当前位置:网站首页>Interview questions for software testing - a collection of interview questions for large factories in 2022
Interview questions for software testing - a collection of interview questions for large factories in 2022
2022-07-02 12:42:00 【Software testing】
It's another job hopping season , Recently, many friends have come to consult :
Looking for a software testing job , How to prepare for a technical interview ?
Less than 2 year , I want to change jobs and see opportunities , Is there an interview question for software testing ?
The demand for jobs is relatively high , So the article is “ Software test interview questions ” Let's share .
One 、 Short answer
Demand problems encountered in the project , Can you communicate directly with customers ?
1、 How to solve the uncertain requirements in the requirements review ?
2、 How to conduct requirements testing ?
3、 What are the black box testing strategies ?
4、 What are the test case design methods ?
5、 What is a good test case ?
6、 What qualities do you think testers need to have ?
7、 What is the purpose of the test ?
8、 What are the stages of testing ?
9、 Which models are in the test ?
10、 What should be included in the software test plan ?
11、OSI The agreement is divided into several layers ? What is the function of each layer ?
12、QTP How many recording modes are there ? When to use ?、
Intermediate test questions
35、 What is load testing ? What is performance testing ?
36、 What software tests are included in the performance test ( At least mention 3 Kind of )
37、 Briefly describe the use of software testing tools Loadrunner Steps for
38、 When can I start performance testing ?
39、 What is the assembly point ? What's the point of setting a set point ?Loadrunner Which is the set point function in ?
40、 What is interface testing ? What are the rules at the beginning of the interface ?
41、 When to use automated testing ? What is the purpose of automated testing ?
42、 In automation , What is the keyword of assertion ?
43、 Use Java perhaps python Write a multiplication table
44、LoadRunner What are the components ?
45、 What is a scene ? What is the importance of the scene ? How to set the scene ?
46、 you are here LR How to write custom functions in ? Please give me some functions you wrote in previous projects .
47、 How do you set up iterations in different environments ?
48、 What is the relationship between response time and throughput ?
49、 Explain how to LR Configure system counters in ?
50、 How do you identify performance bottlenecks ?
51、selenium How to determine the existence of an element in ?
52、selenium in hidden Or is it display = none Whether the element of can be positioned to ?
53、selenium How to ensure the success rate of operation elements ? That is to say, how to ensure that the elements I click on must be clickable ?
54、 How to improve selenium The speed of script execution ?
55、 What is the execution strategy for your automation use cases ?
56、 What is continuous integration ?
57、 Is it necessary to connect to the database for data verification when testing automatically ?
58、id,name,class,xpath, css selector These attributes , Which one do you prefer the most , Why? ?
59、 How to locate dynamically loaded elements on a page ?
60、 What is assertion ?
61、 If you choose an automated test plan , Which language would you choose ,java,js,python still ruby?
62、 What do you think is the biggest drawback of automated testing ?
63、get and post The difference between ?
Advanced test questions
Single topic selection
1、 In the following network protocol , The connection oriented protocol is : A Transmission control protocol B User datagram protocol C Internet protocol D Internet control message protocol
stay /etc/fstab File system load parameters specified in the file , Parameters are generally used for CD-ROM Mobile devices such as . A defaults B sw C rw and ro D noauto
Linux Total file permissions 10 Bit length , Divided into four sections , The third paragraph says . A file type B Permissions of the file owner C Permissions of the file owner's group D Permissions of other users
Terminate the commands and operations that a foreground process may use . A kill B ;+C C shut down D halt 5. In the use of mkdir Command to create a new directory , The option to create a parent directory first when its parent directory does not exist is . A -m B -d C -f D -p
The following about i The node description is wrong . A i Nodes and files are one-to-one ( Each file has a unique index node number corresponding to it , For an index node number , But there can be multiple filenames corresponding to ) B i Node can describe the number of blocks occupied by the file C i The node describes the file size and the pointer to the data block D adopt i The node implements the transformation of the logical structure and physical structure of the file
A file name is rr.Z, The commands you can use to decompress are : . A tar B gzip C compress D uncompress
There are many C The function of language , Also called filter . A csh B tcsh C awk D sed
A host should communicate with another LAN through LAN , What needs to be done is . A Configure domain name server B Define a route from the local computer to the network C Define a local route to the network gateway D Define a local route to the target network gateway
The files needed to establish dynamic routing are . A /etc/hosts B /etc/HOSTNAME C /etc/resolv.conf D /etc/gateways
Network address of LAN 192.168.1.0/24, The gateway address of the LAN to connect other networks is 192.168.1.1. host 192.168.1.20 visit 172.16.1.0/24 When the network , Its routing is set correctly . A route add –net 192.168.1.0 gw 192.168.1.1 netmask 255.255.255.0 metric 1 B route add –net 172.16.1.0 gw 192.168.1.1 netmask 255.255.255.0 metric 1 C route add –net 172.16.1.0 gw 172.16.1.1 netmask 255.255.255.0 metric 1 D route add default 192.168.1.0 netmask 172.168.1.1 metric 1
Of the following , Do not belong to ifconfig The scope of the command is . A Configure local loopback address B Configure the IP Address C Activate network adapter D Load the network card into the kernel
