Black Friday Biggest Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

ISTQB CTAL-TTA Dumps

Page: 1 / 18
Total 175 questions

Certified Tester Advanced Level Technical Test Analyst Questions and Answers

Question 1

The F in the mnemonic FIRST stands for Fast Which option correctly states the meanings of the other four letters (IRST)?

SELECT ONE OPTION

Options:

A.

isolated, Reliable. Self-Verifying, Timely.

B.

Independent, Reliable, Self-Validating, Timely

C.

independent. Repeatable, Self-Verifying, Thorough.

D.

Isolated. Repeatable. Self-Validating, Thorough.

Question 2

Which statement about test automation is TRUE7

SELECT ONE OPTION

Options:

A.

The term ‘test automation' refers to the automation of test execution

B.

Test automation can encompass include the configuration of test environments

C.

Creating and maintaining test automation frameworks is better done within the iteration teams

D.

it is more effective to have a single automation strategy for large projects

Question 3

What is MOST likely to be a consideration when implementing a new performance test tool?

Options:

A.

The lack of flexibility in the tool may mean that it is unable to generate incorrect inputs for all the different types of virtual user

B.

The load generation suggested by the operational profiles of the users may exceed the available hardware and network bandwidth of the tool

C.

The model used to describe the intended execution-time behavior of the system under test may not be compatible with the tool

D.

The language used for programming the system under test may be different from that used to develop the tool

Question 4

At which test level would reliability testing most likely be performed?

Options:

A.

Static testing

B.

Component testing

C.

System testing

D.

Functional acceptance testing

Question 5

Your team is now accountable for the support and enhancement of a payroll system that has been in production for many years and modified by many different developers. It has been noticed by management that small functional enhancements take much longer than equivalent changes on more recently developed systems. You have been tasked with implementing improved testing approaches that will help to identify the root cause of this problem.

Which of the following is the best technique to apply in this scenario?

Options:

A.

Orthogonal arrays

B.

Exploratory analysis

C.

Static analysis

D.

Data flow analysis

Question 6

You need to implement a Java class that validates a password entry field. The validation critena states that the password must:

1. be a minimum of 8 characters

2 contain at least one special character.

You are focusing on validation criterion 1 and have written a test class that checks that a 7 character password entry will fail validation.

You have written code designed to make this test class pass, however, on first execution of the test class it has failed

What should you do next9

SELECT ONE OPTION

Options:

A.

Repair the failing code and re-execute it for the test class

B.

Develop a test class with a 9 character password containing one special character and re-execute the code

C.

Add code to cover special character validation criterion 2

D.

Refactor the failing code to improve its design and structure

Question 7

Which of the following statements is TRUE regarding tools that support component testing and the build process?

Options:

A.

Component testing and build automation tools are only used by developers.

B.

Build automations tools facilitate manual testing at a low level by allowing the change of variables values during test execution.

C.

Component testing tools are typically specific to the programming language and may be used to automate unit testing.

D.

Component testing tools are the basis for a continuous integration environment.

Question 8

You have run static analysis tools against four large, complex code components (A, B, C, and D) with the following measures reported:

(Insert Table 1)

You must decide which component should be selected FIRST for applying maintainability improvements. The combination of Cohesion and Coupling is regarded as the MOST important factor, v/ith the number of repeated code sections as the next important factor.

Which component should you select?

as

Options:

A.

Component A

B.

Component B

C.

Component C

D.

Component D

Question 9

The requirements specification of a product begins with this sentence:

"The xyz system will provide many new user functions. These must be easy for our operators to use and tolerant of user input errors. These new functions must also be easy to learn. Because of very high transaction rates and limited processing power, the software design must be very efficient. The system must be available as close to 24x7 as possible.

Which three ISO 25010 major quality characteristics should be tested for possible defects with this implementation?

Options:

A.

Functional suitability, interoperability, learnability

B.

Usability, fault tolerance, operability

C.

Stability, security, accessibility

D.

Reliability, usability, performance efficiency

Question 10

You are working on the first release or an online dating service product Market research has shown that the site can expect to experience its heaviest usage during the months of January March June October. November and December During these months usage can be 2 to 10 times higher than dunng other times it has also been determined that people win not tolerate a wait time higher than 2 seconds for queries made regarding potential dates who have selected their profile Extensive usability studies have been done by the marketing department, including work with focus groups and comparative analysis of other similar sites The analysis on the project have provided detailed Ul mockups

in reading the design documents, you have discovered that the marketing team plans to run reports to analyze usage patterns to improve the advertising What item on the architecture review checklist will be important to verify to ensure these reports don’t impact the user response time?

