A Structured Approach to Systems TestingQED Information Sciences, 1983 - 543 sayfa |
Kitabın içinden
35 sonuçtan 1-3 arası sonuçlar
Sayfa 144
... control total ? Has the method of maintaining independent control totals on the key fields been determined ? Have tolerances been established on the degree of reliability expected from file integrity controls ? Verify the reasonableness ...
... control total ? Has the method of maintaining independent control totals on the key fields been determined ? Have tolerances been established on the degree of reliability expected from file integrity controls ? Verify the reasonableness ...
Sayfa 162
... control fields FIGURE 37 COMPUTER APPLICATIONS RISK SCORING ( continued ) INDICATIVE OF HIGH RISK Leaves much to be ... totals not part of input proce- dures ; only use controls like item counts ; no control totals of any kind . Control ...
... control fields FIGURE 37 COMPUTER APPLICATIONS RISK SCORING ( continued ) INDICATIVE OF HIGH RISK Leaves much to be ... totals not part of input proce- dures ; only use controls like item counts ; no control totals of any kind . Control ...
Sayfa 259
... controls been tested ? Have the independently maintained control totals been tested ? Have integrity procedures been tested to ensure that updates are properly recorded ? Have tests been performed to ensure that integrity can be ...
... controls been tested ? Have the independently maintained control totals been tested ? Have integrity procedures been tested to ensure that updates are properly recorded ? Have tests been performed to ensure that integrity can be ...
Diğer baskılar - Tümünü görüntüle
Sık kullanılan terimler ve kelime öbekleri
ADEQUATE ADEQUATE ADEQUATE V/N RECOMMENDED amination analysis ance Compli application system audit trail automated Boundary Value Analysis Checklist complete compliance Confirm Control Flow Analysis correct cyclomatic complexity Data flow analysis defined design review determine documentation effectiveness of testing employee ensure evaluate example execution Fact finding FIGURE file integrity Functional Testing graph identified input Inspec installation phase interface ments method methodology modules needed normally objectives output paths peer review performed personnel PHASE TEST PROCESS problems procedures PROCESS TEST FACTOR production program phase project team RECOMMENDED TEST TEST records recovery regression testing requirements phase responsibility risk matrix SDLC software testing subphase systems development TECHNIQUE TEST TOOL techniques and tools test conditions test cost test data test phase test plan TEST PROCESS TEST test team TEST TECHNIQUE TEST TEST TEST TECHNIQUE test transactions TESTING TOOLS APPENDIX tion/ex updated V/N RECOMMENDED TEST Verify Volume testing walk-through