SlideShare una empresa de Scribd logo
1 de 41
Descargar para leer sin conexión
Verification and Validation

                 Assuring that a software system
                 meets a user's needs




Nitin V Pujari           B.E – CS - Software Engineering – Verification and Validation   Slide 1
Objectives
                 To introduce software verification and validation and to discuss the
                 distinction between them
                 To describe the program inspection process and its role in V  V
                 To explain static analysis as a verification technique
                 To describe the Cleanroom software development process




Nitin V Pujari                   B.E – CS - Software Engineering – Verification and Validation   Slide 2
Verification&Validation
Verification&Validation
Verification&Validation
Verification&Validation
Verification&Validation
Verification&Validation
Verification&Validation
Verification&Validation
Verification&Validation
Verification&Validation
Verification&Validation
Verification&Validation
Verification&Validation
Verification&Validation
Verification&Validation
Verification&Validation
Verification&Validation
Verification&Validation
Verification&Validation
Verification&Validation
Verification&Validation
Verification&Validation
Verification&Validation
Verification&Validation
Verification&Validation
Verification&Validation
Verification&Validation
Verification&Validation
Verification&Validation
Verification&Validation
Verification&Validation
Verification&Validation
Verification&Validation
Verification&Validation
Verification&Validation
Verification&Validation
Verification&Validation
Verification&Validation
Verification&Validation

Más contenido relacionado

La actualidad más candente

Ch 1 the software quality assurance challange
Ch 1 the software quality assurance challangeCh 1 the software quality assurance challange
Ch 1 the software quality assurance challange
Kittitouch Suteeca
 
Ch 6 development plan and quality plan
Ch 6 development plan and quality planCh 6 development plan and quality plan
Ch 6 development plan and quality plan
Kittitouch Suteeca
 
Subbu_Resume Systematics.doc
Subbu_Resume Systematics.docSubbu_Resume Systematics.doc
Subbu_Resume Systematics.doc
Subbu Raju
 
Chapter3 part3-cmm-for-cis6516
Chapter3 part3-cmm-for-cis6516Chapter3 part3-cmm-for-cis6516
Chapter3 part3-cmm-for-cis6516
ZUbaria Inayat
 
TechOut Solutions, LLC - A Short Introduction to Our Services and Processes
TechOut Solutions, LLC - A Short Introduction to Our Services and ProcessesTechOut Solutions, LLC - A Short Introduction to Our Services and Processes
TechOut Solutions, LLC - A Short Introduction to Our Services and Processes
Kabeed Mansur
 

La actualidad más candente (18)

Ch 1 the software quality assurance challange
Ch 1 the software quality assurance challangeCh 1 the software quality assurance challange
Ch 1 the software quality assurance challange
 
Process impact
Process impactProcess impact
Process impact
 
Resume
ResumeResume
Resume
 
Software engineering fundamentals
Software engineering fundamentalsSoftware engineering fundamentals
Software engineering fundamentals
 
Software engineer
Software engineerSoftware engineer
Software engineer
 
Lect2 quality factor
Lect2 quality factorLect2 quality factor
Lect2 quality factor
 
Software quality program and establishiment cocepts
Software quality program and establishiment coceptsSoftware quality program and establishiment cocepts
Software quality program and establishiment cocepts
 
Software Engineering Solved Past Paper 2020
Software Engineering Solved Past Paper 2020 Software Engineering Solved Past Paper 2020
Software Engineering Solved Past Paper 2020
 
Fundamental software engineering activities
Fundamental software engineering activitiesFundamental software engineering activities
Fundamental software engineering activities
 
Ch 6 development plan and quality plan
Ch 6 development plan and quality planCh 6 development plan and quality plan
Ch 6 development plan and quality plan
 
Ch 5 contract review
Ch 5 contract reviewCh 5 contract review
Ch 5 contract review
 
Iv2515741577
Iv2515741577Iv2515741577
Iv2515741577
 
What is software development life cycle
What is software development life cycleWhat is software development life cycle
What is software development life cycle
 
Subbu_Resume Systematics.doc
Subbu_Resume Systematics.docSubbu_Resume Systematics.doc
Subbu_Resume Systematics.doc
 
Ch 3 software quality factor
Ch 3 software quality factorCh 3 software quality factor
Ch 3 software quality factor
 
Swebokv3
Swebokv3 Swebokv3
Swebokv3
 
Chapter3 part3-cmm-for-cis6516
Chapter3 part3-cmm-for-cis6516Chapter3 part3-cmm-for-cis6516
Chapter3 part3-cmm-for-cis6516
 
TechOut Solutions, LLC - A Short Introduction to Our Services and Processes
TechOut Solutions, LLC - A Short Introduction to Our Services and ProcessesTechOut Solutions, LLC - A Short Introduction to Our Services and Processes
TechOut Solutions, LLC - A Short Introduction to Our Services and Processes
 

Destacado

Critical System Specification in Software Engineering SE17
Critical System Specification in Software Engineering SE17Critical System Specification in Software Engineering SE17
Critical System Specification in Software Engineering SE17
koolkampus
 
Operating System Deadlock Galvin
Operating System  Deadlock GalvinOperating System  Deadlock Galvin
Operating System Deadlock Galvin
Sonali Chauhan
 

Destacado (13)

Safety specification (CS 5032 2012)
Safety specification (CS 5032 2012)Safety specification (CS 5032 2012)
Safety specification (CS 5032 2012)
 
Critical System Specification in Software Engineering SE17
Critical System Specification in Software Engineering SE17Critical System Specification in Software Engineering SE17
Critical System Specification in Software Engineering SE17
 
Critical systems engineering
Critical systems engineeringCritical systems engineering
Critical systems engineering
 
OS - Deadlock
OS - DeadlockOS - Deadlock
OS - Deadlock
 
Software engineering critical systems
Software engineering   critical systemsSoftware engineering   critical systems
Software engineering critical systems
 
Deadlocks in operating system
Deadlocks in operating systemDeadlocks in operating system
Deadlocks in operating system
 
Intro to Deadlocks
Intro to DeadlocksIntro to Deadlocks
Intro to Deadlocks
 
Chapter 7 - Deadlocks
Chapter 7 - DeadlocksChapter 7 - Deadlocks
Chapter 7 - Deadlocks
 
Deadlocks in operating system
Deadlocks in operating systemDeadlocks in operating system
Deadlocks in operating system
 
Deadlock ppt
Deadlock ppt Deadlock ppt
Deadlock ppt
 
System security
System securitySystem security
System security
 
Operating System Deadlock Galvin
Operating System  Deadlock GalvinOperating System  Deadlock Galvin
Operating System Deadlock Galvin
 
Black Box Testing
Black Box TestingBlack Box Testing
Black Box Testing
 

Similar a Verification&Validation

Critical Systems Specification
Critical Systems SpecificationCritical Systems Specification
Critical Systems Specification
Joe Christensen
 
Posecco clustering meeting
Posecco clustering meetingPosecco clustering meeting
Posecco clustering meeting
fcleary
 
ResourcesCh. 2, Software Quality Attributes, of Softw.docx
ResourcesCh. 2, Software Quality Attributes, of Softw.docxResourcesCh. 2, Software Quality Attributes, of Softw.docx
ResourcesCh. 2, Software Quality Attributes, of Softw.docx
sjennifer395
 
ResourcesCh. 2, Software Quality Attributes, of Softwar
ResourcesCh. 2, Software Quality Attributes, of SoftwarResourcesCh. 2, Software Quality Attributes, of Softwar
ResourcesCh. 2, Software Quality Attributes, of Softwar
myrljjcpoarch
 
Chapter 10 software certification
Chapter 10 software certificationChapter 10 software certification
Chapter 10 software certification
Piyush Gogia
 
Identity Verification System Based on Gait Recognition
Identity Verification System Based on Gait RecognitionIdentity Verification System Based on Gait Recognition
Identity Verification System Based on Gait Recognition
Mingyang Zheng
 
Identity Verification System Based on Gait Recognition
Identity Verification System Based on Gait RecognitionIdentity Verification System Based on Gait Recognition
Identity Verification System Based on Gait Recognition
Mingyang Zheng
 

Similar a Verification&Validation (20)

Cost Estimation
Cost EstimationCost Estimation
Cost Estimation
 
Defect Testing
Defect TestingDefect Testing
Defect Testing
 
Rep
RepRep
Rep
 
Software Requirements
Software RequirementsSoftware Requirements
Software Requirements
 
Critical Systems Specification
Critical Systems SpecificationCritical Systems Specification
Critical Systems Specification
 
Introduction
IntroductionIntroduction
Introduction
 
Project Management
Project ManagementProject Management
Project Management
 
User Interface Design
User Interface DesignUser Interface Design
User Interface Design
 
Architectural Design
Architectural DesignArchitectural Design
Architectural Design
 
Software quality
Software qualitySoftware quality
Software quality
 
What Is Verification vs. Validation In Software Testing?
What Is Verification vs. Validation In Software Testing?What Is Verification vs. Validation In Software Testing?
What Is Verification vs. Validation In Software Testing?
 
