operational Data Store, is a database that is used for tactical decision-making and storing current data. It is designed to provide real-time access to up-to-date information, making it suitable for tactical decision-making processes. ODS is different from a data warehouse, which is used for historical data analysis. Therefore, the correct answer is tactical decision and current data.

Submit
176.   
Retesting of a single program or component after a change has been made?
 
 

Explanation

Unit regression testing refers to retesting a single program or component after a change has been made. This type of testing focuses on verifying that the specific unit still functions correctly after the modification. It helps ensure that the change did not introduce any new defects or impact the existing functionality.

Submit
177. Which of the following is the most important when deciding on the data structure of a data mart? 

Explanation

When deciding on the data structure of a data mart, the most important factor is the data access tools to be used. This is because the data access tools determine how users will interact with the data mart and access the information stored within it. The chosen data access tools should be able to efficiently retrieve and manipulate the data in the desired format, ensuring that users can easily retrieve the required information.

Submit
178. Surrogate key properties

Explanation

Surrogate keys are used in databases to uniquely identify records. They are typically integers and have several properties. One of these properties is that they are faster than using natural keys for joins and indexing. Surrogate keys can also be used in slowly changing dimensions (SCD) where the data changes over time. Lastly, surrogate keys should be integers to ensure consistency and efficient storage.

Submit
179. What are the properties of unix?

Explanation

The properties of Unix include software and hardware portability, meaning that Unix can run on different types of hardware and software platforms. Unix is also known for its ability to restrict access to certain files and resources, providing a secure environment. It is a multiuser and multitasking operating system, allowing multiple users to access the system simultaneously and perform multiple tasks concurrently. Additionally, Unix is often available for free, making it accessible to a wide range of users.

Submit
180. Which of the following has PID?

Explanation

The options "root," "shell," and "kernel" all have PID. A PID stands for Process IDentifier, which is a unique numerical identifier assigned to a process running on a computer system. The root user, who has the highest level of administrative privileges, can initiate and manage processes, each of which is assigned a PID. The shell is the command-line interpreter that allows users to interact with the operating system and initiate processes, so it also has a PID. Lastly, the kernel, as the core component of an operating system, manages and oversees all processes, giving each of them a unique PID.

Submit
181. Which of the following objects enables users to select the information to be includedin a report or document at run time ?

Explanation

A prompt is an object that enables users to select the information to be included in a report or document at run time. It allows users to input their preferences or criteria for the report, such as selecting specific data, filtering options, or sorting preferences. This flexibility allows users to customize the output of the report based on their specific needs or requirements.

Submit
182. In MicroStrategy Web, a document can be displayed in which of the following view modes? 

Explanation

In MicroStrategy Web, a document can be displayed in the interactive view mode. This mode allows users to interact with the document, such as drilling down into data, applying filters, and selecting different visualizations. It provides a dynamic and engaging experience for users, enabling them to explore and analyze data in real-time. The interactive view mode is ideal for users who want to actively interact with the document and gain insights from the data.

Submit
183.
A metric used to measure the characteristic of documentation and code called as
 

Explanation

Product Metric is a metric used to measure the characteristic of documentation and code. This metric focuses on evaluating the quality and effectiveness of the final product or deliverable. It helps in assessing various aspects such as functionality, reliability, maintainability, and performance of the product. By analyzing product metrics, organizations can identify areas for improvement, make informed decisions, and ensure that the final product meets the desired standards and requirements.

Submit
184. Business objects does not support multi data sources.

Explanation

The statement "Business objects does not support multi data sources" is incorrect. Business Objects does support multi data sources, allowing users to connect to and retrieve data from multiple data sources simultaneously. This feature enables users to access and analyze data from different databases or systems within a single report or analysis. Therefore, the correct answer is False.

Submit
185. What is reconciled data? 

Explanation

Reconciled data refers to current data that is intended to be the single source for all decision support systems. This means that it is the most up-to-date and accurate data that is used for making informed decisions. It is not just selected and formatted for end-user support applications, nor is it stored in various operational systems throughout the organization or in just one operational system. Reconciled data is specifically designated as the primary and reliable source for decision-making processes.

Submit
186. What are shell variable?

Explanation

Shell variables are variables that are specific to the shell environment. They are used to store values that can be accessed and manipulated by the shell and its associated programs. In this case, "shell" and "Home" are examples of shell variables. "Shell" may refer to the type of shell being used, such as Bash or Zsh, while "Home" typically represents the user's home directory.

