A Structured Approach to Systems TestingQED Information Sciences, 1983 - 543 sayfa |
Kitabın içinden
48 sonuçtan 1-3 arası sonuçlar
Sayfa 186
... adequacy of the input controls to ensure that all input is entered . Review the adequacy of transmission accuracy and completeness controls . Verify the adequacy of the batch control total procedures . Verify the adequacy of the batch ...
... adequacy of the input controls to ensure that all input is entered . Review the adequacy of transmission accuracy and completeness controls . Verify the adequacy of the batch control total procedures . Verify the adequacy of the batch ...
Sayfa 224
... adequacy and com- pleteness of the security training procedures . Examine the completeness and adequacy of the test violation procedure . Confirm with management that they have been adequately in- structed on how to implement security ...
... adequacy and com- pleteness of the security training procedures . Examine the completeness and adequacy of the test violation procedure . Confirm with management that they have been adequately in- structed on how to implement security ...
Sayfa 287
... adequacy of the loss of integrity identification rou- tines . Verify the adequacy of the proce- dures , and test that the integrity of the manual files has been verified at the completion of the installation phase . Verify the adequacy ...
... adequacy of the loss of integrity identification rou- tines . Verify the adequacy of the proce- dures , and test that the integrity of the manual files has been verified at the completion of the installation phase . Verify the adequacy ...
Diğer baskılar - Tümünü görüntüle
Sık kullanılan terimler ve kelime öbekleri
ADEQUATE ADEQUATE ADEQUATE V/N RECOMMENDED amination analysis ance Compli application system audit trail automated Boundary Value Analysis Checklist complete compliance Confirm Control Flow Analysis correct cyclomatic complexity Data flow analysis defined design review determine documentation effectiveness of testing employee ensure evaluate example execution Fact finding FIGURE file integrity Functional Testing graph identified input Inspec installation phase interface ments method methodology modules needed normally objectives output paths peer review performed personnel PHASE TEST PROCESS problems procedures PROCESS TEST FACTOR production program phase project team RECOMMENDED TEST TEST records recovery regression testing requirements phase responsibility risk matrix SDLC software testing subphase systems development TECHNIQUE TEST TOOL techniques and tools test conditions test cost test data test phase test plan TEST PROCESS TEST test team TEST TECHNIQUE TEST TEST TEST TECHNIQUE test transactions TESTING TOOLS APPENDIX tion/ex updated V/N RECOMMENDED TEST Verify Volume testing walk-through