SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Downloaden Sie, um offline zu lesen
Unit 4: Defect Management
Course Coordinator : Mrs. Kshirsagar S.R. M.M.Polytechnic , Thergaon Page 1
CO4 : Identify bugs to create defect report of given application.
What is defect?
Defect: A defect is an error or a bug, in the application which is created. A programmer
while designing and building the software can make mistakes or errors. These mistakes or
errors mean that there are flaws in the software. These are called defects.
Defects in any system may arise in various stages of development life cycle. At each stage,
the impact and cost of fixing defects are dependent on various aspects including the defect
arising stage.
Different causes of software defects
 Miscommunication of requirements introduces error in code
 Unrealistic time schedule for development
 Lack of designing experience
 Lack of coding practices experience
 Human factors introduces errors in code
 Lack of version control
 Buggy third-party tools
 Last minute changes in the requirement introduce error
 Poor Software testing skill
Defect Classification
Defect Classification
1.Severity Wise
2.Work Product Wise
3.Type Of Error Wise
4.Status Wise
Unit 4: Defect Management
Course Coordinator : Mrs. Kshirsagar S.R. M.M.Polytechnic , Thergaon Page 2
Severity Wise:
 Major: A defect, which will cause an observable product failure or departure from
requirements.
 Minor: A defect that will not cause a failure in execution of the product.
 Fatal: A defect that will cause the system to crash or close abruptly or effect other
applications.
Work product wise:
 SSD: A defect from System Study document
 FSD: A defect from Functional Specification document
 ADS: A defect from Architectural Design Document
 DDS: A defect from Detailed Design document
 Source code: A defect from Source code
 Test Plan/ Test Cases: A defect from Test Plan/ Test Cases
 User Documentation: A defect from User manuals, Operating manuals
Type of Errors Wise:
 Comments: Inadequate/ incorrect/ misleading or missing comments in the source
code
 Computational Error: Improper computation of the formulae / improper business
validations in code.
 Data error: Incorrect data population / update in database
 Database Error: Error in the database schema/Design
 Missing Design: Design features/approach missed/not documented in the design
document and hence does not correspond to requirements
 Inadequate or sub optimal Design: Design features/approach needs additional
inputs for it to be complete Design features described does not provide the best
approach (optimal approach) towards the solution required
 In correct Design: Wrong or inaccurate Design
 Ambiguous Design: Design feature/approach is not clear to the reviewer. Also
includes ambiguous use of words or unclear design features.
 Boundary Conditions Neglected: Boundary conditions not addressed/incorrect
 Interface Error: Internal or external to application interfacing error, Incorrect
handling of passing parameters, Incorrect alignment, incorrect/misplaced
fields/objects, un friendly window/screen positions
 Logic Error: Missing or Inadequate or irrelevant or ambiguous functionality in
source code
Unit 4: Defect Management
Course Coordinator : Mrs. Kshirsagar S.R. M.M.Polytechnic , Thergaon Page 3
 Message Error: Inadequate/ incorrect/ misleading or missing error messages in
source code
 Navigation Error: Navigation not coded correctly in source code
 Performance Error: An error related to performance/optimality of the code
 Missing Requirements: Implicit/Explicit requirements are missed/not documented
during requirement phase
 Inadequate Requirements: Requirement needs additional inputs for to be complete
 Incorrect Requirements: Wrong or inaccurate requirements
 Ambiguous Requirements: Requirement is not clear to the reviewer. Also includes
ambiguous use of words – e.g. Like, such as, may be, could be, might etc.
 Sequencing / Timing Error: Error due to incorrect/missing consideration to timeouts
and improper/missing sequencing in source code.
 Standards: Standards not followed like improper exception handling, use of E & D
Formats and project related design/requirements/coding standards
 System Error: Hardware and Operating System related error, Memory leak
 Test Plan / Cases Error: Inadequate/ incorrect/ ambiguous or duplicate or missing -
Test Plan/ Test Cases & Test Scripts, Incorrect/Incomplete test setup
 Typographical Error: Spelling / Grammar mistake in documents/source code
 Variable Declaration Error: Improper declaration / usage of variables, Type
mismatch error in source code
Status Wise:
 Open
 Closed
 Deferred
 Cancelled
Defect Management Process
The process of finding defects and reducing them at the lowest cost is called as Defect
Management Process.
Unit 4: Defect Management
Course Coordinator : Mrs. Kshirsagar S.R. M.M.Polytechnic , Thergaon Page 4
Defect Prevention -- Implementation of techniques, methodology and standard processes to
reduce the risk of defects.
Deliverable Baseline -- Establishment of milestones where deliverables will be considered
complete and ready for further development work. When a deliverable is base lined, any further
changes are controlled. Errors in a deliverable are not considered defects until after the
deliverable is base lined.
Defect Discovery -- Identification and reporting of defects for development team
acknowledgment. A defect is only termed discovered when it has been documented and
acknowledged as a valid defect by the development team member(s) responsible for the
component(s) in error.
Defect Resolution -- Work by the development team to prioritize, schedule and fix a defect, and
document the resolution. This also includes notification back to the tester to ensure that the
resolution is verified.
Process Improvement -- Identification and analysis of the process in which a defect originated
to identify ways to improve the process to prevent future occurrences of similar defects. Also
the validation process that should have identified the defect earlier is analyzed to determine ways
to strengthen that process.
Management Reporting -- Analysis and reporting of defect information to assist management
with risk management, process improvement and project management.
Defect Life Cycle
Unit 4: Defect Management
Course Coordinator : Mrs. Kshirsagar S.R. M.M.Polytechnic , Thergaon Page 5
DEFECT LIFE CYCLE (Bug Life cycle) is the journey of a defect from its identification to
its closure. The Life Cycle varies from organization to organization and is governed by the
software testing process the organization or project follows and/or the Defect tracking tool
being used.
Unit 4: Defect Management
Course Coordinator : Mrs. Kshirsagar S.R. M.M.Polytechnic , Thergaon Page 6
 New: When the bug is posted for the first time, its state will be “NEW”. This means
that the bug is not yet approved.
 Open: After a tester has posted a bug, the lead of the tester approves that the bug is
genuine and he changes the state as “OPEN”.
 Assign: Once the lead changes the state as “OPEN”, he assigns the bug
corresponding developer or developer team. The state of the bug now is changed to
“ASSIGN”.
 Test/Retest: Once the developer fixes the bug, he has to assign the bug to the testing
team for next round of testing. Before he releases the software with bug fixed, he
changes the state of bug to “TEST”. It specifies that the bug has been fixed and is
released to testing team.// At this stage the tester do the retesting of the changed code
which developer has given to him to check whether the defect got fixed or not.
 Deferred: The bug, changed to deferred state means the bug is expected to be fixed in
next releases. The reasons for changing the bug to this state have many factors. Some
of them are priority of the bug may be low, lack of time for the release or the bug may
not have major effect on the software.
 Rejected: If the developer feels that the bug is not genuine, he rejects the bug. Then
the state of the bug is changed to “REJECTED”.
 Verified: Once the bug is fixed and the status is changed to “TEST”, the tester tests
the bug. If the bug is not present in the software, he approves that the bug is fixed and
changes the status to “VERIFIED”.
 Reopened: If the bug still exists even after the bug is fixed by the developer, the
tester changes the status to “REOPENED”. The bug traverses the life cycle once
again.
 Closed: Once the bug is fixed, it is tested by the tester. If the tester feels that the bug
no longer exists in the software, he changes the status of the bug to “CLOSED”. This
state means that the bug is fixed, tested and approved.
 Fixed: When developer makes necessary code changes and verifies the changes then
he/she can make bug status as „Fixed‟ and the bug is passed to testing team.
 Pending retest: After fixing the defect the developer has given that particular code
for retesting to the tester. Here the testing is pending on the testers end. Hence its
status is pending retest.
Defect Prevention Process
 “Prevention is better than cure” applies to defects in the software development life
cycle
 Defects, as defined by software developers, are variances from a desired attribute.
These attributes include complete and correct requirements and specifications as
drawn from the desires of potential customers.
Unit 4: Defect Management
Course Coordinator : Mrs. Kshirsagar S.R. M.M.Polytechnic , Thergaon Page 7
 Thus, defects cause software to fail to meet requirements and make customers
unhappy.
 when a defect gets through during the development process, the earlier it is
diagnosed, the easier and cheaper is the rectification of the defect.
 The end result in prevention or early detection is a product with zero or minimal
defects.
Identify Critical Risks -- Identify the critical risks facing the project or system. These are the
types of defects that could jeopardize the successful construction, delivery and/or operation of
the system.
Estimate Expected Impact -- For each critical risk, make an assessment of the financial impact
if the risk becomes a problem.
Minimize Expected Impact -- Once the most important risks are identified try to eliminate
each risk. For risks that cannot be eliminated, reduce the probability that the risk will become a
problem and the financial impact should that happen.
The five general activities of defect prevention are:
1. Software Requirements Analysis
Defects introduced during the requirements and design phase are not only more probable
but also are more severe and more difficult to remove.
Front-end errors in requirements and design cannot be found and removed via testing, but
instead need pre-test reviews and inspections.
2. Reviews: Self-Review and Peer Review
Self-review is one of the most effective activity in uncovering the defects which may later be
discovered by a testing team or directly by a customer.
A self-review of the code helps reduce the defects related to algorithm mplementations,
incorrect logic or certain missing conditions.
Unit 4: Defect Management
Course Coordinator : Mrs. Kshirsagar S.R. M.M.Polytechnic , Thergaon Page 8
Peer review is similar to self-review in terms of the objective – the only difference is that it
is a peer (someone who understands the functionality of the code very well) who reviews the
code
3. Defect Logging and Documentation
Effective defect tracking begins with a systematic process. A structured tracking process
begins with initially logging the defects, investigating the defects, then providing the structure to
resolve them. Defect analysis and reporting offer a powerful means to manage defects and defect
depletion trends, hence, costs.
Root Cause Analysis and Preventive Measures Determination
After defects are logged and documented, the next step is to analyze them
Reducing the defects to improve the quality: The analysis should lead to implementing
changes in processes that help prevent defects and ensure their early detection.
Applying local expertise: The people who really understand what went wrong are the people
present when the defects were inserted – members of the software engineering team. They can
give the best suggestions for how to avoid such defects in the future.
Targeting the systematic errors: There may be many errors or defects to be handled in such
an analysis forum; however, some mistakes tend to be repeated. These systematic errors account
for a large portion of the defects found in the typical software project.
5. Embedding Procedures into Software Development Process
Implementation is the toughest of all activities of defect prevention.
It requires total commitment from the development team and management.
A plan of action is made for deployment of the modification of the existing processes or
introduction of the new ones with the consent of management and the team.
Defect Report Template
 A defect report documents an anomaly discovered during testing.
 It includes all the information needed to reproduce the problem, including the author,
release/build number, open/close dates, problem area, problem description, test
environment, defect type, how it was detected, who detected it, priority, severity,
status, etc. After uncovering a defect (bug), testers generate a formal defect report.
 The purpose of a defect report is to state the problem as clearly as possible so that
developers can replicate the defect easily and fix it.
Unit 4: Defect Management
Course Coordinator : Mrs. Kshirsagar S.R. M.M.Polytechnic , Thergaon Page 9
Estimate Expected Impact Of A Defect
 Defect Impact: The degree of severity that a defect has on the development or operation
of a component or system.
 How to Estimate the defect impact
1. Once the critical risks are identified, the financial impact of each risk should be
estimated.
2. This can be done by assessing the impact, in dollars, if the risk does become a problem
combined with the probability that the risk will become a problem.
3. The product of these two numbers is the expected impact of the risk.
Unit 4: Defect Management
Course Coordinator : Mrs. Kshirsagar S.R. M.M.Polytechnic , Thergaon Page 10
4. The expected impact of a risk (E) is calculated as
E = P * I, where:
P= probability of the risk becoming a problem and
I= Impact in dollars if the risk becomes a problem.
Once the expected impact of each risk is identified, the risks should be prioritized by the
expected impact and the degree to which the expected impact can be reduced. While guess work
will constitute a major role in producing these numbers, precision is not important. What will be
important is to identify the risk, and determine the risk's order of magnitude. Large, complex
systems will have many critical risks. Whatever can be done to reduce the probability of each
individual critical risk becoming a problem to a very small number should be done. Doing this
increases the probability of a successful project by increasing the probability that none of the
critical risks will become a problem.
One should assume that an individual critical risk has a low probability of becoming a problem
only when there is specific knowledge justifying why it is low. For example, the likelihood that
an important requirement was missed may be high if developers have not involved users in the
project. If users have actively participated in the requirements definition, and the new system is
not a radical departure from an existing system or process, the likelihood may be low.
For example:
o An organization with a project of 2,500 function points and was about medium at defect
discovery and removal would have 1,650 defects remaining after all defect removal and
discovery activities.
o The calculation is 2,500 x 1.2 = 3,000 potential defects.
o The organization would be able to remove about 45% of the defects or 1,350 defects.
o The total potential defects (3,000) less the removed defects (1,350) equals the remaining
defects of 1,650.
Techniques For Finding Defects
 Defects are found either by preplanned activities specifically intended to uncover defects
(e.g., quality control activities such as inspections, testing, etc.) or by accident (e.g., users
in production).
Techniques to find defects can be divided into three categories:
 Static techniques: Testing that is done without physically executing a program or
system. A code review is an example of a static testing technique.
Unit 4: Defect Management
Course Coordinator : Mrs. Kshirsagar S.R. M.M.Polytechnic , Thergaon Page 11
 Dynamic techniques: Testing in which system components are physically executed to
identify defects. Execution of test cases is an example of a dynamic testing technique.
 Operational techniques: An operational system produces a deliverable containing a
defect found by users, customers, or control personnel -- i.e., the defect is found as a
result of a failure.
 While it is beyond the scope of this study to compare and contrast the various static,
dynamic, and operational techniques, the research did arrive at the following conclusions:
 Both static and dynamic techniques are required for an effective defect management
program. In each category, the more formally the techniques were integrated into the
development process, the more effective they were.
Since static techniques will generally find defects earlier in the process, they are more
efficient at finding defects.
Reporting a Defect
 Be specific:
1. Specify the exact action: Do not say something like ‘Select ButtonB’. Do you
mean ‘Click ButtonB’ or ‘Press ALT+B’ or ‘Focus on ButtonB and click
ENTER’? Of course, if the defect can be arrived at by using all the three ways,
it’s okay to use a generic term as ‘Select’ but bear in mind that you might just get
the fix for the ‘Click ButtonB’ scenario. [Note: This might be a highly unlikely
example but it is hoped that the message is clear.]
2. In case of multiple paths, mention the exact path you followed: Do not say
something like “If you do ‘A and X’ or ‘B and Y’ or ‘C and Z’, you get D.”
Understanding all the paths at once will be difficult. Instead, say “Do ‘A and X’
and you get D.” You can, of course, mention elsewhere in the report that “D can
also be got if you do ‘B and Y’ or ‘C and Z’.”
3. Do not use vague pronouns: Do not say something like “In ApplicationA, open X,
Y, and Z, and then close it.” What does the ‘it’ stand for? ‘Z’ or, ‘Y’, or ‘X’ or
‘ApplicationA’?”
 Be detailed:
1. Provide more information (not less). In other words, do not be lazy. Developers
may or may not use all the information you provide but they sure do not want to
beg you for any information you have missed.
 Be objective:
1. Do not make subjective statements like “This is a lousy application” or “You
fixed it real bad.”
Unit 4: Defect Management
Course Coordinator : Mrs. Kshirsagar S.R. M.M.Polytechnic , Thergaon Page 12
2. Stick to the facts and avoid the emotions.
 Reproduce the defect:
1. Do not be impatient and file a defect report as soon as you uncover a defect.
Replicate it at least once more to be sure. (If you cannot replicate it again, try
recalling the exact test condition and keep trying. However, if you cannot
replicate it again after many trials, finally submit the report for further
investigation, stating that you are unable to reproduce the defect anymore and
providing any evidence of the defect if you had gathered. )
 Review the report:
1. Do not hit ‘Submit’ as soon as you write the report. Review it at least once.
Remove any typos.