Options:

A.

Connection pooling

B.

Load balancing

C.

Process isolation between OLTP and OLAP

D.

Lazy Instantiation

Question 11

Which of the following defect types is NOT an example of a defect type typically found with API testing?

Options:

A.

Data handling issues

B.

Timing problems

C.

High architectural structural complexity

D.

Loss of transactions

Question 12

Within an embedded software project, the maintainability of the software is considered to be critical. It has been decided to use static analysis on each delivered software component.

Which of the following metrics is NOT a maintainability metric typically used with static analysis?

Options:

A.

Number of Lines of Code (LOG)

B.

Number of Function Calls

C.

Mean Time Between Failures

D.

Comment Frequency

Question 13

You are an experienced tester on an Agile team that is producing a new application. The product backlog has been refined sufficiently to begin development for the first release. This stories in this backlog contain a mixture of functional and non-functional requirements, as well as some technical stories that will provide elements of the application's infrastructure The developers have decided to use TDD as a deveiopment approach but automation of the acceptance tests is not yet planned.

You have been asked to recommend whether or not the team should take an atdd approach as well as TDD. what would be the BEST recommendation in these circumstances?

SELECT ONE OPTION

Options:

A.

YES. use attd, but for the functional requirements only because it cannot be applied to non-functional or technical requirements.

B.

YES. use ATTD for all requirements including non-functional and technical stories.

C.

NO. do not use ATDD, because it will not work when the acceptance tests are not automated

D.

NO. do not use atdd. because it is not compatible with the developers' TDD approach.

Question 14

You are working on an internet banking project. Your company is offering this product to the financial market. For each new customer, some customization will typically be needed. To make the product successful there is a strong focus during development on a reliable and maintainable architecture. To support architectural reviews, a checklist will be developed. Within the checklist specific sections will be attributed to reliability and maintainability.

Which question from the list below should you include in the maintainability section of the architectural review checklist?

Options:

A.

Will the system use n-version programming for critical components?

B.

Will the user interface be implemented independently from the other software modules?

C.

Does the system have user-friendly error messages?

D.

Does the password protection of the system adhere to the latest regulations?

Question 15

Listed below are some possible findings from static analysis of a component containing approximately 1,000 lines of code. Which combination suggests that the component does NOT need refactoring for better maintainability?

A) Low measure of coupling.

B) Low measure of cohesion.

C) Low measure of commenting.

D) Low measure of complexity.

E) High measure of coupling.

F) High measure of cohesion.

G) High measure of commenting.

H) High measure of complexity.

Options:

A.

b, e, g

B.

a, d, h

C.

c, d, h

D.

d, f, h

Question 16

A medical company has performed a safety criticality analysis using the IEC61508 standard. The software components to be developed have been categorized by Safety Integrity Level (SIL). Most components have been rated at SIL 1 or 2, and a few components at SIL 4.

After some discussions with the QA manager, the project has decided to adhere to the recommendations for test coverage provided by the IEC61508 standard.

Which level and type of test coverage should at least be used for the components rated at Safety Integrity Level (SIL) 2?

Options:

A.

100% statement coverage, 100% decision coverage and 100% multiple condition coverage

B.

100% statement coverage, 100% decision coverage and 100% MC/DC coverage

C.

100% statement coverage and 100% decision coverage

D.

100% statement coverage

Question 17

The following user story has been written:

As a paying hotel guest

I want to see the charges that have been added to my bill

So that I can monitor my expenditure and know In advance how much I will have to pay when I check out

The notes that have been added to It mention that It must be possible for the guest to get a printout of the bill, see It In a variety of currencies and set a flag in the hotel's billing system against any Item that they wish to challenge.

The following acceptance criteria have been defined:

1.The user shall be able to choose from the most commonly-used currencies.

2.The application must be accessible on most mobile platforms as well as on the hotel room's smart TV.

3.The hotel manager must be notified whenever a bill item is flagged by a hotel guest.

4.End-to-end response time for any individual request submitted by a user must not exceed 7 seconds.

Applying the INVEST technique to this user story, including its acceptance criteria, which of the following statements is correct?

SELECT ONE OPTION

Options:

A.

The Testable and Negotiable criteria of INVEST have not been satisfied

B.

The Testable and Small criteria of INVEST have not been satisfied

C.

The INVEST criteria have all been satisfied by this epic

D.

The Negotiable and Small criteria of INVEST have not been satisfied

Question 18

Consider the code fragment provided below:

as

How many test cases are needed for the code fragment lines 26 - 37 to achieve 100% modified condition/decision coverage?

Options:

A.

2 test cases

B.

4 test cases

C.

6 test cases

D.

8 test cases

Question 19

Which of the following test categories would best characterize a test designed to confirm that the data backup tapes stored offsite by a bank can be retrieved and loaded within the business process service level agreement?

Options:

A.

Hazard testing

B.

Reliability testing

C.

Security testing

D.

Continuity testing

Question 20

Which statement is correct regarding the use of exploratory testing for safety critical systems?

SELECT ONE OPTION

Options:

A.

It should be used when black-box tests cannot be automated

B.

It is highly recommended for all risk levels

C.

It is not recommended, as manual black-box tests should be used instead

D.

It is highly recommended for low risk levels only

Question 21

You are conducting security tests on an e-commerce application. Many core areas have been tested and found to have no issues. Protection of users' private information has also been verified. You are now focusing on testing the UI, which captures query information from the user. Which of the following defect types should you target in your testing?

Options:

A.

Subsystem failures after prolonged stress

B.

Inaccurate user messages

C.

Buffer overflow

D.

Slow down in performance

Question 22

Which of the following statements is true regarding API and GUI testing?

Options:

A.

API testing usually tests Individual inputs rather than combinations whereas GUI testing usually tests combinations

B.

In a service-oriented architecture. GUI testing is more important because of the need to verify the service supplied to the user

C.

Negative testing is used primarily with GUI testing

D.

API testing usually requires the use of tools, whereas GUI testing usually does not

Question 23

Which statement is correct with respect to a mobile emulator tool?

Options:

A.

A mobile emulator models the mobile platform's runtime environment but not the hardware. The tested application differs from the application that will be distributed

B.

A mobile emulator models the hardware and utilizes the same runtime environment as the physical hardware. The tested application could also be used by the real device

C.

Unlike a mobile simulator tool, an emulator does not allow the setting of various usage parameters

D.

A mobile emulator tests the performance of a mobile device by subjecting it to high application loads

Question 24

Consider the following section of pseudo code and associated test Input data:

If withdrawal-amount <= amount-on-deposit then Set authorize-transaction = true

Else

If withdrawal-amount <= S100 AND preferred-customer = true then Set authorize-transaction = true

Else

Set authorize-transaction = false

Endif

Endif

Input data set #1

withdrawal-amount = 160

amount-on-deposit = 100

preferred-customer = true

Input data set #2

withdrawal-amount = 500

amount-on-deposit = 500

preferred-customer = false

Input data set #3

withdrawal-amount = 50

amount-on-deposit = 500

preferred-customer = false

What would be the decision coverage achieved if each of these test input data sets were run once?

Options:

A.

100%

B.

50%

C.

0%

D.

33%

Question 25

The last release of a hotel booking website resulted in poor system performance when hotel searches reached peak volumes. To address these problems in the forthcoming release, changes to the system architecture are to be implemented as follows:

Change 1 - Provision of a single Internet service using multiple servers, rather than a single server, to maximize throughput and minimize response time during peak volumes

Change 2 - Prevention of unnecessary database calls for objects that were not immediately needed by the calling applications. Achieved by not automatically creating database connections at the start of processing, instead only just before the data is required.

The system architecture document has been drafted and as Technical Test Analyst you have been invited to participate in its review. Which of the following review checklist items is MOST likely to identify any defects in the proposed system architecture for Change 2?

Options:

A.

Connection pooling

B.

Data replication

C.

Lazy instantiation

D.

Caching

Question 26

Which of the following is a valid reason for including security testing in a test approach?

Options:

A.

There is a threat of unauthorized copying of applications or data.

B.

To provide measurements from which an overall level of availability can be obtained.

C.

To evaluate the ability of a system to handle peak loads at or beyond the limits of its anticipated or specified workloads

D.

Software changes will be frequent after it enters production.

Question 27

Within the world of consumer electronics, the amount of embedded software is growing rapidly. The amount of software in high-end television sets has increased by a factor of about eight over the last six years. In addition, the market of consumer electronics has been faced with a 5 -10% price erosion per year. The price of a product is, among a number of other things, determined by the microcontroller used. Therefore, the use of ROM and RAM remains under high pressure in consumer electronic products, leading to severe restrictions on code size.

You are a Technical Test Analyst involved in the review of the architecture of this project.

Which of the following issues would be MOST important to focus on during the review and when verifying the correct implementation?

Options:

A.

Connection pooling

B.

Caching

C.

Transaction concurrency

D.

Lazy instantiation

Question 28

Consider the simplified logic below for crediting money to a bank account.

Receive money and account number to be credited

IF account number is valid

IF customer account is active

Store current account balance as oldBalance

Credit money to account

IF oldBalance < zero

IF balance now >= zero

Set message "Overdraft cleared"

ELSE

Set message "A/c overdrawn"

ENDIF

ELSE

Set message = "You have more money"

ENDIF

IF account holder is VIP customer

Send message by email to customer

ENDIF

ELSE

Set message "A/c inactive"

Send message by email to supervisor

ENDIF

ELSE

Add 1 to count of invalid inputs

ENDIF

What is the minimum quantity of test cases that will give 100% statement coverage?

Options:

A.

6

B.

5

C.

4

D.

3

Question 29

Which of the following is a generic risk factor that the Technical Test Analyst must consider?

Options:

A.

Integration of a new technology into the product

B.

Compliance requirements for local disability laws

C.

Errors in the business rules in the specifications

D.

Lack of an oracle for interest calculations

Question 30

As Technical Test Analyst on a test automation project covering the acquisition of a commercial test execution tool, what would you MOST likely be responsible for?

Options:

A.

Approving the estimated costs for implementing the test automation project

B.

Determining who will execute the automated tests

C.

Defining the business processes that will be used for keyword-driven testing

D.

Creating and supplying the data to be accessed by keyword-driven automation scripts

Question 31

An enhancement to a Social Media application allows for the creation of new Groups. Any number of existing application members can be added to a

Group. An attempt to add a non-existing member of the application to a Group will result in an error. Members can also be removed from an existing Group.

Existing Groups can also be deleted but only if there are no current members attached to it.

Which keyword-driven input table provides an adequate test of this enhancement?

Options:

A.

A group of people in a group Description automatically generated

B.

A group of people in a table Description automatically generated

C.

A group of people in a group Description automatically generated

D.

A group of people in a group Description automatically generated

Question 32

You are a Technical Test Analyst preparing load test scripts. You have been invited to a technical review of the system's operational profile document produced by the business. The meeting is next week, during your preparation you notice that volumetric data covering projected transaction volumes will be held in a separate document that will not be available before the meeting. What would be the BEST course of action?

Options:

A.

Request that the meeting be delayed until the volumetric document has been drafted and examined by the reviewers

B.

To avoid delay to the project, attend the review as scheduled and raise the issue at the meeting

C.

State that you are not a mandatory reviewer but request that both documents be sent to you once agreed

D.

Delay the review but limit schedule impact by presenting the volumetric document to the reviewers during the meeting

Question 33

You are working on project where re-use of software is an objective. You are involved in the project as a Technical Test Analyst and have been given the task to develop a checklist for code reviews.

Which question from the list below should you implement as part of the code review checklist?

Options:

A.

Are all modules, data, and interfaces uniquely identified?

B.

Can each item be implemented with the techniques, tools, and resources available?

C.

Is it possible during acceptance testing to verity whether the item has been satisfied?

D.

Are all variables defined with meaningful, consistent and clear names?

Question 34

A new web site has been launched for a testing conference. There are a number of links to other related web sites for information purposes. Participants like the new site but complaints are being made that some (not all) of the links to other sites do not work.

Which type of test tool is most appropriate in helping to identify the causes of these failures?

Options:

A.

Review tool

B.

Hyperlink tool

C.

Static analysis tool

D.

Dynamic analysis tool

Question 35

Which statement about test automation is TRUE?

SELECT ONE OPTION

Options:

A.

The number of test cases in the test suite increases by default from one iteration to another

B.

Test suite coverage can be increased without the need for refactoring

C.

Test development time should not consider changes to the test environments)

D.

Staff availability should not be allowed to constrain automated deployment

Question 36

Consider the pseudo code for the Price program:

as

Which of the following statements about the Price program describes a control flow anomaly to be found in the program?

Options:

A.

The Price program contains no control flow anomalies.

B.

The Price program contains unreachable code.

C.

The Price program contains data flow defects.

D.

The Price program contains an infinite loop.

Question 37

A unit test should be deterministic. Which option correctly describes the meaning of 'deterministic' as a characteristic of a unit test9

SELECT ONE OPTION

Options:

A.

It should be small so that many tests can be run in a short period of time

B.

Whenever it is run under the same conditions, it should produce the same results.

C.

it should not depend on any other test.

D.

It should only test the functionality related to it.

Question 38

You are planning an exploratory test session for the current sprint which includes the following user stories:

User Story AA-008

As a booked customer of Alpha Airways

I want to access an open flight reservation

So that I can update the booking details

User Story AA-012

As a booking clerk for Alpha Airways

I want to access a customer's flight reservation

So that i can view their reservation details

what three things should be considered when creating the session's test charter?

a)What are the user roles specified in the two user stories?

b)What level of coverage and efficiency was should be achieved by the session’

c)Will the session fit within a 60 to 120 minutes time box’

d)Do Will the findings from the exploratory sessions need to be documented?

e)What actions are performed by the user roles according to the acceptance criteria for these user stories’

f)Should the exploratory session be automated’

g)Has the Definition of Done been met for both user stories’

SELECT ONE OPTION

Options:

A.

a, c.e

B.

d. e.f

C.

a, b, d

D.

c.f.g

Question 39

A risk-based approach is being taken to test a new web-based retail application. Which of the following activities is the Technical Test Analyst NOT usually expected to perform?

Options:

A.

Understanding the probability of each technical product risk

B.

Assessing the likelihood of identified security risks

C.

Assessing the business impact of identified performance risks

D.

Designing tests to mitigate identified reliability risks

Question 40

In order to create a shareable testing service from server or network traffic log data, which of the following types of tool would you use?

SELECT ONE OPTION

Options:

A.

A service virtualization tool

B.

A hardware emulator

C.

a parallel development tool

D.

An integrated development environment

Question 41

You are responsible for planning the non-functional testing for a new product. You will be responsible for the performance testing and you have determined that you will need a simulator to complete your work, Which of the following are considerations when purchasing a simulator?

1.Path testing of the tool

2.Time to test the tool

3.cost of hmng specialists

4.Susceptibility to the "probe effect"

5.Method and bme to upgrade and retest the tool as the software changes

6.Control flow analysis

Options:

A.

1,4,6

B.

2, 3, 5

C.

4, 5,6

D.

1,2, 3, 4, 6

Question 42

Consider the pseudo code provided below regarding a customer request for cash withdrawal from an ATM.

If the customer has sufficient funds in their account

OR the customer has the credit granted

THEN the ATM machine pays out the requested amount to the customer

Which of the following test cases would be the result of applying multiple condition testing, but would NOT be the result of applying modified condition/decision testing?

Options:

A.

TC 1: Customer has sufficient funds. Credit has not been granted.

B.

TC 2: Customer does not have sufficient funds. Credit has been granted.

C.

TC 3: Customer does not have sufficient funds. Credit has not been granted.

D.

TC 4: Customer has sufficient funds. Credit has been granted.

Question 43

Below is the pseudo-code for the bingo program:

as

The bingo program contains a data flow anomaly. Which data flow anomaly can be found in this program?

Options:

A.

Variable "MIN" is not assigned a value before using it.

B.

Variable "AB is defined but subsequently not used.

C.

An invalid value is assigned to variable "B".

D.

The hard-coded value '2" should not be used.

Question 44

The following user story has been developed:

As a customer of Alpha Airways who has booked a flight

I want to access the flight reservation

So that I can update the booking details

Which BDD scenario written in Gherkin format correctly applies to this user story?

SELECT ONE OPTION

Options:

A.

Given that the logged-on user is a customer of Alpha Airways

When that user enters their surname correctly

Then they are able to see all flights currently booked so that they can select which flight they want to update

B.

Given that a customer has booked a flight with Alpha Airways

When that customer enters their surname AND enters the flight number for this reservation

Then the booking details for that flight are displayed

C.

Given that a customer has booked a flight with Alpha Airways

When that customer enters the correct surname and flight number for this reservation

Then the booking details for that flight are displayed

ELSE an appropriate error message is presented

D

Given that a customer has booked a flight with Alpha Airways

When that customer enters their surname and the flight number OR enters their customer ID

Question 45

Consider the following fault attack:

• Force all possible incoming errors from the software/operating system interfaces to the application.

Which of the following is the kind of failure you are looking for when using this attack?

Options:

A.

Application crashes when unsupported characters are pasted into an input field.

B.

Application crashes when the network is unavailable.

C.

Application crashes due to a lack of portability.

D.

Application miscalculates total monthly balance due on credit cards.

Question 46

You are defining the test approach for an Agile project release focused on significantly overhauling the user interface of a golf club's booking system. Additional features will allow more flexible bookings across three courses. These changes are driven by numerous customer complaints about the current system's confusing design and limited options. The release will consist of six two-week sprints.

Stakeholders have performed a risk assessment and consider the impact of system failure as high due to potential customer loss. A regression-averse strategy is recommended due to the extensive changes expected in screen design and functionality.

Which option below represents the BEST test approach for this release? Please use the following symbols consistently:

    + (highly recommended)

    (recommended)

    o (neutral/optional)

    • (not recommended)

    - (not to be used)

as

SELECT ONE OPTION

Options:

A.

3

B.

1

C.

4

D.

2

Question 47

A new system is being built to handle the message handling of financial transactions - this system is critical to the organization's finances. The code includes loops and decisions with several multiple conditions. The nature of the system means that tests are quite time-consuming to execute. Which of the following would be the BEST white box testing option for the new software?

Options:

A.

Multiple Condition coverage

B.

MC/DC coverage

C.

Decision coverage

D.

Statement coverage

Question 48

Which of the following is NOT a common issue with traditional capture/playback test automation?

Options:

A.

Difficult to maintain when software changes.

B.

Recorded scripts are difficult to maintain by non-technical persons.

C.

Data and actions are mixed in the recorded script.

D.

Execution of the recorded script is difficult outside office hours.

Question 49

Consider the following code segments.

Segment 1:

If a > b then setc = 12

elseif c >7 set c = 5

endif

Segment 2: setc= 12 for n = 1 to c

display c

endfor

Segment 3:

If (a > b) or (c < d) then

set c = 12

else

set c = 5

endlf

Segment 4:

set y = 4

call (segments)

segments:

start

for I = 1 to y

print y

endfor

end

Which segment would receive the highest cyclomatic complexity value?

Options:

A.

Segment 1

B.

Segment 2

C.

Segment 3

D.

Segment 4

Question 50

Which of the following statements about fault seeding tools is correct?

Options:

A.

Fault seeding tools insert defects into the source code to check the effectiveness of testing.

B.

Fault seeding tools insert defects into the source code to test the input checking capabilities of the software.

C.

Fault seeding tools insert defects into the source code to support the application of specification-based test design techniques.

D.

Fault seeding tools insert defects into the source code to check the level of maintainability of the software.

Question 51

Which option below BEST explains the value of a test charter in exploratory testing"5

SELECT ONE OPTION

Options:

A.

It provides expected test outcomes against which defects, if found, can be reported.

B.

It provides guidance for the tester at the beginning of a test session

C.

it provides bi-directional traceability to aspects of the epic or story under test

D.

It provides a way to prevent a test session’s timebox from being exceeded

Question 52

Given the following pseudocode:

Program tax check

BEGIN

yearly := 0

tax := 0

get (monthly)

get (tax_rate)

for I = 1..12 loop

yearly := yearly + monthly

tax := tax - (tax_rate * monthly)

ENDLOOP

salary := monthly * 12

IF salary = yearly THEN

print ("Salary OK")

ELSE

print ("Salary not OK")

ENDIF

year_tax := salary * tax_rate

IF year_tax = tax THEN

print ("Tax Problem")

ENDIF

END tax check

If control flow analysis is performed on the pseudocode, which of the following results is MOST likely?

Options:

A.

Unreachable code at lines 15 and 19

B.

Unreachable code at line 15

C.

Unreachable code at line 19

D.

No unreachable code

Page: 1 / 18
Total 175 questions