0% found this document useful (0 votes)
65 views21 pages

SE Unit-4

Uploaded by

Kusuma Korlam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
65 views21 pages

SE Unit-4

Uploaded by

Kusuma Korlam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 21
Ei FS le tested 40 Unover evors woduced austing design and conssucion. yence> thas to done Ecbefully using ateshng gnateqy: a the Shrategy 1S developed by the propct rnanagen oboe &gineers and testnq spedolists | x tong 6 the PYO@sS OF Eecution Ota progam with the Mention OF Finding ors y ohategic pppidach to Softtoane testhy A testing Syateay provides o PIOLESS that desdiba for the Aevapey , Quality Analysts and thy Gustre the St2ps conducted as paste otteing a Testing slvotegy indudes: ) Test Planning ee ae a) Tek Ca design J) Teck Eecution , HW) Bato collechon B) Ebfeciveness Ga KON * Skategic Approach for sOftaane testing canbe + ! : > Tusk before oraaking the te stng process -- Mie " foyma) technical Revicwos" must be Condudad. => tht wi elmindie 21S etne aqua) testing prowss. err i a Q) At the beginning wanious components OF the Systm are tested, then gradualy Cath inlerfoxa ANA then entwe sysem is aed 3) pilerent vesting yechniques an ve appned ak Arfiaent point of time: owatagics Teck levels br conventional _sofeooce © for commana sofuoane. Various testing srateg ics aic> ) Unit Testing D Tite gration Testing D yardarion Testing 4) system Testing = 9nthis type oF testing tech niques One D unk Bohn enors 60m each Ss0ftruane aypred to delet the Component welvid ually. 2) Qnteqyation Teshng: Tk focuses oh tesues O=doutted with verircakon and program en een ats BS Components bean intra Ging conn one another. 2 Validation Testing: “rt provides asanane ype the cotoae yoldaton crite. cestapiehe” during mnequiten ents analyst? meets all) funchoral 5 pehawiTtialeand perbormonce arequivunents. ky syskm Testing: In syst testing all syste. elements pining the aypem is teskA as a Whob - ee fe ay ee ee [Testing SOPL LOA cAeuloynert | Shee gles Shale gles eye Ae sngnecin Onte gration Tes" nn a t Testing Be y: > 9n Unik wang | the indivi dua’ Byers ane ested independently to @hsure thei quality > Ae fFOalS 15 toUNVE the enor design and implementation. th eae source program | ye vignuxfoca f shocal daxo. shukwe} Generating ° 1 Bourdonyeendition » . * andependent path 5 \-e Gor Wandli < Paths be S - wee qi onit Testing a) Sdleqration Testing} ES | A.gioup of depenclemt component O76 ee Oe Yo ensure they quality of —(ei¥ inteqqaabor unit > She objective % to Lae uit tested components and putid, a program: ayuchne fra pas been dictated by cottwane desig”: => Onteqration resting '@ OF uso typed Besraen Flaws Snleqration resting CY) Non— incremental Oncremental integration Integration. Top clown Feshng Bottom up ialegraton Reqaxon 4 SMe xerbing: : Big Bang 8ncremental INtegration + Sncrermental Qnreqtabon 1s OF foun tYpat d) Top down Testing: > Mp doen testingis An incieyrental approach th Lohith modules one inde, satel by moving oon through the consol eyudoue. | one 7 thedales , ors > Modules Suboidinat to the main conko) madule are norpotated into the system in cithcn a depth yet 01 bréacth fuk manner i) Bottum UP Snteqration Testing: gn wotom Up integyation the moddes at the lowat jeuls Are inegiakd at firsts then nteqration '9 done by MOVING, UWA ty10Ugh the connol Syudwic- puver wi) Reqiessi on Testing : > Regression Testing Is uced to Check for, defects plopogatid to Othen modules by Changes iis to Kicking yrogsam Shus aegicssion lesinc is Used to meduca the side EHect= OF the charge . §) smoke Testing: > the omoke testing 15 a kihd OF integration testing technique used for time MCI PIOKAS vohenein the