A Structured Approach to Systems Testing |
Kitabın içinden
87 sonuçtan 1-3 arası sonuçlar
Sayfa 34
The application programs implement the authorization rules design . The system
is compliance tested to ensure that the authorization rules are properly executed .
Unauthorized data changes are prohibited during the installation process .
The application programs implement the authorization rules design . The system
is compliance tested to ensure that the authorization rules are properly executed .
Unauthorized data changes are prohibited during the installation process .
Sayfa 186
Review the adequacy of the transaction origination accuracy and completeness
controls . Risk matrix & Checklist Control Are input transactions controlled , such
as through a sequential input number , to ensure that all transactions are entered
...
Review the adequacy of the transaction origination accuracy and completeness
controls . Risk matrix & Checklist Control Are input transactions controlled , such
as through a sequential input number , to ensure that all transactions are entered
...
Sayfa 225
CompliExamine the programs to ensure that they comply with the necessary
organization policies and procedures . Inspections ance 2 . Have the
organization ' s data processing methods , policies , and procedures been
incorporated into the ...
CompliExamine the programs to ensure that they comply with the necessary
organization policies and procedures . Inspections ance 2 . Have the
organization ' s data processing methods , policies , and procedures been
incorporated into the ...
Kullanıcılar ne diyor? - Eleştiri yazın
Her zamanki yerlerde hiçbir eleştiri bulamadık.
İçindekiler
1985 SURVEY ON SOFTWARE TESTING | 37 |
TESTING AN APPLICATION SYSTEM TEST PLAN | 43 |
PROGRAM PHASE TESTING | 209 |
Telif Hakkı | |
3 diğer bölüm gösterilmiyor
Diğer baskılar - Tümünü görüntüle
Sık kullanılan terimler ve kelime öbekleri
acceptance achieve action activities ADEQUATE ADEQUATE amination analysis ance application system appropriate ASSESSMENT authorization automated checking Checklist complete Compli conducted Confirm continued correct cost cycle data processing defects defined described DESCRIPTION detailed determine documentation effective ensure error established evaluate Examine example execution expected Fact finding FIGURE function graph identified implemented INDICATIVE individual input Inspec installation integrity involved limit maintenance manual measure ments method methodology METRIC modules needed normally objectives occur operations output paths performed personnel PHASE TEST prepared problems procedures production properly reasonableness RECOMMENDED TEST records recovery requirements responsibility risk selected shows skills specifications Step structure techniques TEST CRITERIA test data TEST FACTOR test process TEST TECHNIQUE TEST TEST TEST TOOL tion/ex tions trail transactions validation Verify