Write appropriate unit tests for the bitcoinpricer class

Assignment Help Computer Engineering
Reference no: EM131967085

Assignments

Task 1

Assignment: Use Mock Objects to Test Software

As explained in this week's readings, mocks provide a way of unit testing methods that depend upon other methods. Normally, this would be termed "integration testing." But with mock objects, the software tester can isolate the method being tested. Do the following:

• In an object-oriented programming language of your choice, write an application with the following classes and methods. The BitcoinPricer object contains a single public method, which determines the current dollar value for a specified amount of Bitcoin. It uses the BitcoinValueService, which contacts a Web service to obtain the current U.S. Dollar value for a single Bitcoin.

871_Bitcoin.jpg

• Write appropriate unit tests for the BitcoinPricer class, ensuring that you have adequate coverage of the possible input space. The tests should appropriately mock a BitcoinValueService object. You should locate, install, and use an appropriate mocking framework for this portion of the assignment.

• Write appropriate integration tests for the BitcoinPricer class. The tests should not mock a BitcoinValueService object and should use the real Bitcoin value at that moment.

• Prepare and submit a Word document with screenshots of all your code, running tests, and test reports.

Task 2:

Assignment: Set Up a Continuous Integration Solution

Research source code control and continuous integration solutions that are appropriate for the program you wrote in Task 1. Set up a continuous integration pipeline that will compile your code, run your tests automatically when code is checked in to source control, and alert you via email when the tests fail. Prepare a Word document with the following components:

• Justification for your selected source control and continuous integration solutions
• Screenshots of your CI solution's configuration showing the triggers and alert settings
• Screenshots of your CI solution's log for a successful check-in and running of tests
• Screenshots of your CI solution's log for a failed check-in due to a syntax error (i.e., inject a syntax error that will cause your app not to compile)

Screenshots of your CI solution's log for a failed check-in due to a logic error (i.e., inject a logic error that will cause your app to compile, but fail one or more tests).

Reference no: EM131967085

Questions Cloud

How large a sample should she take : She wishes the confidence interval to be of the form "plus or minus 3 grams," and is willing to assume that the population standard deviation is equal to 12.
Explain the use of the technique to secure and manage wlan : Explain the use(evaluation)of the technique to secure and/or manage WLAN. oDiscuss dual bands and its advantages oSecurity implications
What is the probability that 6 or more : If a sample of 8 bulbs are selected, what is the probability that 6 or more of them are not defective.
Confidence interval estimate of the population mean : Use the sample values to construct a 99% confidence interval estimate of the population mean. What is the population? Identify at least one major problem
Write appropriate unit tests for the bitcoinpricer class : Write appropriate unit tests for the BitcoinPricer class, ensuring that you have adequate coverage of the possible input space.
Discuss theories of life-span development : For this Assignment, you discuss theories of life-span development by evaluating a theory that seems especially relevant to you and your role as a social worker
Chronological history of individual major life experiences : Provide a chronological history of the individual's major life experiences. Identify specific biological, psychological and sociological influences that shaped.
How could a financial information system be beneficial : How could a financial information system be beneficial to a business with respect to strategic financial management - Explain to your manager, and demonstrate
Implement a simple automatic language identification system : Your task is to implement a simple automatic language identification system that can identify 5 languages (English, French, German, Italian and Spanish).

Reviews

Write a Review

Computer Engineering Questions & Answers

  Design and implement a simulation of the game of volleyball

Design and implement a simulation of the game of volleyball. Normal volleyball is played like racquetball, in that a team can only score points when it is serving.

  Prepare a report summarizing your research describe why you

q1. cascading style sheets css a multi-featured specification for html offers designers an expedient powerful method to

  Http frame

Assume an HTTPS page links to an HTTP iframe where two are loaded from several origins. Should the browser display a warning dialog? If so describe why. If not, describe why not.

  Calculate and display the miles-per-gallon value

Program that asks the user to enter the number of miles traveled and the number of gallons of gasoline consumed. It should then calculate and display the miles-per-gallon value. Confine your output to 1 decimal place.

  Steganography to send out messages

Suppose that a tightly knit group of political dissidents living in a repressive country are using steganography to send out messages to the world about conditions in their country.

  Create system request that you use to develop a sales system

Create a system request that you might use to develop a Web-based sales system. Remember to list special issues that are relevant to the project.

  Design a flow chart or pseudocode for the given problem

Summerville Telephone Company charges 10 cents per minute for all calls outside customer's area code. Design a flow chart or pseudocode for the given problem.

  At sequence of events created the secure connection

Before you transfer your credit card number, the browser enters a secure connection. What sequence of events created the secure connection?

  Describe one of the latest it security breaches

Write one paper to describe one of the latest IT security breaches/threats incidents that occurred lately this can be either internal or extenral threats

  What is the worst-case time for putting n entries

What is the worst-case time for putting n entries in an initially empty hash table, with collisions resolved by chaining? What is the best case?

  How various 8-letters password are possible

Repeat steps 1 and 2 using an encryption alphabet that includes 26 uppercase letters, 26 lowercase letters, and digit 0 through 9.

  Write a program that reads in a line of text, counts

Output of the letter count is a loop running from 0-25, with an if statement that allows output if the array entry isn't zero.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd