SlideShare a Scribd company logo
1 of 47
Software Testing Basics Elaine Weyuker AT&T Labs – Research Florham Park, NJ November 11, 2002
What is Software Testing? ,[object Object]
Goals of Testing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Software Testing Difficulties ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Determining the Correctness of Outputs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Dimensions of Test Case Selection ,[object Object],[object Object]
Stages of Testing ,[object Object],[object Object],[object Object],[object Object]
Unit Testing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Integration Testing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Integration Testing ,[object Object],[object Object],[object Object],[object Object]
Integration Testing ,[object Object],[object Object],[object Object],[object Object]
Stages of Testing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
System Testing ,[object Object],[object Object]
Realities of System Testing ,[object Object],[object Object],[object Object],[object Object]
More Realities of Software Testing ,[object Object],[object Object],[object Object],[object Object],[object Object]
Test Selection Strategies Every systematic test selection strategy can be viewed as a way of dividing the input domain into  subdomains , and selecting one or more test case from each. The division can be based on such things as code characteristics (white box), specification details (black box), domain structure, risk analysis, etc.  Subdomains are not necessarily disjoint, even though the testing literature frequently refers to them as  partitions.
The Down Side of Code-Based Techniques ,[object Object],[object Object]
The Down Side of Specification-Based Techniques ,[object Object],[object Object],[object Object]
Operational Distributions ,[object Object],[object Object]
How Usage Data Can Be Collected For New Systems ,[object Object],[object Object],[object Object],[object Object],[object Object]
Operational Distribution-Based Test Case Selection ,[object Object],[object Object],[object Object]
The Down Side of Operational Distribution-Based Techniques ,[object Object],[object Object],[object Object]
The Up Side of Operational Distribution-Based Techniques ,[object Object],[object Object],[object Object]
Domain-Based Test Case Selection ,[object Object],[object Object],[object Object],[object Object]
Domain-Based Testing Example ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Random Testing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Benefits of Random Testing ,[object Object],[object Object]
The Down Side of Random Testing ,[object Object],[object Object],[object Object],[object Object],[object Object]
Risk-based Testing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Risk-based Testing ,[object Object],[object Object],[object Object]
Risk Priority Table 9 High  = 3  High = 3 Withdraw cash 4 Medium = 2 Medium = 2 Transfer money 1 Low = 1 Low = 1 Read balance 3 High = 3 Low = 1 Make payment 3 Low = 1 High = 3 Buy train ticket 6 High = 3 Medium = 2 Security Priority (L x C) Failure Consequence Occurrence Likelihood Features & Attributes
Ordered Risk Priority Table 1 Low = 1 Low = 1 Read balance 6 High  = 3  Medium = 2 Security 9 High  = 3  High = 3 Withdraw cash 4 Medium = 2 Medium = 2 Transfer money 3 High  = 3  Low = 1 Make payment 3 Low  1 High  = 3  Buy train ticket Priority (L x C) Failure Consequence Occurrence Likelihood Features & Attributes
Acceptance Testing ,[object Object],[object Object],[object Object],[object Object],[object Object]
Regression Testing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Prioritizing Test Cases ,[object Object],[object Object],[object Object],[object Object],[object Object]
Bases for Test Prioritization ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
White-box Testing ,[object Object],[object Object],[object Object],[object Object],[object Object]
White-box Testing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Control Flow and Data Flow Criteria ,[object Object],[object Object]
Issues of White-box Testing ,[object Object],[object Object],[object Object],[object Object],[object Object]
Test Automation ,[object Object],[object Object],[object Object]
Why should tests be automated? ,[object Object],[object Object],[object Object]
Test Automation Issues ,[object Object],[object Object],[object Object],[object Object]
Observations on Automated Tests ,[object Object],[object Object],[object Object]
Uses of Automated Testing ,[object Object],[object Object],[object Object],[object Object]
Financial Implications of Improved Testing ,[object Object],[object Object]
Estimated Cost of Inadequate Testing *NIST Report: The Economic Impact of Inadequate Infrastructure for Software Testing, 2002.  $22 billion $59 billion Total U.S. Economy $1,510,000,000 $3,340,000,000 Financial Services $589,000,000 $1,800,000,000 Transportation Manufacture Potential Cost Reduction from Feasible Improvements Cost of Inadequate Software Testing

More Related Content

More from lmscollaborative2 (20)

contrucci
contruccicontrucci
contrucci
 
contrucci
contruccicontrucci
contrucci
 
test3
test3test3
test3
 
remoto2
remoto2remoto2
remoto2
 
finalelocale
finalelocalefinalelocale
finalelocale
 
 
test2
test2test2
test2
 
provoora
provooraprovoora
provoora
 
provacompleta4
provacompleta4provacompleta4
provacompleta4
 
provacompleta3
provacompleta3provacompleta3
provacompleta3
 
provacompleta2
provacompleta2provacompleta2
provacompleta2
 
provaoggi2
provaoggi2provaoggi2
provaoggi2
 
domenica3
domenica3domenica3
domenica3
 
domenica2
domenica2domenica2
domenica2
 
domenica1
domenica1domenica1
domenica1
 
provarealw4
provarealw4provarealw4
provarealw4
 
provarealw2
provarealw2provarealw2
provarealw2
 
testsfw7
testsfw7testsfw7
testsfw7
 
testsfw5
testsfw5testsfw5
testsfw5
 
testsfw4
testsfw4testsfw4
testsfw4
 

Recently uploaded

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 

Recently uploaded (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

provarealw4

  • 1. Software Testing Basics Elaine Weyuker AT&T Labs – Research Florham Park, NJ November 11, 2002
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16. Test Selection Strategies Every systematic test selection strategy can be viewed as a way of dividing the input domain into subdomains , and selecting one or more test case from each. The division can be based on such things as code characteristics (white box), specification details (black box), domain structure, risk analysis, etc. Subdomains are not necessarily disjoint, even though the testing literature frequently refers to them as partitions.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31. Risk Priority Table 9 High = 3 High = 3 Withdraw cash 4 Medium = 2 Medium = 2 Transfer money 1 Low = 1 Low = 1 Read balance 3 High = 3 Low = 1 Make payment 3 Low = 1 High = 3 Buy train ticket 6 High = 3 Medium = 2 Security Priority (L x C) Failure Consequence Occurrence Likelihood Features & Attributes
  • 32. Ordered Risk Priority Table 1 Low = 1 Low = 1 Read balance 6 High = 3 Medium = 2 Security 9 High = 3 High = 3 Withdraw cash 4 Medium = 2 Medium = 2 Transfer money 3 High = 3 Low = 1 Make payment 3 Low 1 High = 3 Buy train ticket Priority (L x C) Failure Consequence Occurrence Likelihood Features & Attributes
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47. Estimated Cost of Inadequate Testing *NIST Report: The Economic Impact of Inadequate Infrastructure for Software Testing, 2002. $22 billion $59 billion Total U.S. Economy $1,510,000,000 $3,340,000,000 Financial Services $589,000,000 $1,800,000,000 Transportation Manufacture Potential Cost Reduction from Feasible Improvements Cost of Inadequate Software Testing