Demonstrate with a high degree of confidence that errors

Assignment Help Computer Networking
Reference no: EM13309917

The goal of testing is to demonstrate that the software satisfies its requirements and to demonstrate with a high degree of confidence that errors, which could lead to unacceptable failure condition, have been removed. The following sections describe three basic areas of testing that apply to testing programs: (1) normal range testing, (2) robustness testing, and (3) stress testing. These categories of test cases should be applied to unit, or class, testing and integration testing, which are described in the following sections. The following figure illustrates four basic categories of testing2:

1. White box, or structural testing, is testing that takes into account the internal mechanism of a component or system. This includes branch testing, path testing, and statement testing. It is important to note that a white box test, may or may not be directly traceable to a user requirement.
2. Black box, or requirements-based testing, is testing that ignores the internal mechanism of a component, or system, and focuses solely on the outputs generated in response to a selected set of inputs and execution conditions. Black box tests are directly traceable to user and derived requirements.
Normal range testing is where you will test the system under nominal operating conditions with nominal inputs to validate that the software performs its intended function. To meet this objective, a series of normal range test cases should be developed to demonstrate the ability of the software to respond to normal inputs and conditions.
• Real and integer input variables should be exercised using valid equivalence classes and boundary values.
• For time-related functions, such as filters, integrators, and delays, multiple iterations of the code should be performed to check the characteristics of the function.
• For state transitions, test cases should be developed to exercise the transitions possible during normal operation.
• For requirements expressed by logic equations, the normal range test cases should verify the variable usage and boolean operators.

Robustness test cases evaluate what happens when the system is outside the normal operational environment (i.e., what happens when something does go wrong). These robustness test cases demonstrate the ability of the software to respond to abnormal inputs and conditions. They should include real and integer variables that are exercised using equivalence class selection of invalid values.

• System initialization should be exercised during abnormal conditions.
• The possible failure modes of the incoming data should be determined, especially complex digital data strings from external systems.
• For loops where the loop count is a computed value, test cases should be developed to attempt to compute out-of-range loop count values.
• A check should be made to ensure that the protection mechanism for exceeded frame times responds correctly.
• For time-related functions, such as filters, integrators, and delays, test cases should be developed for arithmetic overflow protection mechanisms.
For state transitions, test cases should be developed to provide transitions that are not allowed by the software requirements.

The following section will discuss the concept of test case equivalence classes, which will help your team determine an adequate set of test cases.


Attachment:- 353768_1_Test-Plan-Outline-and-guidance.docx


Attachment:- 353768_2_CIS-470-Design-Specification-Template.docx


Attachment:- 353768_3_Data-Dictionary-Team-A.docx


Attachment:- 353768_4_Case-Project--TPS-WebSite.docx

Reference no: EM13309917

Questions Cloud

Plot the shape of water surface from the center to radius : a whirlpool is modeled as the combination of a free and a forced vortex. the maximum velocity in the whirlpool is 10 m/s, and the radius at the juncture of the free and the forced vortex is 10m.
Compute the activity and activity coefficient for ethanol : Calculate the activity and activity coefficient for ethanol in this solution. c. Calculate ?mixG for a solution that contains 0.12 moles of ethanol and 0.83 moles of chloroform at 35.0 oC.
What would be the maximum concentration in the air in units : The chemical 1,4-dichlorobenzene (1,4-DCB) is sometimes used as a disinfectant in public lavatories. At 20°C (68°F) the vapor pressure is 5.3 × 10-4 atm. (a) What would be the maximum concentration in the air in units of g/m3
Explain electron movement using the curved arrow convention : Predict the major organic product formed in the addition of HBr to 2,3-dimethyl-2-butene. Provide a stepwise mechanism for the reaction, showing all electron movement using the curved arrow convention.
Demonstrate with a high degree of confidence that errors : The goal of testing is to demonstrate that the software satisfies its requirements and to demonstrate with a high degree of confidence that errors, which could lead to unacceptable failure condition, have been removed.
How many joules of energy did friction absorb : A woman accelerates her motorized scooter, with the engine on, down a 13-m-long ramp that starts at a height of 2.2 m. how many joules of energy did friction absorb
Explain the osmotic pressure of the solution : In a 0.400 mol/kg aqueous solution of sucrose, the molarity of sucrose is 0.282 mol/dm3 and the density of water is 0.998 g/cm3 at 20oC and 1 atm. Estimate the osmotic pressure of this solution.
Compute the molar flow rate of air required for a fuel : Derive the equation relating x and R (use a graphical method), and then calculate the molar flow rate of air required for a fuel feed rate of 175kmol/h, assuming that CO and H2 are oxidized but N2 is not.
Determine the length of the open pipe : The fundamental frequency of a closed organ pipe is 264.9 Hz. What is the length of the open pipe

Reviews

Write a Review

Computer Networking Questions & Answers

  Reserved route takes over when device or connection fails

It determines new tree topology when switch or cable link failures. Reserved route takes over when device or connection fails. To aggregate ....to gather together Which is better, 10x100Mbps or 1Gbps?

  Advantages and disadvantages of remote access solution

Describe whether or not your network design will support dial-up or VPN remote access by using descriptions of following aspects: advantages and disadvantages of remote access solution.

  Design type of lan-windows server network operating system

It has already decided to use the Windows Server 2003 network operating system. What type of LAN will your team design for this company?

  Divide the network whose cidr address

Divide the network whose CIDR address is 165.221.204.0/25 into three subnets, with one subnet having half the addresses and the other two subnets having a quarter of the addresses each. Give the CIDR address of each subnet. How many addresses are ..

  Explain network communication simulation using vector

Network Communication Simulation using multidimensional vector. We want to simulate the communication cost between different nodes in a network. How to model the network nodes and communication cost

  Isps to disclose actual identities of people

It asks ISPs to disclose actual identities of these people. Should the ISPs comply with this request. Describe your reasoning

  How internet works for organization-s office administration

What would be needed along with precautionary measures, and an overview of how the Internet works for the organization's office administration.

  Subnets diagram working lan depicting network subnets

Subnet classful Class C network into 2 subnets Diagram working LAN depicting two network subnets (can be in Word of Visio) Network should include

  Attack can be detected and mitigated by stateless firewall

For each of the following attacks, say whether the attack can be detected and mitigated (to a significant degree) by a stateless or stateful firewall. Explain briefly.

  Data validation refers to checking the content

Data validation refers to checking the content of data to ensure that it satisfies certain rules, known as constraints. For example, the employee name should never be omitted in the employee table, and the delivery date should be after (greater th..

  Design entire cabling system for medical instrument

You have been asked to design the entire cabling system for a medical instrument manufacturer's new central warehouse. The company already has three buildings within two city blocks.

  Difference between symmetric and public key system

What is the most important difference between a symmetric key system and a public key system and in what way does a hash function provide a better message integrity check than a checksum

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd