Commit the test case documentation to version control

Assignment Help Management Information Sys
Reference no: EM131662574

Task

Assignment : Revolves around debugging a small application. This is an individual asssignment.

You will be provided with some code which contains several known bugs. The source code and initial bug reports will be made available in the Resources section of the subject's Interact site.

Your task is to replicate, simplify, trace, and eliminate these bugs using best practice debugging techniques. Your debugging effort should take place within a version control system using appropriately sized, commented, and timely commits.

Please note that the focus in this assignment is on the process and techniques applied, not the complexity of the code. It is recognised that the process applied is ‘way over the top' for the size of problem addressed.

Tasks

1. Replication.

a. For each of the reported bugs, generate a test case in UAT format that will reliably reproduce the buggy behaviour.

b. Commit the test case documentation to version control.

2. Simplification.

a. For each of the reported bugs, produce a simplified and automated test that reliably reproduces the bug.

b. Commit the test code demonstrating the bug to version control.

c. Record output from your test, demonstrating the buggy behaviour.

3. Tracing.

a. For each of the reported bugs, trace back through the programs dependences from the point of failure to find the origin of the bug.

Use a sequence of hypotheses and tests to support this search, and document this sequence in a debugging log.

b. For each of the reported bugs, demonstrate that before the identified origin, variable values are ‘sane' and that after the origin, at least one value is ‘infected'.

c. Record screen shots demonstrating the origin of the bug.

4. Resolution.

a. For each of the reported bugs, correct the bug.

b. Commit the corrected code to version control.

c. Record output listings from your automated test demonstrating that the buggy behaviour has been eliminated.

d. Carry out the user test case with the specified data and show that the buggy behaviour has been eliminated.

Reference no: EM131662574

Questions Cloud

Find the probability of getting two queens and three kings : If you are dealt 5 cards from a shuffled deck of 52? cards, find the probability of getting two queens and three kings.
The latest advances in encryption technologoies : What are some of the latest advances in encryption technologies?Who are the users of the encryption technology?
Should the fsia preclude the given lawsuit : Using the information provided in the chapter, answer the following questions. Should the Foreign Sovereign Immunities Act (FSIA) preclude this lawsuit? Why?
Establish a retirement savings plan : You are planning to establish a retirement savings plan by setting aside money at the end of each year.
Commit the test case documentation to version control : For each of the reported bugs, generate a test case in UAT format that will reliably reproduce the buggy behaviour.
Find the probability that the number is even and greater : The digits 5, 6, 7, 8 and 9 are randomly arranged to form a? three-digit number. ? (Digits are not? repeated.) Find the probability that the number is even.
Discuss the inter-professional collaboration : discuss the similarities and explain the differences. Discuss the inter-professional collaboration that is necessary in the public health nurse role
Why is honor such a critical aspect of public administration : Why is honor such a critical aspect of public administration? How does the nonprofit sector supplement the government in delivering social services?
Discuss the issues and risks in international transactions : Other Risks Involved A U.S. firm that does business internationally may also face other risks. Products manufactured or purchased abroad may T Issues and Risks.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Stretegic alliance agreementsare supply chain management

stretegic alliance agreementsare supply chain management and the establishment of strategic alliance agreements with

  Take a position on the idea of ipv6 being hailed

Take a position on the idea of IPv6 being hailed as the next generation of the Internet. Support your response with evidence or examples at least five examples. Critique the adoption and deployment of IPv6, and determine the security and networking..

  Examine the many different types of attacks

select the two that you believe are the easiest for success and why you consider these the easiest for success.

  What are advantage and disadvantage to doing survey research

Generally speaking, what are some advantages and disadvantages to doing survey research? Provide an example where the use of surveys (in-person, self report, etc) might be a good idea?

  Discuss the purpose and philosophical approach

Discuss the scope of the resource.Discuss the purpose and philosophical approach.Discuss the underlying assumptions.

  Define the expected benefits of the new system

Define the expected benefits of the new system and for intangible benefits, produce your assumptions using equivalent real-life case studies.

  Network design and latency - what kind of testing program

Network Design and Latency - What kind of testing program (Prototype or Pilot) would you recommend to test the video conferencing among the remote offices? Why did you choose the method over other options?

  Gap analysys - system development life cycle

Gap analysys - How might gap analysis be applied to the system development life cycle?

  Examine risks of going global with an e-commerce business

Compare the major advantages and disadvantages of starting an e-commerce business versus a traditional brick-and-mortar business. Examine the significant risks of going global with an e-Commerce business.

  Question about technologyhow is the trend toward open

question about technologyhow is the trend toward open systems connectivity and interoperability related to business use

  Value of multiple content repositories

Read the Wachovia Case Study, "Wachovia's CAS: Harnessing the Value of Multiple Content Repositories Across a Large Enterprise"

  Create information security nightmare for it administrators

Do social networking sites create an information security nightmare for IT administrators and should IT administrators block social networking sites by the firewall

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd