Software Testing Life Cycle
Software Testing Life Cycle
Contents of a SQA Plan, more broader than a test plan, are as follows:
• The IEEE standard for SQA Plan Preparation contains the following outline:
• Purpose
• Reference Documents
• Management
• Documentation
• Standards, Practices and Conventions
• Reviews and Audits
• Software Configuration Management
• Problem Reporting and Corrective Action (Software Metrics to be used can be
identified at this stage)
• Tools, Techniques and Methodologies
• Code Control
• Media Control
• Supplier Control
• Records, Collection, maintenance and Retention
This phase can be further broken down into the following steps:
• Review Inputs: The requirement specification document, feature specification
document and other project planning documents are considered as inputs and the test
plan is further disintegrated into smaller level test cases.
• Formats: Generally at this phase a functional validation matrix based on Business
Requirements is created. Then the test case format is finalized. Also Software Metrics
are designed in this stage. Using some kind of software like Microsoft project, the
testing timeline along with milestones are created.
• Test Cases: Based on the functional validation matrix and other input documents, test
cases are written. Also some mapping is done between the features and test cases.
• Plan Automation: While creating test cases, those cases that should be automated are
identified. Ideally those test cases that are relevant for Regression Testing are
identified for automation. Also areas for performance, load and stress testing are
identified.
• Plan Regression and Correction Verification Testing: The testing cycles, i.e. number
of times that testing will be redone to verify that bugs fixed have not introduced
newer errors is planned.
Configuration management
• Employs naming and numbering conventions
• Saved in specified formats, file types
• Is versioned to match software under test
• Includes test objects needed by the case, such as databases
• Stored as read
• Stored with controlled access
• Stored where network backup operates
• Archived off-site