A Structured Approach to Systems Testing |
Kitabın içinden
88 sonuçtan 1-3 arası sonuçlar
Sayfa 35
William E. Perry. The system is compliance tested to ensure that the authorization
rules are properly executed . Unauthorized data changes are prohibited during
the installation process . The method and rules for authorization are preserved ...
William E. Perry. The system is compliance tested to ensure that the authorization
rules are properly executed . Unauthorized data changes are prohibited during
the installation process . The method and rules for authorization are preserved ...
Sayfa 39
The implemented system is subjected to a disaster test to ensure that it is
portable . The documentation is complete to facilitate portability . Portability is
preserved as the system is maintained . Coupling test factor The interface
between the ...
The implemented system is subjected to a disaster test to ensure that it is
portable . The documentation is complete to facilitate portability . Portability is
preserved as the system is maintained . Coupling test factor The interface
between the ...
Sayfa 197
Control Are input transactions controlled , such as through a sequential input
number , to ensure that all transactions are entered ? Review the adequacy of the
input controls to ensure that all input is entered . Control Are communication ...
Control Are input transactions controlled , such as through a sequential input
number , to ensure that all transactions are entered ? Review the adequacy of the
input controls to ensure that all input is entered . Control Are communication ...
Kullanıcılar ne diyor? - Eleştiri yazın
Her zamanki yerlerde hiçbir eleştiri bulamadık.
İçindekiler
ESTABLISHING A TEST METHODOLOGY | 1 |
TESTING AN APPLICATION SYSTEM TEST PLAN | 41 |
TESTING DOCUMENTATION | 341 |
Telif Hakkı | |
1 diğer bölüm gösterilmiyor
Diğer baskılar - Tümünü görüntüle
Sık kullanılan terimler ve kelime öbekleri
acceptance accounting achieve action ADEQUATE ADEQUATE ADEQUATE ADEQUATE N/A TEST analysis ance application system appropriate ASSESSMENT VERY ADEQUATE audit authorization automated checklist complete Compli compliance concerns conducted Confirm continued controls correct cost cycle data processing defects defined described DESCRIPTION determine documentation effective employee ensure errors established evaluate Examine example Execution expected Fact Figure finding function identified implemented INDICATIVE individual input installation instructions integrity involved loss maintained maintenance manual matrix ments method methodology METRIC needed normally objectives occur operations performed personnel PHASE TEST prepared problems procedures production properly provides reasonableness RECOMMENDED TEST TEST records recovery requirements responsibility risk selected shows skills specifications Step structure TEST CRITERIA test data TEST FACTOR test process test team TEST TECHNIQUE TEST TOOL tions trail transactions Verify