SlideShare ist ein Scribd-Unternehmen logo
1 von 47
Software Testing Basics Elaine Weyuker AT&T Labs – Research Florham Park, NJ November 11, 2002
What is Software Testing? ,[object Object]
Goals of Testing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Software Testing Difficulties ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Determining the Correctness of Outputs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Dimensions of Test Case Selection ,[object Object],[object Object]
Stages of Testing ,[object Object],[object Object],[object Object],[object Object]
Unit Testing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Integration Testing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Integration Testing ,[object Object],[object Object],[object Object],[object Object]
Integration Testing ,[object Object],[object Object],[object Object],[object Object]
Stages of Testing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
System Testing ,[object Object],[object Object]
Realities of System Testing ,[object Object],[object Object],[object Object],[object Object]
More Realities of Software Testing ,[object Object],[object Object],[object Object],[object Object],[object Object]
Test Selection Strategies Every systematic test selection strategy can be viewed as a way of dividing the input domain into  subdomains , and selecting one or more test case from each. The division can be based on such things as code characteristics (white box), specification details (black box), domain structure, risk analysis, etc.  Subdomains are not necessarily disjoint, even though the testing literature frequently refers to them as  partitions.
The Down Side of Code-Based Techniques ,[object Object],[object Object]
The Down Side of Specification-Based Techniques ,[object Object],[object Object],[object Object]
Operational Distributions ,[object Object],[object Object]
How Usage Data Can Be Collected For New Systems ,[object Object],[object Object],[object Object],[object Object],[object Object]
Operational Distribution-Based Test Case Selection ,[object Object],[object Object],[object Object]
The Down Side of Operational Distribution-Based Techniques ,[object Object],[object Object],[object Object]
The Up Side of Operational Distribution-Based Techniques ,[object Object],[object Object],[object Object]
Domain-Based Test Case Selection ,[object Object],[object Object],[object Object],[object Object]
Domain-Based Testing Example ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Random Testing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Benefits of Random Testing ,[object Object],[object Object]
The Down Side of Random Testing ,[object Object],[object Object],[object Object],[object Object],[object Object]
Risk-based Testing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Risk-based Testing ,[object Object],[object Object],[object Object]
Risk Priority Table 9 High  = 3  High = 3 Withdraw cash 4 Medium = 2 Medium = 2 Transfer money 1 Low = 1 Low = 1 Read balance 3 High = 3 Low = 1 Make payment 3 Low = 1 High = 3 Buy train ticket 6 High = 3 Medium = 2 Security Priority (L x C) Failure Consequence Occurrence Likelihood Features & Attributes
Ordered Risk Priority Table 1 Low = 1 Low = 1 Read balance 6 High  = 3  Medium = 2 Security 9 High  = 3  High = 3 Withdraw cash 4 Medium = 2 Medium = 2 Transfer money 3 High  = 3  Low = 1 Make payment 3 Low  1 High  = 3  Buy train ticket Priority (L x C) Failure Consequence Occurrence Likelihood Features & Attributes
Acceptance Testing ,[object Object],[object Object],[object Object],[object Object],[object Object]
Regression Testing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Prioritizing Test Cases ,[object Object],[object Object],[object Object],[object Object],[object Object]
Bases for Test Prioritization ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
White-box Testing ,[object Object],[object Object],[object Object],[object Object],[object Object]
White-box Testing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Control Flow and Data Flow Criteria ,[object Object],[object Object]
Issues of White-box Testing ,[object Object],[object Object],[object Object],[object Object],[object Object]
Test Automation ,[object Object],[object Object],[object Object]
Why should tests be automated? ,[object Object],[object Object],[object Object]
Test Automation Issues ,[object Object],[object Object],[object Object],[object Object]
Observations on Automated Tests ,[object Object],[object Object],[object Object]
Uses of Automated Testing ,[object Object],[object Object],[object Object],[object Object]
Financial Implications of Improved Testing ,[object Object],[object Object]
Estimated Cost of Inadequate Testing *NIST Report: The Economic Impact of Inadequate Infrastructure for Software Testing, 2002.  $22 billion $59 billion Total U.S. Economy $1,510,000,000 $3,340,000,000 Financial Services $589,000,000 $1,800,000,000 Transportation Manufacture Potential Cost Reduction from Feasible Improvements Cost of Inadequate Software Testing

