Why decision tables are not used in boundary value, Software Engineering

Assignment Help:

Why decision tables are used in many cases instead of boundary value and equivalence partitioning analysis?

- A decision table is an efficient way to deal with combinations of things (for example inputs).

- Techniques of boundary value analysis and equivalence partitioning are generally applied to specific situations or inputs.

- If different combinations of inputs result in different actions being taken, it can be more difficult to show using equivalence partitioning and boundary value analysis that tend to be more focused on user interface.

- The other two specification based approaches - decision tables and state transition testing are more focused on business rules or business logic.

 


Related Discussions:- Why decision tables are not used in boundary value

Define capability, Define capability. What are the quantities that determin...

Define capability. What are the quantities that determine the degree of capability of a software reliability model? Capability refers to the ability of the model to calculate w

Name the types of software system requirements, What are the types of Softw...

What are the types of Software system requirements ? Functional requirements: Services the system should be required. Non-functional requirements: Constraints on the servi

Importance of a document type definition in xml, Question: (a) Describe...

Question: (a) Describe the purpose and importance of a Document Type Definition in XML. (b) Describe the difference between PCDATA and CDATA with respect to a DTD. (c)

Differentiate between circuit switching and packet switching, Question: ...

Question: (a) Differentiate between circuit switching and packet switching. (b) Using an example, explain the main parts that form a URL (Uniform Resource Locator). (c)

Design a digital system to produce a pwm , Task You have to design a d...

Task You have to design a digital system to produce a PWM signal that produces pulses at a frequency in the range 50 Hz -100 Hz . The pulses will be between 1 ms and 2 ms du

What is cycle stealing dma operation, What is cycle stealing DMA operation?...

What is cycle stealing DMA operation? Cycle Stealing: In this process, the DMA controller transfers one data word at a time, after which it must return control of the buses to

Contrast between project logic evaluation and networking, QUESTION (a) ...

QUESTION (a) Compare and contrast between Project logic evaluation (PLE), Networking and Scheduling (b) Discuss how the true cost of defects can often be higher than the ini

Explain storage testing, This is a explanation of whether or not certain pr...

This is a explanation of whether or not certain processing conditions use many storage [memory] than estimated.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd