SlideShare una empresa de Scribd logo
1 de 19
Testing and Evaluating
     Software Design and Development
            Chapter 6 summary
Contents
Testing the Software
 Comparison of the Solution with the original Design
  Specification
 Generating relevant Test Data for Complex Solutions
 Levels of Testing
 Live Test Data
 Benchmarking
 Quality Assurance

Reporting on the Testing Process
 Documentation
 Communication
Testing the Software Solution
Testing is carried out to find errors

Software developers must continually ensure that the original specifications
are being met in the software product being developed

Construction of appropriate test data and adequate testing prevents the
occurrence of major problems in the finished program that are expensive to
fix.

Test data must be sufficient to ensure the program is completely operational
and free of logic errors.

Test data must be constructed to test every part of a program, including the
mainline of the program and any modules used by the program.
What should be tested?
Test data should test

   All parts of the program

   Each path of execution - test data should be sufficient to test the
    termination and correct exit of each loop. To test each path in nested If
    statement / CASE structure.

   Boundary conditions - the values of variables or expressions that
    determine the choice of available options to be taken. example


At the very minimum to execution paths should always be tested rather than
boundary conditions. Large programs should be tested using other testing
mechanisms.

Testing should include :Unit testing, program testing and system testing
Unit or Module Testing
Structured programming results in modules, each of which can be tested individually

Subprograms can be tested as a black box where data is entered and results are shown.

In black box testing, only the inputs and outputs are checked. The processes that achieve
these results are ignored.

Subprograms can also be tested as a white box where the algorithm of the subprogram is
understood and each path of execution can be tested appropriately.

White box testing examines all the data paths in a module.

A driver program may be developed to test modules in a program. The driver substitutes for
the main program, calling the subprogram and supplying the necessary values for any
variables.

A driver is a temporary section of code that is created to test an individual procedure or
module by calling it up and executing it.
Program Testing
It is a minimum requirement that the test data tests each logical pathway and program
branch that can be entered.

All modules are called and executed at least once or when expected

This way, the entire program can be completely tested.

Screen elements such as menus and buttons must be tested to ensure they are
functioning correctly.
System Testing
During system testing, the program is tested in a variety of operating environments.


The software may function in the development system or a controlled environment
however, when implemented on the users computer, problems may arise.


The effect of hardware, operating systems and other software may create errors that
have not been previously detected.


System testing is carried out to detect errors at the software / hardware interface,


Carried out by users rather than developers. System tests treat the program as a black
box.
Live Test Data
Live data is real data, used to ensure that a program works under real-life
conditions.


Real data is supplied by the client or can be generated by CASE tools.


Stress testing involves increasing the load on a program in an attempt to make it fail.


Live Test Data should include:

    Larger File Sizes

    Mix of Transaction Types

    Response Times

    Volume data

    Interfaces between Modules

    Comparison with Program Test Data
Live data is used to ensure that the system response times are appropriate. Response times
are dependent on all the system components, together with their interactions with each other
and other processes that may be occurring concurrently. Response times should be tested
on minimum hardware using typical data of different types.

Interface tests will ensure that the correct numbers of parameters are sent to and from the
module and that the format is correct. Interface tests will also detect conflicts between local
and global variables.


A variety of different transaction types and sequences of data entry should be tested with live
data. Module and program testing usually involve testing specific transactions or processes
one at a time. During system testing, transactions occur in random order and checked to see
if any errors arise

Software developers generate test data to test the limits of the system that may not be tested
under normal use. (to ensure the system has scalability)

A program developed to access files should be tested with a range of file types and sizes.
The use of large files will highlight problems associated with data access.
Benchmarking
A benchmark is a standard against which performance of a computer program can be
assessed against expected outcomes and other similar products on the market.

Established programs are often used as a benchmark to indicate the quality and
performance expectations of a new product.

Benchmarks allow users of software products to make informed purchasing decisions
Quality Assurance
Quality Assurance is a set of procedures used to certify that a generated product meets specified
criteria with respect to quality and reliability.

     Correctness - Does it do what it is supposed to do?

     Reliability - Does it do it all of the time?

     Efficiency - Does it do it the best way possible?

     Integrity - Is it secure?

     Maintainability - Can it be understood?

     (CREIM)


Quality Assurance is not just about testing a product once it has been completed. Its about
periodically performing inspections, reviews and tests on the system being developed.


Quality assurance techniques should be implemented throughout the software development
process.
Alpha & Beta Testing
Alpha Testing
   Testing of the final solution by personnel within the software
    development company prior to the product’s release.
   The client uses the system in a controlled environment and checks to see
    if it meets their requirements.


Beta Testing(Acceptance Testing)
   Testing of the final solution by a limited number of users outside the
    software development company using real world data and conditions.
   The program is given to a number of potential clients who will also report
    to the developers any problems they encounter in the program.
Reporting on the Testing Process
Required Documentation
 A test data table should be created to show the test data to be used
   and the reason why this item of test data was selected.
 Test requirements - What needs to be tested?
 Test plan - How do we implement these tests?
 Test data and expected results - What are the necessary inputs and
   the expected outputs?
 Test results - Do the actual results match the expected results?
 Recommendations - What needs to be done now
A desk-check table is used to document the test data
used and compare the expected output with the actual
output of the algorithm or program.

CASE Tools that aid in the testing process:
 Tools to generate or acquire data to be used during
  testing
 Tools that analyse the source code
 Simulation tools to mimic the roles of hardware or
  other software that interacts with the program
Communication
Independent testers are less likely to approach the program with
preconceptions.

It is essential that the user is provided with the opportunity to evaluate the
solution that has been developed.

Results of the testing provides an opportunity for the users to evaluate and
discuss the functionality of the new system.

Alpha and Beta testing help to provide users with the opportunity to use the
program.

After the customer has approved a program, it can be released to the general
market.
The End
Boundary Conditions
CASEWHERE age is

   <=3: output “Too young for school”
   <=18: output “Could be at school”
   OTHERWISE: output “Too old for school”

ENDCASE

An appropriate set of data could therefore be

                2      3       18     20.
                                                Back
Black box Testing




                    Back
White box Testing




                    Back

Más contenido relacionado

Similar a Testing Software Chapter 6 Summary

12 sdd lesson testing and evaluating
12 sdd lesson testing and evaluating12 sdd lesson testing and evaluating
12 sdd lesson testing and evaluatingMike Cusack
 
softwaretestingppt-FINAL-PPT-1
softwaretestingppt-FINAL-PPT-1softwaretestingppt-FINAL-PPT-1
softwaretestingppt-FINAL-PPT-1FAIZALSAIYED
 
softwaretestingppt-120810095500-phpapp02 (1).pdf
softwaretestingppt-120810095500-phpapp02 (1).pdfsoftwaretestingppt-120810095500-phpapp02 (1).pdf
softwaretestingppt-120810095500-phpapp02 (1).pdfBabaShaikh3
 
Testing Software Solutions
Testing Software SolutionsTesting Software Solutions
Testing Software Solutionsgavhays
 
SWE-401 - 10. Software Testing Overview
SWE-401 - 10. Software Testing OverviewSWE-401 - 10. Software Testing Overview
SWE-401 - 10. Software Testing Overviewghayour abbas
 
10. Software testing overview
10. Software testing overview10. Software testing overview
10. Software testing overviewghayour abbas
 
Testing in Software Engineering.docx
Testing in Software Engineering.docxTesting in Software Engineering.docx
Testing in Software Engineering.docx8759000398
 
Software testing
Software testingSoftware testing
Software testingEng Ibrahem
 
Software Testing PPT | Software All Testing
Software Testing PPT | Software All TestingSoftware Testing PPT | Software All Testing
Software Testing PPT | Software All Testingsankalpkumarsahoo174
 