Submit
187. One of the techniques of implementing the OLAP engine is a 'Specialized SQL server'. This server exhibits the following properties:

Explanation

The correct answer states that a 'Specialized SQL server' facilitates OLAP operations in SQL when the data warehouse is organized as relational tables. This means that the server is designed to handle OLAP operations (such as complex queries and aggregations) on data that is stored in a relational database format. It implies that the server can efficiently process OLAP operations on data organized in a tabular structure, allowing users to perform advanced analysis and reporting on their data.

Submit
188. The command    echo welcome >/dev/tty

Explanation

The command "echo welcome >/dev/tty" will only echo "welcome" in the terminal in which it is run. It will not echo "welcome" in all the terminals that are logged on or switched on.

Submit
189.
Executing the same test case on a modified build called as
 

Explanation

Regression testing is the process of retesting a modified build to ensure that the changes made have not introduced any new defects or caused any existing functionality to break. It involves rerunning previously executed test cases to verify that the system still behaves as expected. In this scenario, executing the same test case on a modified build would fall under the category of regression testing, as the purpose is to check if the modifications have impacted the existing functionality.

Submit
190. This feature enables you to easily select the data you want to keep for further analysis and then removes the rest of the data from the report display. 

Explanation

The correct answer is "Filter on Selections". This feature allows users to easily choose the specific data they want to keep for further analysis and then removes the remaining data from the report display. This can be helpful in focusing on relevant information and reducing clutter in the report.

Submit
191. Why aggregate is used in dimensional model of data warehouse? 

Explanation

In a dimensional model of a data warehouse, aggregate is used to take the dimension and change its granularity. This means that the data is summarized and grouped at a higher level, allowing for faster and more efficient querying and analysis. By aggregating the data, it becomes easier to identify trends, patterns, and insights in the data. It also helps in reducing the amount of data that needs to be processed, improving the performance of the data warehouse. Therefore, using aggregates in a dimensional model is essential for optimizing data retrieval and analysis processes.

Submit
192. The extract process is which of the following? 

Explanation

The correct answer is "Capturing a subset of the data contained in various operational systems." This means that the extract process involves selecting and capturing only a portion of the data from different operational systems. It does not involve capturing all of the data or capturing data from decision support systems.

Submit
193. Attempt to find a function which models the data with the least error is known as 

Explanation

Regression is the process of finding a mathematical function that best fits a given set of data points. It involves determining the relationship between the independent variables and the dependent variable, and minimizing the error between the predicted values and the actual values. In this context, the question is asking for the term that describes the attempt to find a function that models the data with the least error, which is known as regression.

Submit
194. What are goals of testing

Explanation

The goals of testing include ensuring data transformation, data completeness, and data quality. Data transformation refers to the process of converting data from one format to another, ensuring that it is accurate and usable. Data completeness ensures that all necessary data is present and accounted for, without any missing or incomplete information. Data quality focuses on the accuracy, reliability, and consistency of the data, ensuring that it is reliable and meets the required standards. These goals are essential in testing to ensure that the data being used is accurate, complete, and of high quality.

Submit
195. Which folder allows you to access reports or documents that ran automatically using schedules? 

Explanation

The History List folder allows you to access reports or documents that ran automatically using schedules. This folder keeps a record of all the reports or documents that have been generated and run on a schedule. It provides a convenient way to access and review these automatically generated reports or documents.

Submit
196. WHY BI TESTING IS NECESSARY?

Explanation

BI testing is necessary because it ensures the reliability, consistency, and accuracy of the information provided by the business intelligence system. It also addresses the need for data quality, ensuring that the data used for decision-making is accurate and reliable. Additionally, BI testing helps in identifying and fixing bugs in the code, leading to bug-free and efficient systems. Ultimately, BI testing is essential for making strategic decisions based on reliable and accurate data.

Submit
197. The generic two-level data warehouse architecture includes which of the following? 

Explanation

The generic two-level data warehouse architecture includes at least one data mart. A data mart is a subset of a data warehouse that is focused on a specific functional area or department within an organization. It contains a subset of data from the data warehouse that is relevant to the specific area it serves. This architecture allows for a more focused and efficient analysis of data for specific business needs.

Submit
198. This type of report or document already has all of the content defined at run time. 

Explanation

Static is the correct answer because a static report or document already has all of its content defined at run time. This means that the content does not change or update dynamically based on user input or other factors. Instead, the content is fixed and remains the same each time the report or document is accessed or viewed.

Submit
199. The .(dot) shell command

Explanation

The given correct answer is "can be used to change the environment of the current shell". This means that the .(dot) shell command is capable of modifying the environment settings of the current shell. It can be used to set or modify environment variables, define aliases, and execute shell scripts that affect the current shell's environment.

Submit
200. What is the need for data warehouse 

Explanation

A data warehouse is needed to integrate data from different sources because organizations often have data stored in various systems and formats. By consolidating this data into a single, unified repository, decision-makers can access a comprehensive view of the organization's information, enabling them to make more informed decisions. The data warehouse is subject-oriented, meaning it is designed to focus on specific subject areas such as sales, finance, or customer data. It is also time variant, as it stores historical data and allows for analysis of trends and patterns over time. Lastly, a data warehouse is non-volatile, meaning that data is not updated or changed once it is stored, ensuring data integrity and consistency.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 19, 2016
    Quiz Created by
    AkshayMishra
Cancel
  • All
    All (200)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Stratification is a Technique used to analyze/divide a universe of...
Software Testing is a process of evaluating a system by manual or...
Configuration Management Plan describes the Configuration Management...
Path Tested = Number of Path Tested / Total Number...
Maintenance Plan predicts the maintenance requirements of the system,...
Validation plan describes the approach ,resources and schedule used...
Types of quality tools are Problem Identification...
Quality plan describes the quality procedures and standards that...
Cost of quality = Prevention Cost + Appraisal...
Control Charts is a statistical technique to assess, monitor, and...
Product Risk affects The quality or performance of the software
Staff development plan describes how the skills and experience of the...
Splitting project into tasks and estimate time and resources required...
Earlier a defect is found the cheaper it is to fix it.
Requirement and Analysis, Design, Development or Coding, Testing and...
Application should be stable. Clear Design and Flow of the application...
Check Sheet(Checklist) is considered a simple , but powerful...
Project Risk affects The Schedule or Resources.
Cost of Production = Right The First time cost(RTF) + Cost...
Control charts is a statistical technique control,monitor the...
The syntax 'head -c 5 f2.txt' is correct.
. which of the following is used to compare ?
Inode :
Data warehousing and on-line analytical processing (OLAP) are _______...
The process of removing the deficiencies and loopholes in the data is...
. Which of the following views can you use to display reports
Defects generally fall into the following categories? 
Why unix access I/O? 
Why inode is used? 
Business Risk affects The Organization developing or Procuring...
Software testing which is done without planning and...
Which of the following statements about prompts is true?  
Which of the following statements about prompts is true? 
Testing is done to  
What are the types of charts ? 
Technology not suited for data mining?
What are the types of charts ? , 
What is multi dimensional data? 
What is multi demsional data
Absence of a definite need for testing will lead to which of the...
The following technology is not well-suited for data mining: 
In a system,if 5 people are currently using the vieditor,then the no....
Expansion of CRM
Features of Shell Scripting
A spelling error on the user interface screen what severity does this...
How severely the bug is effecting the application is called as 
------------- means under what test environment(Hardware, software set...
Which of the following holds the data which does'nt belongs to either...
Defect report can be? 
Types of Data mart?
The advantage of Binary files over text files is that
A Non-Functional Software testing done to check if the user interface...
In which SDLC model testing can be done in parallel?
White box testing is not called as___________ 
Alpha testing will be done at,
Conducted to validate that the application, database, and network they...
Naturally Evolving architecture occurred when an organization had a...
Which of the below is directory?
A useful tool to visualize, clarify, link, identify, and classify...
How can we change permissions for all files located in...
Bitwise operator used for
It is a set of levels that defines a testing maturity hieraecy 
The default permission bits of file when it is created for the first...
What are the Testing Levels? 
Standards and procedures for managing changes in an evolving software...
What is correct Software Process Cycle? 
Which Software Development Life cycle model will require to start...
Boundary value analysis belongs to which testing method? 
Dependent data marts 
Unix system calls?
A 'virtual house' is essentially: 
What are the Types of Integration Testing?  
A Plan to overcome the risk called as 
The default permission bits of file when it is created for the first...
Which of the following tasks does testing accomplish?
Informing to the developer which bug to be fix first is called...
The review and approved document (i.e. Test plan, System Requirement...
Choose the correct answer:
In order to populate the data warehouse, which of the following set of...
Data Warehouse provides the best support for analysis while OLAP...
$* : means
Retesting the entire application after a change has been made called...
TQM represents  
Optimization, Defect Prevention, and Quality Control. Its come under...
Relational databases allow you to navigate the data in ____________...
Dev/null 
Which is Black-Box Testing method? 
The need to synchronize data upon update is called 
Which of the following are not filter programs?
Which symbol represents filename followed to point to the locationof...
Name the events that will be analyzed, Count the named incidents, Rank...
The content of a data warehouse is said to be 'non-volatile',...
Beta testing will be done by 
Which one manages both current and historic transactions? 
Variance from product specifications is called?
To which of the following applications can you export report results?
What is the PID of Kernel?
Unit Testing will be done by 
A data warehouse is built as a separate repository of data, different...
Which of the following is not a cursor moment?
In a 3-tier architecture of the data warehouse, the OLAP engine is...
In Transformation alternate drill-down paths/alternate hierarchies...
Requirements Specification, Planning, Test case Design, Execution,Bug...
50) This Testing Technique examines the basic program structure and it...
 Which One of the following is NOT true? 
Management and Measurement, It will come under    
The most common source of change data in refreshing a data warehouse...
Which of following is used to change directory?
 What report manipulation involves moving individual attributes...
Which has pid 1?
The testing which is done by going through the code is known...
Command to get short description of chat? 
Phase Definition. It will come under
-This folder contains reports, documents, and other objects that are...
Which of the following process includes data cleaning, data...
Which type of prompt display option enables users to enter a single...
In unix the status of a process may be 
To check whether we are developing the right product according to the...
To check whether we have developed the product according to the...
Which of the following are true regarding ods?
Which is non-functional software testing? 
Wc is used for?
This type of testing method attempts to find incorrect or missing...
Acceptance testing is known as  
Taken jointly, the extract programs or naturally evolving systems...
Feature applying to data in data warehouse..
What is 'ROLAP'?  
Which command use the value of one variable as a variable name?
SPICE Means 
It provides a set of levels and an assessment model, and presents a...
Which is dependent data mart? 
Verification is
Graphs are important because--
The process that deals with the technical and management issues of...
A file in Command Window looks like...
Objects and reports can be used for scheduling using Options---
________ gives total view of an organization. 
An Important metric is the number of defects found in internal testing...
All reports in MicroStrategy are made up of a filter and the following...
Which of the following objects provides descriptive information from...
Integration, It will come under 
Executing the same test case by giving the number of inputs on same...
The name of the testing which is done to make sure the existing...
Logical data model consist of
This functionality enables a report to be divided into separate pages...
Data transformation includes which of the following?
Automation Testing should be done before starting Manual testing.
Choose the incorrect statements
Head +n +5 f2.txt
The following is true of three-tier data warehouses: 
This type of test include, how well the user will be able to...
The approach/document used to make sure all the requirements are...
AdHoc testing is a part of 
It measures the quality of processes used to create a quality...
In which approach of data warehousing, the transaction data is...
It measures the quality of a productIt is a specific part of the QA...
Tree is used as an index to provide access to records
What is data scrubbing? 
You want to display all the lines in a file, Proj_det, which begin...
After you run a report,what report manipulation enables you to view...
Types of reporting tools.
Which of these are unix shells
Types of editors
What is a data mart? 
Which of the following are properties of data mart?
Data warehouse bus matrix is a combination of
Among the following, which is NOT the objective of clustering?
An operational system is which of the following?
A data warehouse is said to contain a 'subject-oriented' collection of...
Retesting modules connected to the program or component after a change...
The load and index is which of the following?
A metric used to measure the characteristic of the methods, Techniques...
Transient data is which of the following?
Process involving extracting data from data repositories and making...
ODS is used for ______ and ______
  Retesting of a single program or component after a change...
Which of the following is the most important when deciding on the data...
Surrogate key properties
What are the properties of unix?
Which of the following has PID?
Which of the following objects enables users to select the information...
In MicroStrategy Web, a document can be displayed in which of the...
A metric used to measure the characteristic of documentation and code...
Business objects does not support multi data sources.
What is reconciled data? 
What are shell variable?
One of the techniques of implementing the OLAP engine is a...
The command    echo welcome >/dev/tty
Executing the same test case on a modified build called as 
This feature enables you to easily select the data you want to keep...
Why aggregate is used in dimensional model of data warehouse? 
The extract process is which of the following? 
Attempt to find a function which models the data with the least error...
What are goals of testing
Which folder allows you to access reports or documents that ran...
WHY BI TESTING IS NECESSARY?
The generic two-level data warehouse architecture includes which of...
This type of report or document already has all of the content defined...
The .(dot) shell command
What is the need for data warehouse 
Alert!

Advertisement