Construct test case for the use case scenario

Assignment Help Software Engineering
Reference no: EM13658627

1. Answer questions (a)-(d) for the graph defined by the following sets:

N = {1, 2, 3, 4, 5}

N0 = {1}

Nf = {5}

E = {(1,2), (2,3), (1,3), (2,4), (4,1), (3,5)}

a) Draw the graph (Do not use a generation tool. Draw it yourself and scan in or use power point tool or similar one)

b) List test requirements (TR) and test paths for Node Coverage

c) List test requirements (TR) and test paths for Edge Coverage

d) List the test requirements (TR) for Edge-Pair coverage (requirements must be of edge length 2)

2. Answer questions (a)-(c) for the graph defined by the following sets:

N = {1, 2, 3, 4}

N0 = {1}

Nf = {4}

E = {(1,2), (2,3), (1,3), (3,2), (3,4), (1,4)}

Also consider the following (candidate) test paths:

t0 = [1,3,4 ]

t1 = [1, 4]

a) Draw the graph (Do not use a generation tool. Draw it yourself and scan in or use power point tool or similar one)

b) Does the given set of test paths satisfy Edge-Pair Coverage? If not, identify what edge(s) are missing.

c) List test paths that achieve Node Coverage but not Edge Coverage on the graph.

3. Using below definitions for the graph, use Data Flow tool to determine for variable x. Capture the screenshot of at least one execution and paste in the document.

Tool: 

N = {0,1, 2, 3, 4,5,6,7}

N0 = {0}

Nf = {7}

E = {(0,1),(1,2), (2,3), (2,4), (3,5), (4,5), (5,6),(6,5),(6,7),(1,7)}

def(1)=def(3)=use(2)=use(3)=use(6) =use(7)= (x)

def(0)=def(4)=def(6)=use(4)=use(7)=(y)

a) All-def coverage

b) All-use coverage

c) All-du-path coverage

4. Use the following program fragment for questions (a)-(c) below.

a=m;  // node 0

y = x; // node 1

if (m > 0)

{

a++; // node 2

}

else

{

a=2*y; // node 3

}

while (x < 5)    // node 4

{

y = 5*a; // node 5

x--;     // node 6

}

z = a + y; // node 7

(a) Draw a control flow graph for this program fragment (Do not use a generation tool. Draw it yourself and scan in or use power point tool or similar one). Use the node numbers given above.

(b) Which nodes have defs for variable a and which nodes have uses for variable a?

(c) Enumerate all of the du-paths for variable y.

5. For the following questions a-c, consider the method FSM for a (simplified) programmable thermostat. Suppose the variables that define the state and the methods that transition between states are:

partOfDay : {Wake, Sleep}

temp : {Low, Medium, High}

// Initially "Wake" at "Low" temperature

// Effects: Advance to next part of day

public void advance();

// Effects: Make current temp higher, if possible

public void up();

// Effects: Make current temp lower, if possible

public void down();

(a) How many states are there and what are they?

(b) How many edges are there and what are they?

(c) Draw and label the states (with variable values) and transitions (with method names). Notice that all of the methods are total.

(d) A test case is simply a sequence of method calls. Provide a test set that satisfies Edge Coverage on your graph (using state labels).

6. Use activity graph for ATM withdraw funds on page 90 (Fig 2.42) up to Prompt for Transaction and then use the below continuation for transfer selection to answer the (a)-(c) questions.

490_Draw a control flow graph.png

a) Construct a use case to include name, summary, actor, precondition, description, alternatives, and post condition

b) Construct a use case scenario (specific steps through use case)

c) Construct test case for the use case scenario with specific values for purpose, prereq, test data, steps, and expected output.

Reference no: EM13658627

Questions Cloud

Drill bit on variable-speed drill has constant angular : A drill bit on a variable - speed drill has a constant angular acceleration of 2.5 rad/s2. The drill has an initial angular speed of 5.00 rad/s (a) after 4.00s, what will the angular displacement of the bit be? (b) What will the drill bits final spee..
Decide distance of final image relative to converging lens : A diverging lens (f = -11 cm) is located 20.0 cm to the left of a converging lens (f =34.0 cm). A 3.00-cm-tall object stands to the left of the diverging lens, accurately at its focal point. Decide the distance of the final image relative to the conv..
Raw materials from goods store to production : Raw materials from goods store to production
Make or break a security posture : Ultimately, people make or break a security posture. People who do things they should not do, whether or not intentional, always trump the best technology.
Construct test case for the use case scenario : Draw the graph (Do not use a generation tool. Draw it yourself and scan in or use power point tool or similar one) and does the given set of test paths satisfy Edge-Pair Coverage? If not, identify what edge(s) are missing
Corporate portfolio management assignments : Corporate Portfolio Management Assignments
Compute the net energy added to the system as heat : A gas within a closed chamber undergoes the cycle shown in the p-V diagram of Fig. 18-37. The horizontal scale is set by Vs = 4m^3. Compute the net energy added to the system as heat during one complete cycle.
What emf is induced in the loop when the length : A square loop of wire is believed in a uniform 0.29 T magnetic field directed perpendicular to the plane of the loop. The length of every side of the square is decreasing at a constant rate of 5.8 cm/s. What emf is induced in the loop when the length..
Resistances of primary and secondary coils of a transformer : The resistances of the primary and secondary coils of a transformer are 59 and 13 Ω, correspondingly. Both coils are made from lengths of the similar copper wire. The circular turns of each coil have the similar diameter. Find the turn’s ratio Ns/Np.

Reviews

Write a Review

Software Engineering Questions & Answers

  Re usability in object oriented languages

Re-usability is ability to use code written for another condition. Most languages and programming paradigms support re-usability in some form.

  Discuss fault tolerance approaches that systems managers use

Windows server software works seamlessly with most hardware vendors that offer fault tolerant systems. Discuss fault tolerance approaches that systems managers use to assure continuity of operations.

  Develop user acceptance tests for the review

Develop User Acceptance Tests for the Review Content Query use case text description and create bug reports for any bugs you have identified in your executed tests.

  Choose one phase from the systems development life cycle

Choose one phase from the systems development life cycle to carry out, and present a summary of the core activities that you would undertake, with specific examples.

  Context of a software system

Identify some examples of testing a safety requirement and a reliability requirement in the context of a software system that controls the electrical components of a roller coaster at an amusement park

  Many midsized firms are investing in erp system packages

many midsized firms are investing in erp system packages such as sap and peoplesoft.comment on what you think might be

  Describe is-a-has-a-uses-a relationship

Determine which of the following best explains the relationship between given objects: is-a, has-a, uses-a, none of the preceding.

  Developing domain model class diagrams

The stock levels of each item are changed by the system with each purchase. However these levels need to be manually updated by a clerk in certain cases such as shipments of items from manufacturers, refunds, exchanges, etc.

  Compare and contrast the differences in architecting

the article is an overview of the topic of software architecture and contains several brief case studies in chapter 4.

  Company salamander energyuse a variety of sources of

company salamander energyuse a variety of sources of information the company website and annualperiodic reports for

  Explain the following command lines

For example, sed 's/fox/ox/g' file will replace all occurance of fox with ox and not the just the first one in file.

  Systems analysis and design methodologies

difference between "Requirements Determination" and "Requirements Structuring", deliverables on or after coding, testing and installation, distinction flanked by system documentation and user documentation, pertinent classes, attributes, operations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd