A Structured Approach to Systems TestingQED Information Sciences, 1983 - 543 sayfa |
Kitabın içinden
73 sonuçtan 1-3 arası sonuçlar
Sayfa 260
... conducted to verify that source documents can be traced to con- trol totals ? 2 . Has a test been conducted to verify that all of the supporting data for a control total can be identified ? 3 . Can the processing of a single trans ...
... conducted to verify that source documents can be traced to con- trol totals ? 2 . Has a test been conducted to verify that all of the supporting data for a control total can be identified ? 3 . Can the processing of a single trans ...
Sayfa 264
... conducted to violate access security ? 4 . 5 . 6 . 7 . 8 . Have tests been conducted to determine if computer resources can be used with- out authorization ? Have tests been conducted to determine if security procedures are adequate ...
... conducted to violate access security ? 4 . 5 . 6 . 7 . 8 . Have tests been conducted to determine if computer resources can be used with- out authorization ? Have tests been conducted to determine if security procedures are adequate ...
Sayfa 488
... conducted to look at efficiency , style , adherence to standards , etc. as opposed to compliance to requirements ... conducting the review and the scope of the review . Normally it is a medium test cost . SKILLS TO USE Peers conducting ...
... conducted to look at efficiency , style , adherence to standards , etc. as opposed to compliance to requirements ... conducting the review and the scope of the review . Normally it is a medium test cost . SKILLS TO USE Peers conducting ...
Diğer baskılar - Tümünü görüntüle
Sık kullanılan terimler ve kelime öbekleri
ADEQUATE ADEQUATE ADEQUATE V/N RECOMMENDED amination analysis ance Compli application system audit trail automated Boundary Value Analysis Checklist complete compliance Confirm Control Flow Analysis correct cyclomatic complexity Data flow analysis defined design review determine documentation effectiveness of testing employee ensure evaluate example execution Fact finding FIGURE file integrity Functional Testing graph identified input Inspec installation phase interface ments method methodology modules needed normally objectives output paths peer review performed personnel PHASE TEST PROCESS problems procedures PROCESS TEST FACTOR production program phase project team RECOMMENDED TEST TEST records recovery regression testing requirements phase responsibility risk matrix SDLC software testing subphase systems development TECHNIQUE TEST TOOL techniques and tools test conditions test cost test data test phase test plan TEST PROCESS TEST test team TEST TECHNIQUE TEST TEST TEST TECHNIQUE test transactions TESTING TOOLS APPENDIX tion/ex updated V/N RECOMMENDED TEST Verify Volume testing walk-through