A Structured Approach to Systems TestingQED Information Sciences, 1983 - 543 sayfa |
Kitabın içinden
75 sonuçtan 1-3 arası sonuçlar
Sayfa 105
... Figure 29 can be used to narrow the choice to the more appropriate tools . This does not mean that the tester should be restricted to the tools identified in Figure 30 but , rather , that they form a good basis to narrow the selection ...
... Figure 29 can be used to narrow the choice to the more appropriate tools . This does not mean that the tester should be restricted to the tools identified in Figure 30 but , rather , that they form a good basis to narrow the selection ...
Sayfa 422
... Figure 80 below , the line between ( 2 ) and ( 3 ) means that ( 2 ) branches to ( 3 ) ) . The curved arcs represent backward branches ( e.g. , in Figure 80 ( 5 ) branches back to ( 2 ) ) . The graphs in Figures 79 through 90 are ...
... Figure 80 below , the line between ( 2 ) and ( 3 ) means that ( 2 ) branches to ( 3 ) ) . The curved arcs represent backward branches ( e.g. , in Figure 80 ( 5 ) branches back to ( 2 ) ) . The graphs in Figures 79 through 90 are ...
Sayfa 444
... FIGURE 107 REDUCING COMPLEXITY , EXAMPLE 2 Although G1 through G3 have v = 5 ( Figures 107 through 109 ) , each of ... Figure 110. This is a rewrite of Figure 96 , the string recognition problem . The complexity of the original program ...
... FIGURE 107 REDUCING COMPLEXITY , EXAMPLE 2 Although G1 through G3 have v = 5 ( Figures 107 through 109 ) , each of ... Figure 110. This is a rewrite of Figure 96 , the string recognition problem . The complexity of the original program ...
Diğer baskılar - Tümünü görüntüle
Sık kullanılan terimler ve kelime öbekleri
ADEQUATE ADEQUATE ADEQUATE V/N RECOMMENDED amination analysis ance Compli application system audit trail automated Boundary Value Analysis Checklist complete compliance Confirm Control Flow Analysis correct cyclomatic complexity Data flow analysis defined design review determine documentation effectiveness of testing employee ensure evaluate example execution Fact finding FIGURE file integrity Functional Testing graph identified input Inspec installation phase interface ments method methodology modules needed normally objectives output paths peer review performed personnel PHASE TEST PROCESS problems procedures PROCESS TEST FACTOR production program phase project team RECOMMENDED TEST TEST records recovery regression testing requirements phase responsibility risk matrix SDLC software testing subphase systems development TECHNIQUE TEST TOOL techniques and tools test conditions test cost test data test phase test plan TEST PROCESS TEST test team TEST TECHNIQUE TEST TEST TEST TECHNIQUE test transactions TESTING TOOLS APPENDIX tion/ex updated V/N RECOMMENDED TEST Verify Volume testing walk-through