Determine the test cases using boundary value analysis, Software Engineering

Assignment Help:

Q. Consider a program which computes the square root of an input integer between 0 and 5000. Determine the equivalence class test cases. Determine the test cases using boundary value analysis also.

Ans. For a program that calculates the square root of an input integer which can assume values in the range of 0 to 5000 there are three equivalence classes The set of negative integers the set of integers in the range of 0 and 5000 as well as the integers larger than 5000. Consequently the test cases must include representatives for each of the three equivalence classes and a possible test set can be: {-5,500,6000}. Boundary value analysis initiates selection of test cases at the boundaries of the different equivalence classes. For a function that calculates the square root of integer values in the range of 0 and 5000, the test cases must include the following values: {0, -1,5000,5001}.


Related Discussions:- Determine the test cases using boundary value analysis

What is a user manual, What is A user manual? Ans) A "user manual" is a ...

What is A user manual? Ans) A "user manual" is a document that presents information essential to employ software or a system to get the desired results. Typically, what is expla

What are 5 common problems in software development process, What are 5 comm...

What are 5 common problems in software development process? 1. Bad requirements - These requirements are unclear, too general, incomplete, or not testable. They cause problem

Define kpas level associated with maturity model, Define KPAs level associa...

Define KPAs level associated with maturity model KPAs are defined by SEI and associated with different maturity levels.  These are described below: Level 1 KPAs : There is

Define the prototyping model, Define the Prototyping Model In this mod...

Define the Prototyping Model In this model, a working model of actual software is developed originally. Prototype is just like a sample software having low reliability and les

What is data integrity, What is Data integrity? Ans) Data integrity is o...

What is Data integrity? Ans) Data integrity is one of the six fundamental components of information security. Data integrity is the soundness, completeness and wholeness of the

What is the consistency issue raised by state transfer, QUESTION (a) Ex...

QUESTION (a) Explain why making some replica managers read-only may improve the performance of a gossip system. (b) In the gossip architecture, why does a replica manager ne

Demonstrate the symbol used in data dictionary, Demonstrate the symbol used...

Demonstrate the symbol used in data dictionary A number of the symbols used in data dictionary are as following: X= [a/b]                                   x comprises eithe

Iterative enhancement and evolutionary development model, Q. Differentiate ...

Q. Differentiate between iterative Enhancement Model and Evolutionary Development model. Ans. Iterative Enhancement Model: This model has the similar phases as the waterfall

Describe the method of technical documentation, Describe the method of Tech...

Describe the method of Technical documentation This usually comprises: - Program listing/coding -  Programming language(s) used  - Algorithm/Flowchart -  Purpose o

Managing variability, 1.    McM Cog is a supplier of industrial parts.  Mos...

1.    McM Cog is a supplier of industrial parts.  Most orders are received at a call center. The call center currently has 10 phone lines total, i.e., a maximum of 10 callers may b

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd