Chapter 3 5
Chapter 3 5
• Planning Phase: Risk evaluation, test estimation, test planning, and test organization.
• Execution Phase: Monitoring, defect management, test reporting, and analysis.
5. Test Plan
6. Test Strategy
• Methods:
o Manual data generation.
o Automated tools for faster, error-free data creation.
o SQL injection for backend testing.
o Third-party tools for specialized datasets.
9. Test Environment
• Types:
o Test scenario, test cases, test plan, requirement traceability matrix (RTM), test
strategy, bug report, execution report.
• Bug Reporting:
o Clear defect description, reproduction steps, expected vs. actual behavior, severity
levels.
• Types:
1. Test Incident Report: Documents defects.
2. Test Cycle Report: Summarizes activities per cycle.
3. Test Summary Report: Assesses release readiness.
• Categories:
o Reliability: System uptime and fault tolerance.
o Maintainability: Ease of updates and modifications.
o Usability: How user-friendly the software is.
o Portability: Compatibility across platforms.
o Correctness: Adherence to requirements.
o Efficiency: Speed and resource usage.
o Security: Protection against threats.
o Scalability: Ability to handle increased demand.
o Interoperability: Communication between different systems.
• ISO Standards:
o ISO/IEC 25010: Defines quality characteristics.
o ISO 9001: Ensures quality management.
o ISO/IEC 27001: Focuses on information security.
• IEEE Standards:
o IEEE 730: Quality assurance planning.
o IEEE 829: Test documentation.
• CMMI: Process improvement model.
• Six Sigma: Reduces defects.
• Importance:
o Builds trust among stakeholders.
o Ensures high-quality, risk-free products.
• Ethical Principles:
o Integrity: Report results honestly.
o Objectivity: Avoid biases.
o Confidentiality: Protect sensitive data.
o Accountability: Own testing decisions.
• Challenges:
o Pressure to manipulate results.
o Skipping critical testing due to deadlines.
o Handling sensitive data securely.
• Consequences of Unethical Behavior:
o Legal action.
o Loss of credibility.
o Harm to users.