Weitere ähnliche Inhalte

Was ist angesagt?

ISTQB / ISEB Foundation Exam Practice - 2
ISTQB / ISEB Foundation Exam Practice - 2ISTQB / ISEB Foundation Exam Practice - 2
ISTQB / ISEB Foundation Exam Practice - 2Yogindernath Gupta
 
IT8076 - SOFTWARE TESTING
IT8076 - SOFTWARE TESTINGIT8076 - SOFTWARE TESTING
IT8076 - SOFTWARE TESTINGSathya R
 
Fundamentals of software testing
Fundamentals of software testingFundamentals of software testing
Fundamentals of software testingNoha Gamal
 
Software testing & Quality Assurance
Software testing & Quality Assurance Software testing & Quality Assurance
Software testing & Quality Assurance Webtech Learning
 
Software Inspection And Defect Management
Software Inspection And Defect ManagementSoftware Inspection And Defect Management
Software Inspection And Defect ManagementAjay K
 
Software Testing - Test management - Mazenet Solution
Software Testing - Test management - Mazenet SolutionSoftware Testing - Test management - Mazenet Solution
Software Testing - Test management - Mazenet SolutionMazenetsolution
 
Fundamentals of Software Testing
Fundamentals of Software TestingFundamentals of Software Testing
Fundamentals of Software TestingSagar Joshi
 
Fundamentals of testing
Fundamentals of testingFundamentals of testing
Fundamentals of testingBugRaptors
 
ISTQB Foundation - Chapter 2
ISTQB Foundation - Chapter 2ISTQB Foundation - Chapter 2
ISTQB Foundation - Chapter 2Chandukar
 
IT 8076 Software Testing Unit1
IT 8076 Software Testing Unit1IT 8076 Software Testing Unit1
IT 8076 Software Testing Unit1Roselin Mary S
 
Role of a Software Tester
Role of a Software TesterRole of a Software Tester
Role of a Software TesterQAI Global
 
An introduction to Software Testing and Test Management
An introduction to Software Testing and Test ManagementAn introduction to Software Testing and Test Management
An introduction to Software Testing and Test ManagementAnuraj S.L
 

Was ist angesagt? (19)

ISTQB / ISEB Foundation Exam Practice - 2
ISTQB / ISEB Foundation Exam Practice - 2ISTQB / ISEB Foundation Exam Practice - 2
ISTQB / ISEB Foundation Exam Practice - 2
 
Unit 1 part 2
Unit 1 part 2Unit 1 part 2
Unit 1 part 2
 
Software testing introduction
Software testing  introductionSoftware testing  introduction
Software testing introduction
 
IT8076 - SOFTWARE TESTING
IT8076 - SOFTWARE TESTINGIT8076 - SOFTWARE TESTING
IT8076 - SOFTWARE TESTING
 
Istqb chapter 5
Istqb chapter 5Istqb chapter 5
Istqb chapter 5
 
Unit2 for st
Unit2 for stUnit2 for st
Unit2 for st
 
Fundamentals of software testing
Fundamentals of software testingFundamentals of software testing
Fundamentals of software testing
 
Ch14
Ch14Ch14
Ch14
 
Software testing & Quality Assurance
Software testing & Quality Assurance Software testing & Quality Assurance
Software testing & Quality Assurance
 
Software Inspection And Defect Management
Software Inspection And Defect ManagementSoftware Inspection And Defect Management
Software Inspection And Defect Management
 
Software Testing - Test management - Mazenet Solution
Software Testing - Test management - Mazenet SolutionSoftware Testing - Test management - Mazenet Solution
Software Testing - Test management - Mazenet Solution
 
Fundamentals of Software Testing
Fundamentals of Software TestingFundamentals of Software Testing
Fundamentals of Software Testing
 
Fundamentals of testing
Fundamentals of testingFundamentals of testing
Fundamentals of testing
 
SOFTWARE TESTING
SOFTWARE TESTINGSOFTWARE TESTING
SOFTWARE TESTING
 
ISTQB Foundation - Chapter 2
ISTQB Foundation - Chapter 2ISTQB Foundation - Chapter 2
ISTQB Foundation - Chapter 2
 
Unit 3 for st
Unit 3 for stUnit 3 for st
Unit 3 for st
 
IT 8076 Software Testing Unit1
IT 8076 Software Testing Unit1IT 8076 Software Testing Unit1
IT 8076 Software Testing Unit1
 
Role of a Software Tester
Role of a Software TesterRole of a Software Tester
Role of a Software Tester
 
An introduction to Software Testing and Test Management
An introduction to Software Testing and Test ManagementAn introduction to Software Testing and Test Management
An introduction to Software Testing and Test Management
 

Ähnlich wie Chapter 4

Introduction and Role of a manual testing in a SDLC
Introduction and Role of a manual testing in a SDLC Introduction and Role of a manual testing in a SDLC
Introduction and Role of a manual testing in a SDLC minimini22
 
IRJET- Technique of Finding the Defect in Software Testing
IRJET- Technique of Finding the Defect in Software TestingIRJET- Technique of Finding the Defect in Software Testing
IRJET- Technique of Finding the Defect in Software TestingIRJET Journal
 
ISTQB Chapter 1 Fundamentals of Testing
ISTQB Chapter 1  Fundamentals of TestingISTQB Chapter 1  Fundamentals of Testing
ISTQB Chapter 1 Fundamentals of Testingssuser2d9936
 
Reading Summary - Effective Software Defect Tracking + Pragmatic Unit Testing
Reading Summary - Effective Software Defect Tracking + Pragmatic Unit TestingReading Summary - Effective Software Defect Tracking + Pragmatic Unit Testing
Reading Summary - Effective Software Defect Tracking + Pragmatic Unit TestingArtemisa Yescas Engler
 
Software_testing Unit 1 bca V.pdf
Software_testing Unit 1 bca V.pdfSoftware_testing Unit 1 bca V.pdf
Software_testing Unit 1 bca V.pdfAnupmaMunshi
 
EFFECTIVE TEST CASE DESING: A REVIEW
EFFECTIVE TEST CASE DESING: A REVIEWEFFECTIVE TEST CASE DESING: A REVIEW
EFFECTIVE TEST CASE DESING: A REVIEWJournal For Research
 
Aim (A).pptx
Aim (A).pptxAim (A).pptx
Aim (A).pptx14941
 
Strategies For Software Test Documentation
Strategies For Software Test Documentation Strategies For Software Test Documentation
Strategies For Software Test Documentation Vishwak Solution
 
Software testing main
Software testing mainSoftware testing main
Software testing mainYogeshDhamke2
 
Bug life cycle
Bug life cycleBug life cycle
Bug life cycleBugRaptors
 
QA interview questions and answers
QA interview questions and answersQA interview questions and answers
QA interview questions and answersMehul Chauhan
 
Software Quality Assurance training by QuontraSolutions
Software Quality Assurance training by QuontraSolutionsSoftware Quality Assurance training by QuontraSolutions
Software Quality Assurance training by QuontraSolutionsQUONTRASOLUTIONS
 
Software Testing Interview Questions For Experienced
Software Testing Interview Questions For ExperiencedSoftware Testing Interview Questions For Experienced
Software Testing Interview Questions For Experiencedzynofustechnology
 
Session17-Software Testing.pdf
Session17-Software Testing.pdfSession17-Software Testing.pdf
Session17-Software Testing.pdfPeterTran514407
 

Ähnlich wie Chapter 4 (20)

Introduction and Role of a manual testing in a SDLC
Introduction and Role of a manual testing in a SDLC Introduction and Role of a manual testing in a SDLC
Introduction and Role of a manual testing in a SDLC
 
IRJET- Technique of Finding the Defect in Software Testing
IRJET- Technique of Finding the Defect in Software TestingIRJET- Technique of Finding the Defect in Software Testing
IRJET- Technique of Finding the Defect in Software Testing
 
ISTQB Chapter 1 Fundamentals of Testing
ISTQB Chapter 1  Fundamentals of TestingISTQB Chapter 1  Fundamentals of Testing
ISTQB Chapter 1 Fundamentals of Testing
 
Reading Summary - Effective Software Defect Tracking + Pragmatic Unit Testing
Reading Summary - Effective Software Defect Tracking + Pragmatic Unit TestingReading Summary - Effective Software Defect Tracking + Pragmatic Unit Testing
Reading Summary - Effective Software Defect Tracking + Pragmatic Unit Testing
 
Software_testing Unit 1 bca V.pdf
Software_testing Unit 1 bca V.pdfSoftware_testing Unit 1 bca V.pdf
Software_testing Unit 1 bca V.pdf
 
EFFECTIVE TEST CASE DESING: A REVIEW
EFFECTIVE TEST CASE DESING: A REVIEWEFFECTIVE TEST CASE DESING: A REVIEW
EFFECTIVE TEST CASE DESING: A REVIEW
 
Testing overview
Testing overviewTesting overview
Testing overview
 
Aim (A).pptx
Aim (A).pptxAim (A).pptx
Aim (A).pptx
 
SE-Testing.ppt
SE-Testing.pptSE-Testing.ppt
SE-Testing.ppt
 
Strategies For Software Test Documentation
Strategies For Software Test Documentation Strategies For Software Test Documentation
Strategies For Software Test Documentation
 
Software testing main
Software testing mainSoftware testing main
Software testing main
 
Bug life cycle
Bug life cycleBug life cycle
Bug life cycle
 
QA interview questions and answers
QA interview questions and answersQA interview questions and answers
QA interview questions and answers
 
Software testing ppt
Software testing pptSoftware testing ppt
Software testing ppt
 
Software Quality Assurance training by QuontraSolutions
Software Quality Assurance training by QuontraSolutionsSoftware Quality Assurance training by QuontraSolutions
Software Quality Assurance training by QuontraSolutions
 
Software Testing Interview Questions For Experienced
Software Testing Interview Questions For ExperiencedSoftware Testing Interview Questions For Experienced
Software Testing Interview Questions For Experienced
 
QA Basics and PM Overview
QA Basics and PM OverviewQA Basics and PM Overview
QA Basics and PM Overview
 
Software Development Tips
Software Development TipsSoftware Development Tips
Software Development Tips
 
Session17-Software Testing.pdf
Session17-Software Testing.pdfSession17-Software Testing.pdf
Session17-Software Testing.pdf
 
Stm unit1
Stm unit1Stm unit1
Stm unit1
 

Mehr von Ankit Dubey

Unit 1 android and it's tools quiz {mad cwipedia}
Unit 1 android and it's tools quiz {mad cwipedia}Unit 1 android and it's tools quiz {mad cwipedia}
Unit 1 android and it's tools quiz {mad cwipedia}Ankit Dubey
 
Ch5 cpu-scheduling
Ch5 cpu-schedulingCh5 cpu-scheduling
Ch5 cpu-schedulingAnkit Dubey
 
Ch2 system structure
Ch2 system structureCh2 system structure
Ch2 system structureAnkit Dubey
 
Ch1 introduction-to-os
Ch1 introduction-to-osCh1 introduction-to-os
Ch1 introduction-to-osAnkit Dubey
 
Mongodb mock test_ii
Mongodb mock test_iiMongodb mock test_ii
Mongodb mock test_iiAnkit Dubey
 
Android mock test_iii
Android mock test_iiiAndroid mock test_iii
Android mock test_iiiAnkit Dubey
 
Android mock test_ii
Android mock test_iiAndroid mock test_ii
Android mock test_iiAnkit Dubey
 
Ajp notes-chapter-06
Ajp notes-chapter-06Ajp notes-chapter-06
Ajp notes-chapter-06Ankit Dubey
 
Ajp notes-chapter-05
Ajp notes-chapter-05Ajp notes-chapter-05
Ajp notes-chapter-05Ankit Dubey
 
Ajp notes-chapter-04
Ajp notes-chapter-04Ajp notes-chapter-04
Ajp notes-chapter-04Ankit Dubey
 
Ajp notes-chapter-03
Ajp notes-chapter-03Ajp notes-chapter-03
Ajp notes-chapter-03Ankit Dubey
 
Ajp notes-chapter-02
Ajp notes-chapter-02Ajp notes-chapter-02
Ajp notes-chapter-02Ankit Dubey
 
Ajp notes-chapter-01
Ajp notes-chapter-01Ajp notes-chapter-01
Ajp notes-chapter-01Ankit Dubey
 

Mehr von Ankit Dubey (20)

Unit 1 android and it's tools quiz {mad cwipedia}
Unit 1 android and it's tools quiz {mad cwipedia}Unit 1 android and it's tools quiz {mad cwipedia}
Unit 1 android and it's tools quiz {mad cwipedia}
 
Scheduling
Scheduling Scheduling
Scheduling
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Ch5 cpu-scheduling
Ch5 cpu-schedulingCh5 cpu-scheduling
Ch5 cpu-scheduling
 
Ch4 threads
Ch4 threadsCh4 threads
Ch4 threads
 
Ch3 processes
Ch3 processesCh3 processes
Ch3 processes
 
Ch2 system structure
Ch2 system structureCh2 system structure
Ch2 system structure
 
Ch1 introduction-to-os
Ch1 introduction-to-osCh1 introduction-to-os
Ch1 introduction-to-os
 
Android i
Android iAndroid i
Android i
 
Mongodb mock test_ii
Mongodb mock test_iiMongodb mock test_ii
Mongodb mock test_ii
 
Android mock test_iii
Android mock test_iiiAndroid mock test_iii
Android mock test_iii
 
Android mock test_ii
Android mock test_iiAndroid mock test_ii
Android mock test_ii
 
Ajp notes-chapter-06
Ajp notes-chapter-06Ajp notes-chapter-06
Ajp notes-chapter-06
 
Ajp notes-chapter-05
Ajp notes-chapter-05Ajp notes-chapter-05
Ajp notes-chapter-05
 
Ajp notes-chapter-04
Ajp notes-chapter-04Ajp notes-chapter-04
Ajp notes-chapter-04
 
Ajp notes-chapter-03
Ajp notes-chapter-03Ajp notes-chapter-03
Ajp notes-chapter-03
 
Ajp notes-chapter-02
Ajp notes-chapter-02Ajp notes-chapter-02
Ajp notes-chapter-02
 
Ajp notes-chapter-01
Ajp notes-chapter-01Ajp notes-chapter-01
Ajp notes-chapter-01
 
13 c
13 c13 c
13 c
 

Kürzlich hochgeladen

KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSUNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSrknatarajan
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 

Kürzlich hochgeladen (20)

KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSUNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 

