Why decision tables are not used in boundary value, Software Engineering

Assignment Help:

Why decision tables are used in many cases instead of boundary value and equivalence partitioning analysis?

- A decision table is an efficient way to deal with combinations of things (for example inputs).

- Techniques of boundary value analysis and equivalence partitioning are generally applied to specific situations or inputs.

- If different combinations of inputs result in different actions being taken, it can be more difficult to show using equivalence partitioning and boundary value analysis that tend to be more focused on user interface.

- The other two specification based approaches - decision tables and state transition testing are more focused on business rules or business logic.

 


Related Discussions:- Why decision tables are not used in boundary value

Pl sql, The company wants to offer an incentive of free shipping to those c...

The company wants to offer an incentive of free shipping to those customers who have not returned for two months. Create a procedure named PROMO_SHIP_SP that determines who these c

What is infeasible path, Explain Infeasible Path? Program statement sequ...

Explain Infeasible Path? Program statement sequence that can never be implemented.

DFD AND DATA DICTIONARY, Hoosier Burger''s food ordering system dfd and dat...

Hoosier Burger''s food ordering system dfd and data dictionary

Core architectural concepts and their interrelationships, Question: (a)...

Question: (a) Discuss on the core architectural concepts and their interrelationships. (b) A telecommunications company is looking for a software architect for one its maj

The most important feature of spiral model, The most important feature of s...

The most important feature of spiral model is Risk management is the important feature of spiral model.

What is brainstorming, A group process for generating original and diverse ...

A group process for generating original and diverse ideas.

Describe the various types of restructuring techniques, Q.  Describe the v...

Q.  Describe the various types of restructuring techniques? Ans. Software restructuring modifies source code as well as data an effort to make it amenable to future changes

Explain various software risks, Explain various Software risks.  Typic...

Explain various Software risks.  Typical Software Risks:- 1. Dependencies: -Many risks arise because of dependencies of project on outside  agencies or factors. It is not

Describe requirement engineering, Define Requirement Engineering . Requi...

Define Requirement Engineering . Requirement Engineering is a process in which all of the activities required to maintain and create a system requirements document. The four

Define external coupling, Q. Define External coupling? External coupli...

Q. Define External coupling? External coupling: A form of coupling in that a module has a dependency to other module external to the software being developed or to a particul

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd