A Structured Approach to Systems Testing |
Kitabın içinden
30 sonuçtan 1-3 arası sonuçlar
Sayfa 258
... transactions below that limit been entered to determine if the system checks
against limit violations ? Verify that the system can identify potential violations of
authorization limits caused by entering multiple transactions below the limit .
... transactions below that limit been entered to determine if the system checks
against limit violations ? Verify that the system can identify potential violations of
authorization limits caused by entering multiple transactions below the limit .
Sayfa 422
One essential ingredient in any testing methodology is to limit the program logic
during development in order that , first , the program can be understood , and
second , the amount of testing required to verify the logic is not overwhelming .
One essential ingredient in any testing methodology is to limit the program logic
during development in order that , first , the program can be understood , and
second , the amount of testing required to verify the logic is not overwhelming .
Sayfa 499
IMPLEMENTATION SUGGESTIONS | The use of the tool requires that all system
processing limits be identified . An assessment is made as to the importance of
that limit to processing , and if the limit is important an estimation is made as to
the ...
IMPLEMENTATION SUGGESTIONS | The use of the tool requires that all system
processing limits be identified . An assessment is made as to the importance of
that limit to processing , and if the limit is important an estimation is made as to
the ...
Kullanıcılar ne diyor? - Eleştiri yazın
Her zamanki yerlerde hiçbir eleştiri bulamadık.
İçindekiler
1985 SURVEY ON SOFTWARE TESTING | 37 |
TESTING AN APPLICATION SYSTEM TEST PLAN | 43 |
PROGRAM PHASE TESTING | 209 |
Telif Hakkı | |
3 diğer bölüm gösterilmiyor
Diğer baskılar - Tümünü görüntüle
Sık kullanılan terimler ve kelime öbekleri
acceptance achieve action activities ADEQUATE ADEQUATE amination analysis ance application system appropriate ASSESSMENT authorization automated checking Checklist complete Compli conducted Confirm continued correct cost cycle data processing defects defined described DESCRIPTION detailed determine documentation effective ensure error established evaluate Examine example execution expected Fact finding FIGURE function graph identified implemented INDICATIVE individual input Inspec installation integrity involved limit maintenance manual measure ments method methodology METRIC modules needed normally objectives occur operations output paths performed personnel PHASE TEST prepared problems procedures production properly reasonableness RECOMMENDED TEST records recovery requirements responsibility risk selected shows skills specifications Step structure techniques TEST CRITERIA test data TEST FACTOR test process TEST TECHNIQUE TEST TEST TEST TOOL tion/ex tions trail transactions validation Verify