The following about link descriptions , The wrong is . A Hard link is to link files i The node number points to the i node B Both hard links and symbolic links are creating a new i node C Links are divided into hard links and symbolic links D Hard connect cannot link catalog file
Used by a host in the local area network ping When testing the network connection by command, it is found that all hosts in the network can be connected with , Not connected to the public network , The problem could be . A host IP Wrong setting B No gateway is set up to connect to the local area network C The gateway of local area network or host is set incorrectly D LAN DNS Wrong server settings
In the following documents , Contains host names to IP The file of the address mapping relationship is : . A /etc/HOSTNAME B /etc/hosts C /etc/resolv.conf D /etc/networks
The case where you don't need to compile the kernel is . A When deleting device drivers not used by the system B When upgrading the kernel C When adding new hardware D Activate network card
stay shell There are four ways to assign variables in , among , use name=12 Method name of . A Direct assignment B Use read command C Use command line arguments D Use the output of the command
The command can intercept the data of the specified content from each line of the text file . A cp B dd c fmt D cut
The following are not Linux The system process type is . A Interactive process B Batch process C Daemon D Ready process
20. To configure Apache 1.3.19 The configuration file that the server needs to modify is _______ A httpd.conf B access.conf C srm.conf D named.conf
- The subsystems not included in the kernel are . process , Memory ,I/O, File management system A Process management system B Memory management system C I/O Management system D Hardware management system
22. In daily management , Usually CPU What can affect system performance is : . A CPU Full load operation B CPU The operating efficiency is 30% C CPU The operating efficiency is 50% D CPU The operating efficiency is 80%
23. If the memory of a computer is 128MB, The size of the swap partition is usually . A 64MB B 128MB C 256MB D 512MB
24. In the installation Linux The fifth step in the process is to let the user choose the installation method , If you want to install some components ( software program ), And let the system install automatically after the selection , The option that should be selected is . A full B expert C newbie D menu
25. Linux There are three commands for viewing files , If you want to view the content of the file, you can use the cursor to move up and down to view the content of the file , You should use command . A cat B more C less D menu
26. The following information is for a system ps –ef The running processes listed by the command , Process is running Internet Superserver , It monitors Internet sockets Connections on , And call the appropriate server to process the received information . A root 1 4.0 0.0 344 204? S 17:09 0:00 init B root 2 0.0 0.1 2916 1520? S 17:09 0:00 /sbin/getty C root 3 0.0 0.2 1364 632? S 17:09 0:00 /usr/sbin/syslogd D root 4 0.0 1344 1204? S 17:09 0:10 /usr/sbin/inetd
27. stay TCP/IP In the model , The application layer contains all the high-level protocols , In the following application protocols , It can realize the file transfer between local and remote hosts . A telnet B FTP C SNMP D NFS
28. When we can't connect to a remote network , You need to track route view , In order to find out where the problem is on the network , The order for this purpose is . A ping B ifconfig C traceroute D netstat
29. Right name is fido For documents of chmod 551 fido It's been modified , Then its license is . A -rwxr-xr-x B -rwxr–r-- C -r–r–r-- D -r-xr-x—x
30. stay i In the disk address table in the node table , If the length of a file is from the first... Of the disk address table 1 Block to 11 block , Then the document is in common possession Block number . A 256 B 266 C 11 D 256×10
31. use ls –al Command to list the following files , File is a symbolic connection file . A -rw-rw-rw- 2 hel-s users 56 Sep 09 11:05 hello B -rwxrwxrwx 2 hel-s users 56 Sep 09 11:05 goodbey C drwxr–r-- 1 hel users 1024 Sep 10 08:10 zhang D lrwxr–r-- 1 hel users 2024 Sep 12 08:12 cheng
32. DNS Domain name system is mainly responsible for host name and Analysis between . A IP Address B MAC Address C network address D Host alias
33. WWW The server is Internet Most widely used on , It USES the structure . A The server / The workstation B B/S C Centralized D Distributed
34.Linux The system goes through Command to send messages to other users . A less B mesg y C write D echo to
35.NFS yes System . A file B disk C The network file D operation
36. Commands can be found in the Linux Complete the backup of files to tape in the security system of . A cp B tr C dir D cpio
37.Linux File system files are classified according to their functions in the relevant directory , For external device files , Generally, it should be placed in Directory . A /bin B /etc C /dev D /lib
38. It's restarting Linux The system writes the information in memory to the hard disk at the same time , You should use Command implementation . A # reboot B # halt C # reboot D # shutdown –r now
39. Network management has the following functions : Configuration Management 、 、 Performance management 、 Security management and billing management, etc . A fault management B Daily backup management C Upgrade management D Send E-mail
40. On the proxy server , The right is . A Use internet Existing public proxy server on , Just configure the client . B A proxy server can only proxy clients http Request . C The set proxy server can be used by any host on the network . D Clients using proxy servers don't have their own ip Address .
41. close linux System ( Do not restart ) Commands available . A Ctrl+Alt+Del B halt C shutdown -r now D reboot 42. from IP Address to Ethernet MAC The command for address translation is : . A ping B ifconfig C arp D traceroute
43. stay vi Command mode in editor , type You can add a new line under the current line of the cursor . A ; B ; C ; D A
44. stay vi Command mode in editor , Delete character usage at current cursor command . A ; B ;; C ; D ;;
45. stay vi Command mode in editor , Repeat the last operation on the edited text , You can use command . A up arrow B Down arrow C <.>; D <*>;
47. The delete file command is : . A mkdir B rmdir C mv D rm
48. In the following names , Do not belong to DNS The server type is :______ A Primary Master Server B Secondary Master Server C samba D Cache_only Server
49. Network administrator to WWW Server access 、 Control access and operation , These controls are available at Reflected in the document . A httpd.conf B lilo.conf C inetd.conf D resolv.conf
50. Mail forwarding agent is also called mail forwarding server , It can be used SMTP agreement , You can also use C agreement . A FTP B TCP C UUCP D POP
51. start-up samba Server process , There are two ways : Independent startup mode and parent process startup mode , The former is in Start as an independent process in file . A /usr/sbin/smbd B /usr/sbin/nmbd C rc.samba D /etc/inetd.conf
52.DHCP Is the abbreviation of Dynamic Host Configuration Protocol , Its function is to enable the network administrator to manage a network system through a server , Automatically assign... To hosts in a network ______ Address . A The Internet B MAC C TCP D IP
53. To ensure that the server starts automatically when it starts DHCP process , Should be In the document dhcpd=no Change it to dhcpd=yes. A rc.inet1 B lilo.conf C inetd.conf D httpd.conf
54. The command to archive files is . A dd B cpio C gzip D tar
55. The command to change the file owner is . A chmod B touch C chown D cat
56. The command to find the string matching the set condition in the given file is : . A grep B gzip C find D sort
57. Create a new file using the command . A chmod B more C cp D touch
58. In the following commands , The command that cannot display the contents of a text file is : . A more B less C tail D join
59. Using anonymous login ftp when , The user is called . A users B anonymous C root D guest
60. In practice , Want to know the command logname Usage of , You can type Get help . A logname --man B logname/? C help logname D logname --help
61. If LILO Installed in MBR, Use Command to uninstall LILO. A lilo –u B lilo –c C lilo –v D lilo -V 62. Application command ls –al When viewing files and directories , To view the content scrolled across the screen , Key combination should be used . A Shift+Home B Ctrl+ PgUp C Alt+ PgDn D Shift+ PgUp
63.mc yes UNIX Style operating system . A file editor / Program compiler B Window tools for configuring the network C directory browser / File manager D Samba Server management tools
64.i Node is a A long watch , Table contains information about the file . A 8 byte B 16 byte C 32 byte D 64 byte
65. File permission read 、 Write 、 The three symbols to be executed are . A rwx B xrw C rdx D srw
66.Linux The length of the filename must not exceed Characters . A 64 B 128 C 256 D 512
67. There are three states of a process : . A Ready state 、 Execution state and exit state B Exact state 、 Fuzzy state and random state C Running state 、 Ready state and waiting state D Manual state 、 Self dynamic and free state
68. Start process from background , The command should be signed at the end . A & B @ C # D $
69. Not part of the mail system . A The user agent B proxy server C Transport agent D delivery agent
70. stay Shell Script , Used to read the contents of various fields in the file and assign them to Shell The command for the variable is . A fold B join C tr D read
71.crontab The file consists of six domains , Space between each field , They are arranged as follows : . A MIN HOUR DAY MONTH YEAR COMMAND B MIN HOUR DAY MONTH DAYOFWEEK COMMAND C COMMAND HOUR DAY MONTH DAYOFWEEK D COMMAND YEAR MONTH DAY HOUR MIN
72. use ftp When transferring files , There are two patterns : . A Word and binary B .txt and Word Document C ASCII and binary D ASCII and Rich Text Format
73. The permissions of members outside the group of a file are read-only ; Owner has full rights ; The permissions within the group are read and write , The permission of the file is . A 467 B 674 C 476 D 764
74. stay DNS During system test , set up named Process number is 53, command Notify process to reread profile . A kill –USR2 53 B kill –USR1 53 C kill -INT 63 D kill –HUP 53
75.Apache The default answer port number of the server is . A 1024 B 800 C 80 D 8
76.PHP and MySQL Combined use of . A stay Proxy Handle database access on
B stay WWW Dealing with the illegal access of hackers on the server C stay WWW Dealing with database access on the server D stay Sendmail Dealing with database access on the mail system
77.OpenSSL It's a . A Encryption software B Mail system C Database management system D Embedded scripting language
78.Samba The configuration file for the server is . A httpd.conf B inetd.conf C rc.samba D smb.conf
79. About DNS The server , The right thing to say is . A DNS Server configuration does not need to configure the client B Create a partition's DNS Only one master needs to be established for the server DNS The server C Lord DNS Server needs to be started named process , And the auxiliary DNS Server does not need D DNS Server's root.cache The file contains information about the root name server
80. Exiting interactive mode shell, Should be typed . A ; B ^q C exit D quit
The house needs to be built layer by layer , Knowledge needs to be learned at one point one . We should lay a good foundation in the process of learning , More hands-on practice , Don't talk much , The last dry goods here ! I stayed up late to sort out the stages ( function 、 Interface 、 automation 、 performance 、 Test open ) Skills learning materials + Practical explanation , Very suitable for studying in private , It's much more efficient than self-study , Share with you .
Get off w/x/g/z/h: Software testing tips dao
Typing is not easy , If this article is helpful to you , Click a like, collect a hide and pay attention , Give the author an encouragement . It's also convenient for you to find it quickly next time .
边栏推荐
- LeetCode—剑指 Offer 51. 数组中的逆序对
- [I'm a mound pytorch tutorial] learning notes
- Docsify deploy IIS
- Use sqoop to export ads layer data to MySQL
- 一些突然迸发出的程序思想(模块化处理)
- Drools executes the specified rule
- 线性DP AcWing 897. 最长公共子序列
- 高性能纠删码编码
- arcgis js 4. Add pictures to x map
- "As a junior college student, I found out how difficult it is to counter attack after graduation."
猜你喜欢

防抖 节流

Rust search server, rust quick service finding tutorial

趣味 面试题

Simple use of drools decision table
![[ybtoj advanced training guidance] cross the river [BFS]](/img/4e/83f14452ea6410768cdd01e725af2e.jpg)
[ybtoj advanced training guidance] cross the river [BFS]

Distributed machine learning framework and high-dimensional real-time recommendation system

js 迭代器 生成器 异步代码处理 promise+生成器 -> await/async

Openssh remote enumeration username vulnerability (cve-2018-15473)

kubenetes中port、targetPort、nodePort、containerPort的区别与联系

JS6day(DOM结点的查找、增加、删除。实例化时间,时间戳,时间戳的案例,重绘和回流)
随机推荐
单指令多数据SIMD的SSE/AVX指令集和API
Leetcode - < dynamic planning special> Jianzhi offer 19, 49, 60
Adding database driver to sqoop of cdh6
线性DP AcWing 898. 数字三角形
Writing method of then part in drools
高性能纠删码编码
[ybtoj advanced training guide] similar string [string] [simulation]
Use MySQL events to regularly perform post seven world line tasks
哈希表 AcWing 841. 字符串哈希
[I'm a mound pytorch tutorial] learning notes
Go学习笔记—基于Go的进程间通信
Distributed machine learning framework and high-dimensional real-time recommendation system
一些突然迸发出的程序思想(模块化处理)
Input box assembly of the shutter package
JS8day(滚动事件(scroll家族),offset家族,client家族,轮播图案例(待做))
AAAI 2022 | Peking University & Ali Dharma Institute: pruning and compression of pre training language model based on comparative learning
Go learning notes - multithreading
AI mid stage technology research
哈希表 AcWing 840. 模拟散列表
Oracle从入门到精通(第4版)