Ei
FS le tested 40 Unover evors woduced
austing design and conssucion.
yence> thas to done Ecbefully using ateshng
gnateqy:
a the Shrategy 1S developed by the propct rnanagen
oboe &gineers and testnq spedolists |
x tong 6 the PYO@sS OF Eecution Ota progam
with the Mention OF Finding ors
y ohategic pppidach to Softtoane testhy
A testing Syateay provides o PIOLESS that desdiba
for the Aevapey , Quality Analysts and thy Gustre
the St2ps conducted as paste otteing
a Testing slvotegy indudes:
) Test Planning ee ae
a) Tek Ca design
J) Teck Eecution ,
HW) Bato collechon
B) Ebfeciveness Ga KON
* Skategic Approach for sOftaane testing canbe +
! :
> Tusk before oraaking the te stng process -- Mie
" foyma) technical Revicwos" must be Condudad.
=> tht wi elmindie 21S etne aqua) testing
prowss.
erri a
Q) At the beginning wanious components OF the
Systm are tested, then gradualy Cath inlerfoxa
ANA then entwe sysem is aed
3) pilerent vesting yechniques an ve appned ak
Arfiaent point of time:
owatagics
Teck levels br conventional _sofeooce ©
for commana sofuoane.
Various testing srateg ics
aic>
) Unit Testing
D Tite gration Testing
D yardarion Testing
4) system Testing
= 9nthis type oF testing tech niques One
D unk Bohn
enors 60m each Ss0ftruane
aypred to delet the
Component welvid ually.
2) Qnteqyation Teshng: Tk focuses oh tesues O=doutted
with verircakon and program en een ats BS
Components bean intra Ging conn one another.
2 Validation Testing: “rt provides asanane ype
the cotoae yoldaton crite. cestapiehe” during
mnequiten ents analyst? meets all) funchoral 5
pehawiTtialeand perbormonce arequivunents.
ky syskm Testing: In syst testing all syste.
elements pining the aypem is teskA as a Whob- ee fe ay ee ee
[Testing SOPL LOA cAeuloynert |
Shee gles
Shale gles
eye
Ae sngnecin
Onte gration
Tes" nn
a t Testing Be y:
> 9n Unik wang | the indivi dua’ Byers ane
ested independently to @hsure thei quality
> Ae fFOalS 15 toUNVE the enor design and
implementation. th eae
source program | ye
vignuxfoca
f shocal daxo. shukwe} Generating
° 1 Bourdonyeendition » .
* andependent path 5
\-e Gor Wandli
< Paths be
S -
wee
qi onit Testinga) Sdleqration Testing}
ES |
[Link] of depenclemt component O76 ee Oe
Yo ensure they quality of —(ei¥ inteqqaabor unit
> She objective % to Lae uit tested components
and putid, a program: ayuchne fra pas been
dictated by cottwane desig”:
=> Onteqration resting '@ OF uso typed Besraen Flaws
Snleqration resting CY)
Non— incremental Oncremental integration
Integration.
Top clown Feshng
Bottom up ialegraton
Reqaxon 4
SMe xerbing: :
Big Bang
8ncremental INtegration +
Sncrermental Qnreqtabon 1s OF foun tYpat
d) Top down Testing:
> Mp doen testingis An incieyrental approach th
Lohith modules one inde, satel by moving oon through
the consol eyudoue. | one
7 thedales, ors
> Modules Suboidinat to the main conko) madule
are norpotated into the system in cithcn a depth
yet 01 bréacth fuk manner
i) Bottum UP Snteqration Testing:
gn wotom Up integyation the moddes at the lowat
jeuls Are inegiakd at firsts then nteqration '9 done
by MOVING, UWA ty10Ugh the connol Syudwic-
puver
wi) Reqiessi on Testing :
> Regression Testing Is uced to Check for, defects
plopogatid to Othen modules by Changes iis to
Kicking yrogsam Shus aegicssion lesinc is Used
to meduca the side EHect= OF the charge .
§) smoke Testing:
> the omoke testing 15 a kihd OF integration testing
technique used for time MCI PIOKAS vohenein the
Wojecr needs oe assesxdon ficquent basis
Felesing activihes perd fo be qmonediautin Smoke
eee:
isSoftOar compornts aleady framlattd nts coly
" ehe “build” Can be
Ane \nteqratd into a Whutld
data ales, |branes ,rcusable modkales, 01 PY gram
eOmp oncnts
Dp coves c& tests ane design to CKpose CNOYS Foy
build so that the’ build’ performs. its functioning
coweaty,
3) Vaidaton Testino es i i
> he inteq ratd sotto a Beh pascd On
sequiemmts to enstve that tne desired + product
iS ontaind-
=> validaton Testing wre fs:
\ Accepkance ‘Testing;
Ahe acceptance testing ieakind oftesting Conducted
to Ensare that the sdltoane works Conedly th the
user Usork © epyiTonmane- ‘ . 2a
— = Dhe type OF acLeprancetosting wie 4
d Alpha test -° She alpha testing Is ateting
Conduded (1 whith 'the venolon...0f Comp)éle —
softwares test by the Customer unden: the.
PERT Pooiniie 7
te She
Supa Yisionof devdojen-
7 Tg lestingis yortormed ak daelgnrs si
sofpaone fs Usdin Na turd a in. presen of
dovdge. ‘oi
test- » She btka testing Is.a testi in” ;
a) Bea
son of sofroae 1S tested boy the cacti
the vonoi
witht 4he deuloper eine, present -> of (te ee ee
; q
” S44 stem = “Testin qe
she eyskem test 15 GQ seni@ OF
io Gaully “the Compulta basecl system
[ system Testing |
(ee ee sel
peritovmane-
ecavery security Sess
Testing Te a testing es ting l
e55 Conduded
) Recov AY Testings-
7 RECVAY Teshihq iS intended to check the eyotam's
ability to ewer fiom failure
2 nms type of testm q the software js forced te
ful And then ib Is vethied Lohdhor thesysam Kove
propenily O1 not -
1) seanity Testing:
= secunily Testing veahies anak Syst pro
mechaniom pruent improper pentyation 07 la
tectiOn-
altayakon -
il) siess Teckng*:
> Selene beak point oF A Sit fo es)abiish
mOximum senvic. level:
> On styestating the syst iS ‘extattad a marm
| that demands mesource ih abromea! quantity » Frequency
OY Volume -
)) perfomance ating!
" Pertormarce, testing evaluates the TUN tme -
Rrformane ofthe software copectally veal Hne
Softnane,% Blackbox Testing and boil pox “Tating
Bere ane LWO genenal cppraaches for the sofb©on
ty ie
test wn’
YD Black box testing
D while box testing
to demonsiate Wear
Ae the Name
) Black hox testing
—> Dhe hack box testa is
he Suan functtons ane O}
in bhack hoy teste IEIS Yested whethor
uséel
perational -
Saqgats
the Inpur tS accepted properly and apt iS Comectiy
produced.
> he major focus OF PIACK box lesting 1900
FUNcviONS » CyerAtiOns, axternal tit farce» external
1
data and informestion .
> Qt SS also Calle) as behavioural testing
box re omg, methods fous on fundimal
> Black
| mequiremona oy softcore.
{y
Typo of Black box on ROC SP sy ip
Shene ane Y typaok lIaCkh ox wsting~ They onet- .
>
| ) -€quiva)ena paotitioning :
-> Here input value thak provide to Systm ane .
divided into ddfeene Case
> Snotad of Usiny @ach and. every input value,
Use OMY OF yalue FIOM the GO4P to test outcomeAge [2 gle agen x qceprs values From
\8 toco
i) Boundany Value analysis +
Boundany Values Ome those that Cham the upper
and lower Limit OF a vandhte:
3 or tats While chang boundany Value Lahethen
dix sotttaanc js pooduaing Gin Outfrt OF hoe
ange jg to 60
WGraph bases testing:
ah Giaph oF Ob\asS Pesnt fh the system 1S Grated .
=> ach node yeprestnts | Obycce that iS pastibionny
In the softsane system and Jinks -7epyesent Ihe
ciepationship Qmong these. Objects
atode
Swecklink
jonalle) / nics
Bidive lad
livkIV) Orthogonal amray testing:
Wohin can Pe
= dE isa Kind of feshnq method
Qppied to the ay pycanom in which input “domain
is relatively Smal) pue there could x lOsey: NO: DF
test cose - 4
ad ond thus
oegions can te,
Te only Faulley
cco,
number of test case can be ed
% while Box testing’:
= On While box jeshng procedural A
examined 9 this testing tre InaYne
ey ye i ace aa le acer ng
Jris major focus OF
etails ome chostly
Is Of SOP RSI
fOTPLAREMS and deigns - J
ignite box testing (eon intancd SUM 7 log\c fats,
comvoltians » dato Foes > pnteina) data Sluchuya >
Gendiwom | leaps Gie--- pilot faeiSed alae
Tyre of _whitchox insta:
> Qhere ane 4 HYY of [Link] sing.
4) yar covewiog testing ' All pasetn_ poths ane
dined ait endy ro Cat, go7MES 1M eqn ©
main & 5
i anal
funk funB é ih
tet :
func fun é Bs
eae Sg Se cl}
D) Loop teshng, gEIs usd fo test the loop consiucks.
(ahi. for snaked),es
a
3) Branch coverage | condition testine
iW Clee) condition
é ay IN module. |
> To test he lagya\ conditions in the P09
the condition testing is Used
p Bacteyncnk—tovuiage
Hue
condi'bern teSh
Ww Shotemene atlas ae
>On vnich tesks pavers al) = me eeeincoae
> gt sures +hat Cath srakement of the COALW KS
eyed Ge least onée-
> Hence each tine of code Is vetted
pilderences bekiceen yohite Box and BlackBox testing
|
It1sa vooy OF cotton. tes BtISG Woy oF ustng the
In \hidh the interne) Shrusdur “softyane in Whith Vetrhas
H te program ot, the code ‘nowsied gg: ahout-the \nternal
5 hidden and potting | 1s Svulbure oF thé Code or the
frown Clloout it' program Of the Sofhoane
BlackBox Testi nq | whit Box al
Code Imylementalion is
nekes.5ouy £01 while box
; testing if
|) Sin plenenteatipin of codé is
— Not Needed) Or ee
a
) 0 is eek, devi by
SOftuane festu -
iStismosty done by
sofbogne developers
,
7 &ND No Khovalectex ol Knowoketye Of iy Lumantation
\MPleinnteation Is neecled (6 eneciuvyed
%) Qtcan be Wartd loas AL isthe innen othe thlernray
Cuter OF extemal sofhcay Sofneane wsting:
a
& 315 afunctional test | 9tisa shuctural Wer of
OF the Softwar dhe Gott wore
Dk 1s the hehaviowal IIS the lOQe tesihgos
testing OF the somode]}. the cofronne
7 0Nb0
8) 9tiskalled as gtisaisa called ox
behavioural testing . glasshox esting -
ART OF BEBUGGING
> atts a process OF concctng lugs found GeAia
testing -
> Stisa programmer Work.
Hebuggin«
Shoot © ' >
14 Hevaypny procesbewilt ~ pak?
Risk: A Risk ia ‘40 unc
Hal, % fr ores, 1010 paitive on mga af fut
Leen sunt o7 Zondoten
ona omhel on
ssh Managemen : acy
decision: baud or an
=> 4 tk a Prous Moline
*SV/aludlivri es facloss -thad ! thyeale cle the buainer
Vast ow gttivities that one eahusd put 404 vek paneer
ane!
> Rk sdenbficabior
ai Ru i “lids %
> Rick veftnemunh i
~> Rsk — Mittaetton: MotBlering and Manager
okeaclie ¥ ¢ Prosubve Rick halgis
Laokve ack Manag ant dvju +o yedurce tee darnag*
" ig 4p veal ee Speed on Genre Yecavy
Tom —Theny, luk assumed althose +hreals :
ely ae
proactiv - ¥isk Mana talan bres Hhrealk & oie |
to reve ase Svenk fren tyes happening cm he
fous place-
(5) Pak peajutien
> 4 amie vial projector Teck y
() Tdenlitying phe srokhms Causr? mi
© lig ihe robobily ve q pate
E ilies a “ed 7 he ak macs a=
Go the Pree da with Ov d 1
0) very De Ap deal
; (No haaro)
A tors (1-28) ¢ Yow tisk (otros feck)”
© Moderate (os-sot) 1 Mod evale vist CAeopast o lie)
f) high (50-2 hy? visk [ropa paelmere budy)!)
vay byh(te4) — Tote
Zab ssc |
4 Tt is a aes 4 spaying the yich fm more dheles
+ vick veficuranl @n be nepal Wee ne tae
£ Condikon - Lansiion —Comequenee (Te
i claled and doy Vall an thie
(Ondition Sub ton ‘Lon (an be divided
Pte canine the Spot of Hue sub iidibvan tn onde
a refine the Sile-
thee vefincrant halos in seu) the urdalyin vritks
this appeal take ik Sapiey foe the ond!
Manager ty sal she sk tn gral date
eau yes
b The Condition iswy et of vik [sfas vis
duel thod ne One tanks
nb *i tlding a
c "I Gite
6
. oO en be of bag Comer freanl*
; & echnical 8! wisks! oo Blatt, f, quait I.