Posecco clustering meeting
Posecco clustering meetingPosecco clustering meeting
Posecco clustering meeting
 
ResourcesCh. 2, Software Quality Attributes, of Softw.docx
ResourcesCh. 2, Software Quality Attributes, of Softw.docxResourcesCh. 2, Software Quality Attributes, of Softw.docx
ResourcesCh. 2, Software Quality Attributes, of Softw.docx
 
ResourcesCh. 2, Software Quality Attributes, of Softwar
ResourcesCh. 2, Software Quality Attributes, of SoftwarResourcesCh. 2, Software Quality Attributes, of Softwar
ResourcesCh. 2, Software Quality Attributes, of Softwar
 
The Role of Verification and Validation in System Development Life Cycle
The Role of Verification and Validation in System Development Life CycleThe Role of Verification and Validation in System Development Life Cycle
The Role of Verification and Validation in System Development Life Cycle
 
Software evolution and Verification,validation
Software evolution and Verification,validationSoftware evolution and Verification,validation
Software evolution and Verification,validation
 
6 pma salehuddin - pqp & 3 core process procedures
6   pma salehuddin - pqp & 3 core process procedures6   pma salehuddin - pqp & 3 core process procedures
6 pma salehuddin - pqp & 3 core process procedures
 
Chapter 10 software certification
Chapter 10 software certificationChapter 10 software certification
Chapter 10 software certification
 
Identity Verification System Based on Gait Recognition
Identity Verification System Based on Gait RecognitionIdentity Verification System Based on Gait Recognition
Identity Verification System Based on Gait Recognition
 
Identity Verification System Based on Gait Recognition
Identity Verification System Based on Gait RecognitionIdentity Verification System Based on Gait Recognition
Identity Verification System Based on Gait Recognition
 

Más de Joe Christensen

Live a life_that_matters
Live a life_that_mattersLive a life_that_matters
Live a life_that_matters
Joe Christensen
 

Más de Joe Christensen (20)

Live a life_that_matters
Live a life_that_mattersLive a life_that_matters
Live a life_that_matters
 
Advanced Comuter Architecture Ch6 Problem Solutions
Advanced Comuter Architecture Ch6 Problem SolutionsAdvanced Comuter Architecture Ch6 Problem Solutions
Advanced Comuter Architecture Ch6 Problem Solutions
 
Advanced Computer Architecture chapter 5 problem solutions
Advanced Computer  Architecture  chapter 5 problem solutionsAdvanced Computer  Architecture  chapter 5 problem solutions
Advanced Computer Architecture chapter 5 problem solutions
 
Advanced Computer Architecture Chapter 123 Problems Solution
Advanced Computer Architecture Chapter 123 Problems SolutionAdvanced Computer Architecture Chapter 123 Problems Solution
Advanced Computer Architecture Chapter 123 Problems Solution
 
Two Choices
Two ChoicesTwo Choices
Two Choices
 
IEEE 12207
IEEE 12207IEEE 12207
IEEE 12207
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
 
Lecture 15
Lecture 15Lecture 15
Lecture 15
 
Lecture 12
Lecture 12Lecture 12
Lecture 12
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
 
Lecture 8 9
Lecture 8 9Lecture 8 9
Lecture 8 9
 
Lecture 10
Lecture 10Lecture 10
Lecture 10
 
Lecture 7n
Lecture 7nLecture 7n
Lecture 7n
 
Lecture 6
Lecture 6Lecture 6
Lecture 6
 
Lecture 5
Lecture 5Lecture 5
Lecture 5
 
Lecture 4
Lecture 4Lecture 4
Lecture 4
 
Lecture 14
Lecture 14Lecture 14
Lecture 14
 
Moble Communication
Moble CommunicationMoble Communication
Moble Communication
 
Ch20
Ch20Ch20
Ch20
 
Ch18
Ch18Ch18
Ch18
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

Verification&Validation

  • 1. Verification and Validation Assuring that a software system meets a user's needs Nitin V Pujari B.E – CS - Software Engineering – Verification and Validation Slide 1
  • 2. Objectives To introduce software verification and validation and to discuss the distinction between them To describe the program inspection process and its role in V V To explain static analysis as a verification technique To describe the Cleanroom software development process Nitin V Pujari B.E – CS - Software Engineering – Verification and Validation Slide 2