A Structured Approach to Systems TestingQED Information Sciences, 1983 - 543 sayfa |
Kitabın içinden
68 sonuçtan 1-3 arası sonuçlar
Sayfa 135
... ments . ASSESSMENT ments . 1 . 2 . TEST CRITERIA Can the data required by the application be collected with the desired degree of reliability ? Can the data be collected within the time period specified ? 3. Have the user requirements ...
... ments . ASSESSMENT ments . 1 . 2 . TEST CRITERIA Can the data required by the application be collected with the desired degree of reliability ? Can the data be collected within the time period specified ? 3. Have the user requirements ...
Sayfa 221
... ments ments throughs Require- Walk- throughs Require- ments Inspec- tions Require- ments Fact finding Recovery Cause effect graphing 7 . 8 . Require- Review the completeness of the transaction reconstruction pro- cess . ments Confirm ...
... ments ments throughs Require- Walk- throughs Require- ments Inspec- tions Require- ments Fact finding Recovery Cause effect graphing 7 . 8 . Require- Review the completeness of the transaction reconstruction pro- cess . ments Confirm ...
Sayfa 226
... ments Require- ments Require- ments TEST TOOL Confirma- tion / ex- amination Design reviews Correct- ness Require- ments Design reviews Require- ments Design reviews Require- ments Checklist 7 . 8 . & Confir- mation / examina- tion Are ...
... ments Require- ments Require- ments TEST TOOL Confirma- tion / ex- amination Design reviews Correct- ness Require- ments Design reviews Require- ments Design reviews Require- ments Checklist 7 . 8 . & Confir- mation / examina- tion Are ...
Diğer baskılar - Tümünü görüntüle
Sık kullanılan terimler ve kelime öbekleri
ADEQUATE ADEQUATE ADEQUATE V/N RECOMMENDED amination analysis ance Compli application system audit trail automated Boundary Value Analysis Checklist complete compliance Confirm Control Flow Analysis correct cyclomatic complexity Data flow analysis defined design review determine documentation effectiveness of testing employee ensure evaluate example execution Fact finding FIGURE file integrity Functional Testing graph identified input Inspec installation phase interface ments method methodology modules needed normally objectives output paths peer review performed personnel PHASE TEST PROCESS problems procedures PROCESS TEST FACTOR production program phase project team RECOMMENDED TEST TEST records recovery regression testing requirements phase responsibility risk matrix SDLC software testing subphase systems development TECHNIQUE TEST TOOL techniques and tools test conditions test cost test data test phase test plan TEST PROCESS TEST test team TEST TECHNIQUE TEST TEST TEST TECHNIQUE test transactions TESTING TOOLS APPENDIX tion/ex updated V/N RECOMMENDED TEST Verify Volume testing walk-through