Software testing basic
Software testing basicSoftware testing basic
Software testing basicRohit Singh
 
Interview questions for manual testing technology.
Interview questions for manual testing technology.Interview questions for manual testing technology.
Interview questions for manual testing technology.Vinay Agnihotri
 
unit 4.pptx very needful and important p
unit 4.pptx very needful and important punit 4.pptx very needful and important p
unit 4.pptx very needful and important p20EC040
 

Similar a Testing Software Chapter 6 Summary (20)

12 sdd lesson testing and evaluating
12 sdd lesson testing and evaluating12 sdd lesson testing and evaluating
12 sdd lesson testing and evaluating
 
softwaretestingppt-FINAL-PPT-1
softwaretestingppt-FINAL-PPT-1softwaretestingppt-FINAL-PPT-1
softwaretestingppt-FINAL-PPT-1
 
Testing strategies
Testing strategiesTesting strategies
Testing strategies
 
softwaretestingppt-120810095500-phpapp02 (1).pdf
softwaretestingppt-120810095500-phpapp02 (1).pdfsoftwaretestingppt-120810095500-phpapp02 (1).pdf
softwaretestingppt-120810095500-phpapp02 (1).pdf
 
Software Testing - SDLC Model
Software Testing - SDLC ModelSoftware Testing - SDLC Model
Software Testing - SDLC Model
 
Testing Software Solutions
Testing Software SolutionsTesting Software Solutions
Testing Software Solutions
 
Software testing
Software testingSoftware testing
Software testing
 
SWE-401 - 10. Software Testing Overview
SWE-401 - 10. Software Testing OverviewSWE-401 - 10. Software Testing Overview
SWE-401 - 10. Software Testing Overview
 
10. Software testing overview
10. Software testing overview10. Software testing overview
10. Software testing overview
 
Testing in Software Engineering.docx
Testing in Software Engineering.docxTesting in Software Engineering.docx
Testing in Software Engineering.docx
 
Software testing
Software testingSoftware testing
Software testing
 
Software_Testing_ppt.pptx
Software_Testing_ppt.pptxSoftware_Testing_ppt.pptx
Software_Testing_ppt.pptx
 
S.t.
S.t.S.t.
S.t.
 
testing.pptx
testing.pptxtesting.pptx
testing.pptx
 
Software Testing PPT | Software All Testing
Software Testing PPT | Software All TestingSoftware Testing PPT | Software All Testing
Software Testing PPT | Software All Testing
 
Software Testing
Software Testing Software Testing
Software Testing
 
Software-Testing-ppt.pptx
Software-Testing-ppt.pptxSoftware-Testing-ppt.pptx
Software-Testing-ppt.pptx
 
Software testing basic
Software testing basicSoftware testing basic
Software testing basic
 
Interview questions for manual testing technology.
Interview questions for manual testing technology.Interview questions for manual testing technology.
Interview questions for manual testing technology.
 
unit 4.pptx very needful and important p
unit 4.pptx very needful and important punit 4.pptx very needful and important p
unit 4.pptx very needful and important p
 

Más de mary_ramsay

Circumference of a Circle
Circumference of a CircleCircumference of a Circle
Circumference of a Circlemary_ramsay
 
RWG 5 For Mac Training Guide
RWG 5 For Mac Training GuideRWG 5 For Mac Training Guide
RWG 5 For Mac Training Guidemary_ramsay
 
All meta languages
All meta languagesAll meta languages
All meta languagesmary_ramsay
 
Sdd metalanguage
Sdd metalanguageSdd metalanguage
Sdd metalanguagemary_ramsay
 
The role of the cpu in the operation
The role of the cpu in the operationThe role of the cpu in the operation
The role of the cpu in the operationmary_ramsay
 
Sorting & Extracting Data
Sorting & Extracting DataSorting & Extracting Data
Sorting & Extracting Datamary_ramsay
 