: q pfer Face , See ptgledaleants cre peg Me Ane
| 6 x Hy oi Comcesne sith al alade pool, ferousee,
custome ‘alabel ‘soy
x Pig iduitt dulificahon
2 2 ogorees needs 4o ind sola bathe
coc os eh as gable e
ag Gthe topae | of vik on be aie bu roakiony
affective aisk sacag cout If nn
ee pf flat
x bY duing bof a in
Mellods One Ue
= “They ane ob i hyp us o sab eal an opec
a hi of
4h Heel db {fot oss.
Vaelia sahes =
Herel a
Usd fo develop the gyskern
afi pink ae = tial Ae are ete with ee
an the I oP i
oa. cxigalinal ie “ta er govyreneal then
du 4s belo devas
ilaole_xisk - ¢ isk = oa ‘yal
26) timation asks 54°
]Risk Management
ee EC TL Sco ene oe
RISK~ FE 15 A "Uncentain Event” oun yahidh Sheds
+Ve ~oy—Vve On the sjw system.
RiSk Manageme ent —identtyingnnal yon @> Refi ing
Ssoiing ThervyiSIS
) Risk identification —tycoytisk
Q) Risk projection (analysing rae Prone
D RISK Rekinemenl> Caaing divi)
by) 38M Calving) Us (dent fyi
YY
SUbYLEK
ile going tore deep iy
RNIM 4 al RISK Migianon. » » PIOnitoxing and
Management J
> There ase tiwte issues in H8deqy Gr havi ets.
\s
y Risk Avoidanw
2) Risk Monttow Pa S
3) RISK = MonagenentRisk Mitigation
a ; Ly)
= Risk » vitiey ation means preva NF the MN Sk% to Oy
Cusk Avoidance).
> Following axe tre sles to pe tOKeaaa tae
the yisks.
) communrate vaittaconce ned stot} tofnd of
pIOhable YiSk-
@ find cut and Oiminate all tx Gaus. Hak aan
Qeate vISk pete. the mayece Stacks
D HwvlOp a yolity iy an organization vohich wai}
Helpto Continue the piqyece wen though some
aot \eave the OYgani gation -
MD Goybedy fin the project Gee ARUI be
acyuantcire With the Gayrent developreent actilly |
») Maintain the carresyanding Ete: Ws ;
tmdy manne.
6) Conduct tnoely, ‘yaielos iacioea to speedup
the work.
Risk _monitoving
=> 90 Risk pontonny proccss sollowirg 4hings
must pe cows montoed by the picjecr rronmt
1) he, GpprOath OF the” behavigus, oF fhe OM
“members O» “pesoure oF piojece vores:ae ide ee Naat
g) dhe tyre
® a” WEA co-cporaton Cmona team. members
3) Dee tyra Ob p rOvIeMs {hat ame OlcLmiNng
pale Chyccave Ol RiSskmienitond is:
4) 90 Ureck tOrelhen tht precicta) YiekKs yey
occuy OY Nr
a) To cnsure the sleps denned to avoid the
yo are appre propoty (cone
3) TS gather the | nformetian WbICh can be. usctul
fou any zine the sisk : :
Rok Management
pigecte PAIOnager Porras this task When visk
pecomes O> srealily - TF project manag ts
sucessful 1 appying the projec mitigation eect
then ik becomes VO1Y4 much easy te manage re
YIoKS- Et Seninag)
RMD plan
mitiq ation | monitoring
AGHIeA the mftigation | monitoting steps tousen
TNA? | Contingency plan
IE visk ymikiqation fais then the plan tor handing tre
WK
otatus
end dale
Approvo\
zrame ond signature Of peson |
approving Casur> 5. date> she ISK infomation aeee: can be Mointained’ by
database systems. After documenting the YiSkt Us ng
ether RII plan ‘(©0! FIS® in formation Sreek tne
Yisk mibicyction » monitoring & analysis acevités
ome St0 pped-RMMM Plan
The RMMM plan is a document in which all the risk analysis activities are described.
Sometimes project manager includes this document as a part of overall project plan.
Sometimes specific RMMM plan is not created, however each risk can be described
individually using risk information sheet. Typical template for RMMM plan or Risk
information sheet can be,
Risk information sheet
Project name
————
Date Probability Impact
identified >
Origin Assigned to
Description
Refinement/Context
" Mitigation/Monitoring
Trigger/Contingency plan
Status
Approval Closing date
closure>.
The risk information sheet can be maintained by database systems. After
documenting the risks using either RMMM plan or Risk information sheet the risk
mitigation, monitoring and analysis activities are stopped.