A Structured Approach to Systems Testing |
Kitabın içinden
85 sonuçtan 1-3 arası sonuçlar
Sayfa 144
Require - ments Confirmation / examination Control Has the method of internal
file integrity for each of the key fields been determined ? Verify the
reasonableness of the method to ensure the integrity of the key fields within the
automated ...
Require - ments Confirmation / examination Control Has the method of internal
file integrity for each of the key fields been determined ? Verify the
reasonableness of the method to ensure the integrity of the key fields within the
automated ...
Sayfa 244
What is necessary to make the concept work is a systematic method of identifying
limitations . The recommended steps for determining programs / system
limitations follows . O Step 1 — Identify input data used by the program ' am A
preferred ...
What is necessary to make the concept work is a systematic method of identifying
limitations . The recommended steps for determining programs / system
limitations follows . O Step 1 — Identify input data used by the program ' am A
preferred ...
Sayfa 305
O Step 2 - Determine method to delete test transactions There are two methods in
which ITF transactions can be deleted from the application system . The first
method requires modifying the application systems so that the transactions can
be ...
O Step 2 - Determine method to delete test transactions There are two methods in
which ITF transactions can be deleted from the application system . The first
method requires modifying the application systems so that the transactions can
be ...
Kullanıcılar ne diyor? - Eleştiri yazın
Her zamanki yerlerde hiçbir eleştiri bulamadık.
İçindekiler
1985 SURVEY ON SOFTWARE TESTING | 37 |
TESTING AN APPLICATION SYSTEM TEST PLAN | 43 |
PROGRAM PHASE TESTING | 209 |
Telif Hakkı | |
3 diğer bölüm gösterilmiyor
Diğer baskılar - Tümünü görüntüle
Sık kullanılan terimler ve kelime öbekleri
acceptance achieve action activities ADEQUATE ADEQUATE amination analysis ance application system appropriate ASSESSMENT authorization automated checking Checklist complete Compli conducted Confirm continued correct cost cycle data processing defects defined described DESCRIPTION detailed determine documentation effective ensure error established evaluate Examine example execution expected Fact finding FIGURE function graph identified implemented INDICATIVE individual input Inspec installation integrity involved limit maintenance manual measure ments method methodology METRIC modules needed normally objectives occur operations output paths performed personnel PHASE TEST prepared problems procedures production properly reasonableness RECOMMENDED TEST records recovery requirements responsibility risk selected shows skills specifications Step structure techniques TEST CRITERIA test data TEST FACTOR test process TEST TECHNIQUE TEST TEST TEST TOOL tion/ex tions trail transactions validation Verify