SQL Structure Query Language
SQL Structure Query LanguageSQL Structure Query Language
SQL Structure Query Languagemary_ramsay
 
URL_universal Resourse Locator
URL_universal Resourse LocatorURL_universal Resourse Locator
URL_universal Resourse Locatormary_ramsay
 
IPT Assessment Schedule 2012
IPT Assessment Schedule 2012IPT Assessment Schedule 2012
IPT Assessment Schedule 2012mary_ramsay
 
Normalisation student summary
Normalisation student summaryNormalisation student summary
Normalisation student summarymary_ramsay
 

Más de mary_ramsay (12)

Circumference of a Circle
Circumference of a CircleCircumference of a Circle
Circumference of a Circle
 
RWG 5 For Mac Training Guide
RWG 5 For Mac Training GuideRWG 5 For Mac Training Guide
RWG 5 For Mac Training Guide
 
Sdd HSC Summary
Sdd HSC SummarySdd HSC Summary
Sdd HSC Summary
 
All meta languages
All meta languagesAll meta languages
All meta languages
 
Sdd metalanguage
Sdd metalanguageSdd metalanguage
Sdd metalanguage
 
The role of the cpu in the operation
The role of the cpu in the operationThe role of the cpu in the operation
The role of the cpu in the operation
 
Sorting & Extracting Data
Sorting & Extracting DataSorting & Extracting Data
Sorting & Extracting Data
 
SQL Structure Query Language
SQL Structure Query LanguageSQL Structure Query Language
SQL Structure Query Language
 
URL_universal Resourse Locator
URL_universal Resourse LocatorURL_universal Resourse Locator
URL_universal Resourse Locator
 
IPT Assessment Schedule 2012
IPT Assessment Schedule 2012IPT Assessment Schedule 2012
IPT Assessment Schedule 2012
 
IPT HSC Summary
IPT HSC SummaryIPT HSC Summary
IPT HSC Summary
 
Normalisation student summary
Normalisation student summaryNormalisation student summary
Normalisation student summary
 