Wojecr needs oe assesxdon ficquent basis Felesing activihes perd fo be qmonediautin Smoke eee: is SoftOar compornts aleady framlattd nts coly " ehe “build” Can be Ane \nteqratd into a Whutld data ales, |branes ,rcusable modkales, 01 PY gram eOmp oncnts Dp coves c& tests ane design to CKpose CNOYS Foy build so that the’ build’ performs. its functioning coweaty, 3) Vaidaton Testino es i i > he inteq ratd sotto a Beh pascd On sequiemmts to enstve that tne desired + product iS ontaind- => validaton Testing wre fs: \ Accepkance ‘Testing; Ahe acceptance testing ieakind oftesting Conducted to Ensare that the sdltoane works Conedly th the user Usork © epyiTonmane- ‘ . 2a — = Dhe type OF acLeprancetosting wie 4 d Alpha test -° She alpha testing Is ateting Conduded (1 whith 'the venolon...0f Comp)éle — softwares test by the Customer unden: the. PERT Pooiniie 7 te She Supa Yisionof devdojen- 7 Tg lestingis yortormed ak daelgnrs si sofpaone fs Usdin Na turd a in. presen of dovdge. ‘oi test- » She btka testing Is.a testi in” ; a) Bea son of sofroae 1S tested boy the cacti the vonoi witht 4he deuloper eine, present - > of (te ee ee ; q ” S44 stem = “Testin qe she eyskem test 15 GQ seni@ OF io Gaully “the Compulta basecl system [ system Testing | (ee ee sel peritovmane- ecavery security Sess Testing Te a testing es ting l e55 Conduded ) Recov AY Testings- 7 RECVAY Teshihq iS intended to check the eyotam's ability to ewer fiom failure 2 nms type of testm q the software js forced te ful And then ib Is vethied Lohdhor thesysam Kove propenily O1 not - 1) seanity Testing: = secunily Testing veahies anak Syst pro mechaniom pruent improper pentyation 07 la tectiOn- altayakon - il) siess Teckng*: > Selene beak point oF A Sit fo es)abiish mOximum senvic. level: > On styestating the syst iS ‘extattad a marm | that demands mesource ih abromea! quantity » Frequency OY Volume - )) perfomance ating! " Pertormarce, testing evaluates the TUN tme - Rrformane ofthe software copectally veal Hne Softnane, % Blackbox Testing and boil pox “Tating Bere ane LWO genenal cppraaches for the sofb©on ty ie test wn’ YD Black box testing D while box testing to demonsiate Wear Ae the Name ) Black hox testing —> Dhe hack box testa is he Suan functtons ane O} in bhack hoy teste IEIS Yested whethor uséel perational - Saqgats the Inpur tS accepted properly and apt iS Comectiy produced. > he major focus OF PIACK box lesting 1900 FUNcviONS » CyerAtiOns, axternal tit farce» external 1 data and informestion . > Qt SS also Calle) as behavioural testing box re omg, methods fous on fundimal > Black | mequiremona oy softcore. {y Typo of Black box on ROC SP sy ip Shene ane Y typaok lIaCkh ox wsting~ They onet- . > | ) -€quiva)ena paotitioning : -> Here input value thak provide to Systm ane . divided into ddfeene Case > Snotad of Usiny @ach and. every input value, Use OMY OF yalue FIOM the GO4P to test outcome Age [2 gle agen x qceprs values From \8 toco i) Boundany Value analysis + Boundany Values Ome those that Cham the upper and lower Limit OF a vandhte: 3 or tats While chang boundany Value Lahethen dix sotttaanc js pooduaing Gin Outfrt OF hoe ange jg to 60 WGraph bases testing: ah Giaph oF Ob\asS Pesnt fh the system 1S Grated . => ach node yeprestnts | Obycce that iS pastibionny In the softsane system and Jinks -7epyesent Ihe ciepationship Qmong these. Objects atode Swecklink jonalle) / nics Bidive lad livk IV) Orthogonal amray testing: Wohin can Pe = dE isa Kind of feshnq method Qppied to the ay pycanom in which input “domain is relatively Smal) pue there could x lOsey: NO: DF test cose - 4 ad ond thus oegions can te, Te only Faulley cco, number of test case can be ed % while Box testing’: = On While box jeshng