Weitere ähnliche Inhalte

Ähnlich wie testsfw7

Ähnlich wie testsfw7 (6)

Chapter 3 SOFTWARE TESTING PROCESS
Chapter 3 SOFTWARE TESTING PROCESSChapter 3 SOFTWARE TESTING PROCESS
Chapter 3 SOFTWARE TESTING PROCESS
 
Software testing mtech project in jalandhar
Software testing mtech project in jalandharSoftware testing mtech project in jalandhar
Software testing mtech project in jalandhar
 
Software testing mtech project in ludhiana
Software testing mtech project in ludhianaSoftware testing mtech project in ludhiana
Software testing mtech project in ludhiana
 
6months industrial training in software testing, jalandhar
6months industrial training in software testing, jalandhar6months industrial training in software testing, jalandhar
6months industrial training in software testing, jalandhar
 
6 weeks summer training in software testing,ludhiana
6 weeks summer training in software testing,ludhiana6 weeks summer training in software testing,ludhiana
6 weeks summer training in software testing,ludhiana
 
6 weeks summer training in software testing,jalandhar
6 weeks summer training in software testing,jalandhar6 weeks summer training in software testing,jalandhar
6 weeks summer training in software testing,jalandhar
 

Mehr von lmscollaborative2 (18)

contrucci
contruccicontrucci
contrucci
 
contrucci
contruccicontrucci
contrucci
 
test3
test3test3
test3
 
remoto2
remoto2remoto2
remoto2
 
finalelocale
finalelocalefinalelocale
finalelocale
 
 
provacompleta4
provacompleta4provacompleta4
provacompleta4
 
provacompleta2
provacompleta2provacompleta2
provacompleta2
 
provaoggi2
provaoggi2provaoggi2
provaoggi2
 
domenica3
domenica3domenica3
domenica3
 
domenica2
domenica2domenica2
domenica2
 
domenica1
domenica1domenica1
domenica1
 
provarealw4
provarealw4provarealw4
provarealw4
 
provarealw3
provarealw3provarealw3
provarealw3
 
testsfw5
testsfw5testsfw5
testsfw5
 
testsfw4
testsfw4testsfw4
testsfw4
 
testsfw2
testsfw2testsfw2
testsfw2
 
test
testtest
test
 

Kürzlich hochgeladen

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 

Kürzlich hochgeladen (20)

ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 

testsfw7

  • 1. Software Testing Basics Elaine Weyuker AT&T Labs – Research Florham Park, NJ November 11, 2002
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16. Test Selection Strategies Every systematic test selection strategy can be viewed as a way of dividing the input domain into subdomains , and selecting one or more test case from each. The division can be based on such things as code characteristics (white box), specification details (black box), domain structure, risk analysis, etc. Subdomains are not necessarily disjoint, even though the testing literature frequently refers to them as partitions.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31. Risk Priority Table 9 High = 3 High = 3 Withdraw cash 4 Medium = 2 Medium = 2 Transfer money 1 Low = 1 Low = 1 Read balance 3 High = 3 Low = 1 Make payment 3 Low = 1 High = 3 Buy train ticket 6 High = 3 Medium = 2 Security Priority (L x C) Failure Consequence Occurrence Likelihood Features & Attributes
  • 32. Ordered Risk Priority Table 1 Low = 1 Low = 1 Read balance 6 High = 3 Medium = 2 Security 9 High = 3 High = 3 Withdraw cash 4 Medium = 2 Medium = 2 Transfer money 3 High = 3 Low = 1 Make payment 3 Low 1 High = 3 Buy train ticket Priority (L x C) Failure Consequence Occurrence Likelihood Features & Attributes
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47. Estimated Cost of Inadequate Testing *NIST Report: The Economic Impact of Inadequate Infrastructure for Software Testing, 2002. $22 billion $59 billion Total U.S. Economy $1,510,000,000 $3,340,000,000 Financial Services $589,000,000 $1,800,000,000 Transportation Manufacture Potential Cost Reduction from Feasible Improvements Cost of Inadequate Software Testing