Chapter 4

  • 1. Unit 4: Defect Management Course Coordinator : Mrs. Kshirsagar S.R. M.M.Polytechnic , Thergaon Page 1 CO4 : Identify bugs to create defect report of given application. What is defect? Defect: A defect is an error or a bug, in the application which is created. A programmer while designing and building the software can make mistakes or errors. These mistakes or errors mean that there are flaws in the software. These are called defects. Defects in any system may arise in various stages of development life cycle. At each stage, the impact and cost of fixing defects are dependent on various aspects including the defect arising stage. Different causes of software defects  Miscommunication of requirements introduces error in code  Unrealistic time schedule for development  Lack of designing experience  Lack of coding practices experience  Human factors introduces errors in code  Lack of version control  Buggy third-party tools  Last minute changes in the requirement introduce error  Poor Software testing skill Defect Classification Defect Classification 1.Severity Wise 2.Work Product Wise 3.Type Of Error Wise 4.Status Wise
  • 2. Unit 4: Defect Management Course Coordinator : Mrs. Kshirsagar S.R. M.M.Polytechnic , Thergaon Page 2 Severity Wise:  Major: A defect, which will cause an observable product failure or departure from requirements.  Minor: A defect that will not cause a failure in execution of the product.  Fatal: A defect that will cause the system to crash or close abruptly or effect other applications. Work product wise:  SSD: A defect from System Study document  FSD: A defect from Functional Specification document  ADS: A defect from Architectural Design Document  DDS: A defect from Detailed Design document  Source code: A defect from Source code  Test Plan/ Test Cases: A defect from Test Plan/ Test Cases  User Documentation: A defect from User manuals, Operating manuals Type of Errors Wise:  Comments: Inadequate/ incorrect/ misleading or missing comments in the source code  Computational Error: Improper computation of the formulae / improper business validations in code.  Data error: Incorrect data population / update in database  Database Error: Error in the database schema/Design  Missing Design: Design features/approach missed/not documented in the design document and hence does not correspond to requirements  Inadequate or sub optimal Design: Design features/approach needs additional inputs for it to be complete Design features described does not provide the best approach (optimal approach) towards the solution required  In correct Design: Wrong or inaccurate Design  Ambiguous Design: Design feature/approach is not clear to the reviewer. Also includes ambiguous use of words or unclear design features.  Boundary Conditions Neglected: Boundary conditions not addressed/incorrect  Interface Error: Internal or external to application interfacing error, Incorrect handling of passing parameters, Incorrect alignment, incorrect/misplaced fields/objects, un friendly window/screen positions  Logic Error: Missing or Inadequate or irrelevant or ambiguous functionality in source code
  • 3. Unit 4: Defect Management Course Coordinator : Mrs. Kshirsagar S.R. M.M.Polytechnic , Thergaon Page 3  Message Error: Inadequate/ incorrect/ misleading or missing error messages in source code  Navigation Error: Navigation not coded correctly in source code  Performance Error: An error related to performance/optimality of the code  Missing Requirements: Implicit/Explicit requirements are missed/not documented during requirement phase  Inadequate Requirements: Requirement needs additional inputs for to be complete  Incorrect Requirements: Wrong or inaccurate requirements  Ambiguous Requirements: Requirement is not clear to the reviewer. Also includes ambiguous use of words – e.g. Like, such as, may be, could be, might etc.  Sequencing / Timing Error: Error due to incorrect/missing consideration to timeouts and improper/missing sequencing in source code.  Standards: Standards not followed like improper exception handling, use of E & D Formats and project related design/requirements/coding standards  System Error: Hardware and Operating System related error, Memory leak  Test Plan / Cases Error: Inadequate/ incorrect/ ambiguous or duplicate or missing - Test Plan/ Test Cases & Test Scripts, Incorrect/Incomplete test setup  Typographical Error: Spelling / Grammar mistake in documents/source code  Variable Declaration Error: Improper declaration / usage of variables, Type mismatch error in source code Status Wise:  Open  Closed  Deferred  Cancelled Defect Management Process The process of finding defects and reducing them at the lowest cost is called as Defect Management Process.
  • 4. Unit 4: Defect Management Course Coordinator : Mrs. Kshirsagar S.R. M.M.Polytechnic , Thergaon Page 4 Defect Prevention -- Implementation of techniques, methodology and standard processes to reduce the risk of defects. Deliverable Baseline -- Establishment of milestones where deliverables will be considered complete and ready for further development work. When a deliverable is base lined, any further changes are controlled. Errors in a deliverable are not considered defects until after the deliverable is base lined. Defect Discovery -- Identification and reporting of defects for development team acknowledgment. A defect is only termed discovered when it has been documented and acknowledged as a valid defect by the development team member(s) responsible for the component(s) in error. Defect Resolution -- Work by the development team to prioritize, schedule and fix a defect, and document the resolution. This also includes notification back to the tester to ensure that the resolution is verified. Process Improvement -- Identification and analysis of the process in which a defect originated to identify ways to improve the process to prevent future occurrences of similar defects. Also the validation process that should have identified the defect earlier is analyzed to determine ways to strengthen that process. Management Reporting -- Analysis and reporting of defect information to assist management with risk management, process improvement and project management. Defect Life Cycle
  • 5. Unit 4: Defect Management Course Coordinator : Mrs. Kshirsagar S.R. M.M.Polytechnic , Thergaon Page 5 DEFECT LIFE CYCLE (Bug Life cycle) is the journey of a defect from its identification to its closure. The Life Cycle varies from organization to organization and is governed by the software testing process the organization or project follows and/or the Defect tracking tool being used.
  • 6. Unit 4: Defect Management Course Coordinator : Mrs. Kshirsagar S.R. M.M.Polytechnic , Thergaon Page 6  New: When the bug is posted for the first time, its state will be “NEW”. This means that the bug is not yet approved.  Open: After a tester has posted a bug, the lead of the tester approves that the bug is genuine and he changes the state as “OPEN”.  Assign: Once the lead changes the state as “OPEN”, he assigns the bug corresponding developer or developer team. The state of the bug now is changed to “ASSIGN”.  Test/Retest: Once the developer fixes the bug, he has to assign the bug to the testing team for next round of testing. Before he releases the software with bug fixed, he changes the state of bug to “TEST”. It specifies that the bug has been fixed and is released to testing team.// At this stage the tester do the retesting of the changed code which developer has given to him to check whether the defect got fixed or not.  Deferred: The bug, changed to deferred state means the bug is expected to be fixed in next releases. The reasons for changing the bug to this state have many factors. Some of them are priority of the bug may be low, lack of time for the release or the bug may not have major effect on the software.  Rejected: If the developer feels that the bug is not genuine, he rejects the bug. Then the state of the bug is changed to “REJECTED”.  Verified: Once the bug is fixed and the status is changed to “TEST”, the tester tests the bug. If the bug is not present in the software, he approves that the bug is fixed and changes the status to “VERIFIED”.  Reopened: If the bug still exists even after the bug is fixed by the developer, the tester changes the status to “REOPENED”. The bug traverses the life cycle once again.  Closed: Once the bug is fixed, it is tested by the tester. If the tester feels that the bug no longer exists in the software, he changes the status of the bug to “CLOSED”. This state means that the bug is fixed, tested and approved.  Fixed: When developer makes necessary code changes and verifies the changes then he/she can make bug status as „Fixed‟ and the bug is passed to testing team.  Pending retest: After fixing the defect the developer has given that particular code for retesting to the tester. Here the testing is pending on the testers end. Hence its status is pending retest. Defect Prevention Process  “Prevention is better than cure” applies to defects in the software development life cycle  Defects, as defined by software developers, are variances from a desired attribute. These attributes include complete and correct requirements and specifications as drawn from the desires of potential customers.
  • 7. Unit 4: Defect Management Course Coordinator : Mrs. Kshirsagar S.R. M.M.Polytechnic , Thergaon Page 7  Thus, defects cause software to fail to meet requirements and make customers unhappy.  when a defect gets through during the development process, the earlier it is diagnosed, the easier and cheaper is the rectification of the defect.  The end result in prevention or early detection is a product with zero or minimal defects. Identify Critical Risks -- Identify the critical risks facing the project or system. These are the types of defects that could jeopardize the successful construction, delivery and/or operation of the system. Estimate Expected Impact -- For each critical risk, make an assessment of the financial impact if the risk becomes a problem. Minimize Expected Impact -- Once the most important risks are identified try to eliminate each risk. For risks that cannot be eliminated, reduce the probability that the risk will become a problem and the financial impact should that happen. The five general activities of defect prevention are: 1. Software Requirements Analysis Defects introduced during the requirements and design phase are not only more probable but also are more severe and more difficult to remove. Front-end errors in requirements and design cannot be found and removed via testing, but instead need pre-test reviews and inspections. 2. Reviews: Self-Review and Peer Review Self-review is one of the most effective activity in uncovering the defects which may later be discovered by a testing team or directly by a customer. A self-review of the code helps reduce the defects related to algorithm mplementations, incorrect logic or certain missing conditions.
  • 8. Unit 4: Defect Management Course Coordinator : Mrs. Kshirsagar S.R. M.M.Polytechnic , Thergaon Page 8 Peer review is similar to self-review in terms of the objective – the only difference is that it is a peer (someone who understands the functionality of the code very well) who reviews the code 3. Defect Logging and Documentation Effective defect tracking begins with a systematic process. A structured tracking process begins with initially logging the defects, investigating the defects, then providing the structure to resolve them. Defect analysis and reporting offer a powerful means to manage defects and defect depletion trends, hence, costs. Root Cause Analysis and Preventive Measures Determination After defects are logged and documented, the next step is to analyze them Reducing the defects to improve the quality: The analysis should lead to implementing changes in processes that help prevent defects and ensure their early detection. Applying local expertise: The people who really understand what went wrong are the people present when the defects were inserted – members of the software engineering team. They can give the best suggestions for how to avoid such defects in the future. Targeting the systematic errors: There may be many errors or defects to be handled in such an analysis forum; however, some mistakes tend to be repeated. These systematic errors account for a large portion of the defects found in the typical software project. 5. Embedding Procedures into Software Development Process Implementation is the toughest of all activities of defect prevention. It requires total commitment from the development team and management. A plan of action is made for deployment of the modification of the existing processes or introduction of the new ones with the consent of management and the team. Defect Report Template  A defect report documents an anomaly discovered during testing.  It includes all the information needed to reproduce the problem, including the author, release/build number, open/close dates, problem area, problem description, test environment, defect type, how it was detected, who detected it, priority, severity, status, etc. After uncovering a defect (bug), testers generate a formal defect report.  The purpose of a defect report is to state the problem as clearly as possible so that developers can replicate the defect easily and fix it.
  • 9. Unit 4: Defect Management Course Coordinator : Mrs. Kshirsagar S.R. M.M.Polytechnic , Thergaon Page 9 Estimate Expected Impact Of A Defect  Defect Impact: The degree of severity that a defect has on the development or operation of a component or system.  How to Estimate the defect impact 1. Once the critical risks are identified, the financial impact of each risk should be estimated. 2. This can be done by assessing the impact, in dollars, if the risk does become a problem combined with the probability that the risk will become a problem. 3. The product of these two numbers is the expected impact of the risk.
  • 10. Unit 4: Defect Management Course Coordinator : Mrs. Kshirsagar S.R. M.M.Polytechnic , Thergaon Page 10 4. The expected impact of a risk (E) is calculated as E = P * I, where: P= probability of the risk becoming a problem and I= Impact in dollars if the risk becomes a problem. Once the expected impact of each risk is identified, the risks should be prioritized by the expected impact and the degree to which the expected impact can be reduced. While guess work will constitute a major role in producing these numbers, precision is not important. What will be important is to identify the risk, and determine the risk's order of magnitude. Large, complex systems will have many critical risks. Whatever can be done to reduce the probability of each individual critical risk becoming a problem to a very small number should be done. Doing this increases the probability of a successful project by increasing the probability that none of the critical risks will become a problem. One should assume that an individual critical risk has a low probability of becoming a problem only when there is specific knowledge justifying why it is low. For example, the likelihood that an important requirement was missed may be high if developers have not involved users in the project. If users have actively participated in the requirements definition, and the new system is not a radical departure from an existing system or process, the likelihood may be low. For example: o An organization with a project of 2,500 function points and was about medium at defect discovery and removal would have 1,650 defects remaining after all defect removal and discovery activities. o The calculation is 2,500 x 1.2 = 3,000 potential defects. o The organization would be able to remove about 45% of the defects or 1,350 defects. o The total potential defects (3,000) less the removed defects (1,350) equals the remaining defects of 1,650. Techniques For Finding Defects  Defects are found either by preplanned activities specifically intended to uncover defects (e.g., quality control activities such as inspections, testing, etc.) or by accident (e.g., users in production). Techniques to find defects can be divided into three categories:  Static techniques: Testing that is done without physically executing a program or system. A code review is an example of a static testing technique.
  • 11. Unit 4: Defect Management Course Coordinator : Mrs. Kshirsagar S.R. M.M.Polytechnic , Thergaon Page 11  Dynamic techniques: Testing in which system components are physically executed to identify defects. Execution of test cases is an example of a dynamic testing technique.  Operational techniques: An operational system produces a deliverable containing a defect found by users, customers, or control personnel -- i.e., the defect is found as a result of a failure.  While it is beyond the scope of this study to compare and contrast the various static, dynamic, and operational techniques, the research did arrive at the following conclusions:  Both static and dynamic techniques are required for an effective defect management program. In each category, the more formally the techniques were integrated into the development process, the more effective they were. Since static techniques will generally find defects earlier in the process, they are more efficient at finding defects. Reporting a Defect  Be specific: 1. Specify the exact action: Do not say something like ‘Select ButtonB’. Do you mean ‘Click ButtonB’ or ‘Press ALT+B’ or ‘Focus on ButtonB and click ENTER’? Of course, if the defect can be arrived at by using all the three ways, it’s okay to use a generic term as ‘Select’ but bear in mind that you might just get the fix for the ‘Click ButtonB’ scenario. [Note: This might be a highly unlikely example but it is hoped that the message is clear.] 2. In case of multiple paths, mention the exact path you followed: Do not say something like “If you do ‘A and X’ or ‘B and Y’ or ‘C and Z’, you get D.” Understanding all the paths at once will be difficult. Instead, say “Do ‘A and X’ and you get D.” You can, of course, mention elsewhere in the report that “D can also be got if you do ‘B and Y’ or ‘C and Z’.” 3. Do not use vague pronouns: Do not say something like “In ApplicationA, open X, Y, and Z, and then close it.” What does the ‘it’ stand for? ‘Z’ or, ‘Y’, or ‘X’ or ‘ApplicationA’?”  Be detailed: 1. Provide more information (not less). In other words, do not be lazy. Developers may or may not use all the information you provide but they sure do not want to beg you for any information you have missed.  Be objective: 1. Do not make subjective statements like “This is a lousy application” or “You fixed it real bad.”
  • 12. Unit 4: Defect Management Course Coordinator : Mrs. Kshirsagar S.R. M.M.Polytechnic , Thergaon Page 12 2. Stick to the facts and avoid the emotions.  Reproduce the defect: 1. Do not be impatient and file a defect report as soon as you uncover a defect. Replicate it at least once more to be sure. (If you cannot replicate it again, try recalling the exact test condition and keep trying. However, if you cannot replicate it again after many trials, finally submit the report for further investigation, stating that you are unable to reproduce the defect anymore and providing any evidence of the defect if you had gathered. )  Review the report: 1. Do not hit ‘Submit’ as soon as you write the report. Review it at least once. Remove any typos.