A Structured Approach to Systems TestingQED Information Sciences, 1983 - 543 sayfa |
Kitabın içinden
30 sonuçtan 1-3 arası sonuçlar
Sayfa 258
... limits caused by entering multiple transactions below the limit . Verify that the procedure to change the authorization rules of a program performs properly . Security Exhaustive testing Control Test data 1 . 2 . 3 . મ 5 . 6 -258-
... limits caused by entering multiple transactions below the limit . Verify that the procedure to change the authorization rules of a program performs properly . Security Exhaustive testing Control Test data 1 . 2 . 3 . મ 5 . 6 -258-
Sayfa 422
... limit the program logic during development in order that , first , the program can be understood , and second , the amount of testing required to verify the logic is not overwhelming . The size of several of the programs producing the ...
... limit the program logic during development in order that , first , the program can be understood , and second , the amount of testing required to verify the logic is not overwhelming . The size of several of the programs producing the ...
Sayfa 499
... limit , volume testing will determine what happens when the number of transactions approaches or exceeds that limit . IMPLEMENTATION SUGGESTIONS The use of the tool requires that all system processing limits be identified . An ...
... limit , volume testing will determine what happens when the number of transactions approaches or exceeds that limit . IMPLEMENTATION SUGGESTIONS The use of the tool requires that all system processing limits be identified . An ...
Diğer baskılar - Tümünü görüntüle
Sık kullanılan terimler ve kelime öbekleri
ADEQUATE ADEQUATE ADEQUATE V/N RECOMMENDED amination analysis ance Compli application system audit trail automated Boundary Value Analysis Checklist complete compliance Confirm Control Flow Analysis correct cyclomatic complexity Data flow analysis defined design review determine documentation effectiveness of testing employee ensure evaluate example execution Fact finding FIGURE file integrity Functional Testing graph identified input Inspec installation phase interface ments method methodology modules needed normally objectives output paths peer review performed personnel PHASE TEST PROCESS problems procedures PROCESS TEST FACTOR production program phase project team RECOMMENDED TEST TEST records recovery regression testing requirements phase responsibility risk matrix SDLC software testing subphase systems development TECHNIQUE TEST TOOL techniques and tools test conditions test cost test data test phase test plan TEST PROCESS TEST test team TEST TECHNIQUE TEST TEST TEST TECHNIQUE test transactions TESTING TOOLS APPENDIX tion/ex updated V/N RECOMMENDED TEST Verify Volume testing walk-through