Último

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 

Último (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 

Testing Software Chapter 6 Summary

  • 1. Testing and Evaluating Software Design and Development Chapter 6 summary
  • 2. Contents Testing the Software  Comparison of the Solution with the original Design Specification  Generating relevant Test Data for Complex Solutions  Levels of Testing  Live Test Data  Benchmarking  Quality Assurance Reporting on the Testing Process  Documentation  Communication
  • 3. Testing the Software Solution Testing is carried out to find errors Software developers must continually ensure that the original specifications are being met in the software product being developed Construction of appropriate test data and adequate testing prevents the occurrence of major problems in the finished program that are expensive to fix. Test data must be sufficient to ensure the program is completely operational and free of logic errors. Test data must be constructed to test every part of a program, including the mainline of the program and any modules used by the program.
  • 4. What should be tested? Test data should test  All parts of the program  Each path of execution - test data should be sufficient to test the termination and correct exit of each loop. To test each path in nested If statement / CASE structure.  Boundary conditions - the values of variables or expressions that determine the choice of available options to be taken. example At the very minimum to execution paths should always be tested rather than boundary conditions. Large programs should be tested using other testing mechanisms. Testing should include :Unit testing, program testing and system testing
  • 5. Unit or Module Testing Structured programming results in modules, each of which can be tested individually Subprograms can be tested as a black box where data is entered and results are shown. In black box testing, only the inputs and outputs are checked. The processes that achieve these results are ignored. Subprograms can also be tested as a white box where the algorithm of the subprogram is understood and each path of execution can be tested appropriately. White box testing examines all the data paths in a module. A driver program may be developed to test modules in a program. The driver substitutes for the main program, calling the subprogram and supplying the necessary values for any variables. A driver is a temporary section of code that is created to test an individual procedure or module by calling it up and executing it.
  • 6. Program Testing It is a minimum requirement that the test data tests each logical pathway and program branch that can be entered. All modules are called and executed at least once or when expected This way, the entire program can be completely tested. Screen elements such as menus and buttons must be tested to ensure they are functioning correctly.
  • 7. System Testing During system testing, the program is tested in a variety of operating environments. The software may function in the development system or a controlled environment however, when implemented on the users computer, problems may arise. The effect of hardware, operating systems and other software may create errors that have not been previously detected. System testing is carried out to detect errors at the software / hardware interface, Carried out by users rather than developers. System tests treat the program as a black box.
  • 8. Live Test Data Live data is real data, used to ensure that a program works under real-life conditions. Real data is supplied by the client or can be generated by CASE tools. Stress testing involves increasing the load on a program in an attempt to make it fail. Live Test Data should include:  Larger File Sizes  Mix of Transaction Types  Response Times  Volume data  Interfaces between Modules  Comparison with Program Test Data
  • 9. Live data is used to ensure that the system response times are appropriate. Response times are dependent on all the system components, together with their interactions with each other and other processes that may be occurring concurrently. Response times should be tested on minimum hardware using typical data of different types. Interface tests will ensure that the correct numbers of parameters are sent to and from the module and that the format is correct. Interface tests will also detect conflicts between local and global variables. A variety of different transaction types and sequences of data entry should be tested with live data. Module and program testing usually involve testing specific transactions or processes one at a time. During system testing, transactions occur in random order and checked to see if any errors arise Software developers generate test data to test the limits of the system that may not be tested under normal use. (to ensure the system has scalability) A program developed to access files should be tested with a range of file types and sizes. The use of large files will highlight problems associated with data access.
  • 10. Benchmarking A benchmark is a standard against which performance of a computer program can be assessed against expected outcomes and other similar products on the market. Established programs are often used as a benchmark to indicate the quality and performance expectations of a new product. Benchmarks allow users of software products to make informed purchasing decisions
  • 11. Quality Assurance Quality Assurance is a set of procedures used to certify that a generated product meets specified criteria with respect to quality and reliability. Correctness - Does it do what it is supposed to do? Reliability - Does it do it all of the time? Efficiency - Does it do it the best way possible? Integrity - Is it secure? Maintainability - Can it be understood? (CREIM) Quality Assurance is not just about testing a product once it has been completed. Its about periodically performing inspections, reviews and tests on the system being developed. Quality assurance techniques should be implemented throughout the software development process.
  • 12. Alpha & Beta Testing Alpha Testing  Testing of the final solution by personnel within the software development company prior to the product’s release.  The client uses the system in a controlled environment and checks to see if it meets their requirements. Beta Testing(Acceptance Testing)  Testing of the final solution by a limited number of users outside the software development company using real world data and conditions.  The program is given to a number of potential clients who will also report to the developers any problems they encounter in the program.
  • 13. Reporting on the Testing Process Required Documentation  A test data table should be created to show the test data to be used and the reason why this item of test data was selected.  Test requirements - What needs to be tested?  Test plan - How do we implement these tests?  Test data and expected results - What are the necessary inputs and the expected outputs?  Test results - Do the actual results match the expected results?  Recommendations - What needs to be done now
  • 14. A desk-check table is used to document the test data used and compare the expected output with the actual output of the algorithm or program. CASE Tools that aid in the testing process:  Tools to generate or acquire data to be used during testing  Tools that analyse the source code  Simulation tools to mimic the roles of hardware or other software that interacts with the program
  • 15. Communication Independent testers are less likely to approach the program with preconceptions. It is essential that the user is provided with the opportunity to evaluate the solution that has been developed. Results of the testing provides an opportunity for the users to evaluate and discuss the functionality of the new system. Alpha and Beta testing help to provide users with the opportunity to use the program. After the customer has approved a program, it can be released to the general market.
  • 17. Boundary Conditions CASEWHERE age is <=3: output “Too young for school” <=18: output “Could be at school” OTHERWISE: output “Too old for school” ENDCASE An appropriate set of data could therefore be 2 3 18 20. Back