procedural A examined 9 this testing tre InaYne ey ye i ace aa le acer ng Jris major focus OF etails ome chostly Is Of SOP RSI fOTPLAREMS and deigns - J ignite box testing (eon intancd SUM 7 log\c fats, comvoltians » dato Foes > pnteina) data Sluchuya > Gendiwom | leaps Gie--- pilot faeiSed alae Tyre of _whitchox insta: > Qhere ane 4 HYY of yohile.box sing. 4) yar covewiog testing ' All pasetn_ poths ane dined ait endy ro Cat, go7MES 1M eqn © main & 5 i anal funk funB é ih tet : func fun é Bs eae Sg Se cl} D) Loop teshng, gEIs usd fo test the loop consiucks. (ahi. for snaked), es a 3) Branch coverage | condition testine iW Clee) condition é ay IN module. | > To test he lagya\ conditions in the P09 the condition testing is Used p Bacteyncnk—tovuiage Hue condi'bern teSh Ww Shotemene atlas ae >On vnich tesks pavers al) = me eeeincoae > gt sures +hat Cath srakement of the COALW KS eyed Ge least onée- > Hence each tine of code Is vetted pilderences bekiceen yohite Box and BlackBox testing | It1sa vooy OF cotton. tes BtISG Woy oF ustng the In \hidh the interne) Shrusdur “softyane in Whith Vetrhas H te program ot, the code ‘nowsied gg: ahout-the \nternal 5 hidden and potting | 1s Svulbure oF thé Code or the frown Clloout it' program Of the Sofhoane BlackBox Testi nq | whit Box al Code Imylementalion is nekes.5ouy £01 while box ; testing if |) Sin plenenteatipin of codé is — Not Needed) Or ee a ) 0 is eek, devi by SOftuane festu - iStismosty done by sofbogne developers , 7 & ND No Khovalectex ol Knowoketye Of iy Lumantation \MPleinnteation Is neecled (6 eneciuvyed %) Qtcan be Wartd loas AL isthe innen othe thlernray Cuter OF extemal sofhcay Sofneane wsting: a & 315 afunctional test | 9tisa shuctural Wer of OF the Softwar dhe Gott wore Dk 1s the hehaviowal IIS the lOQe tesihgos testing OF the somode]}. the cofronne 7 0Nb0 8) 9tiskalled as gtisaisa called ox behavioural testing . glasshox esting - ART OF BEBUGGING > atts a process OF concctng lugs found GeAia testing - > Stisa programmer Work. Hebuggin« Shoot © ' > 14 Hevaypny proces bewilt ~ pak? Risk: A Risk ia ‘40 unc Hal, % fr ores, 1010 paitive on mga af fut Leen sunt o7 Zondoten ona omhel on ssh Managemen : acy decision: baud or an => 4 tk a Prous Moline *SV/aludlivri es facloss -thad ! thyeale cle the buainer Vast ow gttivities that one eahusd put 404 vek paneer ane! > Rk sdenbficabior ai Ru i “lids % > Rick veftnemunh i ~> Rsk — Mittaetton: MotBlering and Manager okeaclie ¥ ¢ Prosubve Rick halgis Laokve ack Manag ant dvju +o yedurce tee darnag* " ig 4p veal ee Speed on Genre Yecavy Tom —Theny, luk assumed althose +hreals : ely ae proactiv - ¥isk Mana talan bres Hhrealk & oie | to reve ase Svenk fren tyes happening cm he fous place - (5) Pak peajutien > 4 amie vial projector Teck y () Tdenlitying phe srokhms Causr? mi © lig ihe robobily ve q pate E ilies a “ed 7 he ak macs a= Go the Pree da with Ov d 1 0) very De Ap deal ; (No haaro) A tors (1-28) ¢ Yow tisk (otros feck)” © Moderate (os-sot) 1 Mod evale vist CAeopast o lie) f) high (50-2 hy? visk [ropa paelmere budy)!) vay byh(te4) — Tote Zab ssc | 4 Tt is a aes 4 spaying the yich fm more dheles + vick veficuranl @n be nepal Wee ne tae £ Condikon - Lansiion —Comequenee (Te i claled and doy Vall an thie (Ondition Sub ton ‘Lon (an be divided Pte canine the Spot of Hue sub iidibvan tn onde a refine the Sile- thee vefincrant halos in seu) the urdalyin vritks this appeal take ik Sapiey foe the ond! Manager ty sal she sk tn gral date eau yes b The Condition is wy et of vik [sfas vis duel thod ne One tanks nb *i tlding a c "I Gite 6 . oO en be of bag Comer freanl* ; & echnical 8! wisks! oo Blatt, f, quait I. : q pfer Face , See ptgledaleants cre peg Me Ane | 6 x Hy oi Comcesne sith al alade pool, ferousee, custome ‘alabel ‘soy x Pig iduitt dulificahon 2 2 ogorees needs 4o ind sola bathe coc os eh as gable e ag Gthe topae | of vik on be aie bu roakiony affective aisk sacag cout If nn ee pf flat x bY duing bof a in Mellods One Ue = “They ane ob i hyp us o sab eal an opec a hi of 4h Heel db {fot oss. Vaelia sahes = Herel a Usd fo develop the gyskern afi pink ae = tial Ae are ete with ee an the I oP i oa. cxigalinal ie “ta er govyreneal then du 4s belo devas ilaole_xisk - ¢ isk = oa ‘yal 26) timation asks 54° ] Risk Management ee EC TL Sco ene oe RISK~ FE 15 A "Uncentain Event” oun yahidh Sheds +Ve ~oy—Vve On the sjw system. RiSk Manageme ent —identtyingnnal yon @> Refi ing Ssoiing ThervyiSIS ) Risk identification —tycoytisk Q) Risk projection (analysing rae Prone D RISK Rekinemenl> Caaing divi) by) 38M Calving) Us (dent fyi YY SUbYLEK ile going tore deep iy RNIM 4 al RISK Migianon. » » PIOnitoxing and Management J > There ase tiwte issues in H8deqy Gr havi ets. \s y Risk Avoidanw 2) Risk Monttow Pa S 3) RISK = Monagenent Risk Mitigation a ; Ly) = Risk » vitiey ation means preva NF the MN Sk% to Oy Cusk Avoidance). > Following axe tre sles to pe tOKeaaa tae the yisks. ) communrate vaittaconce ned stot} tofnd of pIOhable YiSk- @ find cut and Oiminate all tx Gaus. Hak aan Qeate vISk pete. the mayece Stacks D HwvlOp a yolity iy an organization vohich wai} Helpto Continue the piqyece wen though some aot \eave the OYgani gation - MD Goybedy fin the project Gee ARUI be acyuantcire With the Gayrent developreent actilly | ») Maintain the carresyanding Ete: Ws ; tmdy manne. 6) Conduct tnoely, ‘yaielos iacioea to speedup the work. Risk _monitoving => 90 Risk pontonny proccss sollowirg 4hings must pe cows montoed by the picjecr rronmt 1) he, GpprOath OF the” behavigus, oF fhe OM “members O» “pesoure oF piojece vores: ae ide ee Naat g) dhe tyre ® a” WEA co-cporaton Cmona team. members 3) Dee tyra Ob p rOvIeMs {hat ame OlcLmiNng pale Chyccave Ol RiSskmienitond is: 4) 90 Ureck tOrelhen tht precicta) YiekKs yey occuy OY Nr a) To cnsure the sleps denned to avoid the yo are appre propoty (cone 3) TS gather the | nformetian WbICh can be. usctul fou any zine the sisk : : Rok Management pigecte PAIOnager Porras this task When visk pecomes O> srealily - TF project manag ts sucessful 1 appying the projec mitigation eect then ik becomes VO1Y4 much easy te manage re YIoKS- Et Seninag) RMD plan mitiq ation | monitoring AGHIeA the mftigation | monitoting steps tousen TNA? | Contingency plan IE visk ymikiqation fais then the plan tor handing tre WK otatus end dale Approvo\ zrame ond signature Of peson | approving Casur> 5. date > she ISK infomation aeee: can be Mointained’ by database systems. After documenting the YiSkt Us ng ether RII plan ‘(©0! FIS® in formation Sreek tne Yisk mibicyction » monitoring & analysis acevités ome St0 pped- RMMM Plan The RMMM plan is a document in which all the risk analysis activities are described. Sometimes project manager includes this document as a part of overall project plan. Sometimes specific RMMM plan is not created, however each risk can be described individually using risk information sheet. Typical template for RMMM plan or Risk information sheet can be, Risk information sheet Project name ———— Date Probability Impact identified > Origin Assigned to Description Refinement/Context " Mitigation/Monitoring Trigger/Contingency plan Status Approval Closing date closure>. The risk information sheet can be maintained by database systems. After documenting the risks using either RMMM plan or Risk information sheet the risk mitigation, monitoring and analysis activities are stopped.

You might also like