SlideShare a Scribd company logo
1 of 12
4.3 Development and Testing

      By: Momina Mateen
Click for more >>>



             Creating the system

              Testing the system

            Improving the system


                                   Back to
                                   Contents
Creating the System
   • Once the data structure has been designed, it needs to be created
     using the software that has been recommended by the systems
     analyst.
   • The programmer produces the program code that is needed to
     solve the problem.
   • The nature of the problem determines how much programming is
     required.
For example:
(Small Company)
Main requirement: production of invoices and payslips
Solution: basic database package, spreadsheet package and word processor.
Big companies may require a whole brand new software to be written for them.
                                                                               Back to
                              In Our Scenario                                  Contents
In Our Scenario
    • Daniel needs to create a file structure for the
      customers, their orders and the payroll.
    • It is most probable that by this stage Daniel
      will have already designed the structures and
      has already selected the software for this.
    • Now he has to use the software to create the
      files.
  Back to                                          Back to
Creating the
  System
                                                   Contents
Testing Strategies
• It is vital that the analyst makes a test plan.
There are two main ways of doing this:
1. Test Data
2. Live Data




                                                    Back to
                                                    Contents
Test Data
   1. Normal Data
   2. Extreme Data
   3. Abnormal Data




 Back to          Example of a Test   Back to
 Testing
Strategies             Plan           Contents
Normal Data
   • This is data that is acceptable.
   • It should not produce an error when input into the
      system.
   Example:
   In a payslip no-one should have worked more than 65
      hours or less than 0 hours. So data that lies within
      that is entered and if an error message is produced it
      means that there is a problem with the system.
 Back to     Types of     Example of a Test              Back to
 Testing     Test Data
Strategies                     Plan                      Contents
Extreme Data
   • Used only when a range of data is input.
   • Things like name and address will not have any
     extreme data.
   • But in the case of a payslip where the most amount
     of hours worked could be 65 and the lowest could be
     0; entering 65 or 0 would be considered as extreme
     data.


 Back to     Types of      Example of a Test        Back to
 Testing     Test Data
Strategies                      Plan                Contents
Abnormal Data
   • This is data this not acceptable.
   For example:
   You wouldn’t want alphabetic characters in a numeric field.
   • When data range is used; any number outside that range will
     be considered as abnormal.
   • For instance with the payslip; any number that lies outside
     the range of 0 and 65 hours will be considered as abnormal
     data.


 Back to      Types of      Example of a Test                Back to
 Testing      Test Data
Strategies                       Plan                        Contents
Test Plan
Test          Test Data    Expected   Actual Results     Comment
                           Results
              -1           Rejected   Error message      Abnormal Data

              65           Accepted   Wages              Extreme Data
                                      Calculated
Input hours
              0            Accepted   Wages              Extreme Data
worked
                                      calculated but
                                      the result was 0
              40           Accepted   Wages              Normal Data
                                      calculated
              140          Rejected   Error message      Abnormal Data

              Akhbar       Rejected   Error message      Abnormal Data

 Back to                                                        Back to
 Testing
Strategies
                                                                Contents
Live Data
   • This is data that has been used in the existing system.
   • It is useful to use it because the outputs of the system are
     already known.
       In our scenario:
       Daniel can use the hours worked by the workers in the past week and then
       using this he can check whether or not he has the correct output from the
       system. He will then select a week where there was a special circumstance
       such as a holiday and then check the output from that week. Then he can
       choose a week that was somewhat an average week. These sets of data will
       be run on the new system and their output will be compared to the ones that
       already exist. If there are any discrepancies between the data; amendments
       need to be made.

 Back to                                                                       Back to
 Testing
Strategies
                                                                               Contents
Improvements that could be needed as
        a result of testing
• Before implementation; the system needs to be cleared of any errors that
  were identified in the testing stage.
• This may include altering the validation check.
• “Checking the data validation, calculations, and file structures is
  reasonably straightforward as the test plan will show where there are
  differences between the expected and the actual results.”
What if the output from the system still doesn’t have exactly what is
  expected when the live data is used?
• Single stepping is the solution. This is basically when the software allows
  you to run the system one step at a time so the exact point where the
  differences arises can be identified.

                                                                        Back to
                                                                        Contents

More Related Content

What's hot

Test Estimation using Test Case Point Analysis method
Test Estimation using Test Case Point Analysis methodTest Estimation using Test Case Point Analysis method
Test Estimation using Test Case Point Analysis methodKMS Technology
 
Test effort estimation
Test effort estimationTest effort estimation
Test effort estimationramesh kumar
 
Test effort estimation a reason behind successful testing
Test effort estimation   a reason behind successful testingTest effort estimation   a reason behind successful testing
Test effort estimation a reason behind successful testingIndium Software
 
Test case-point-analysis (whitepaper)
Test case-point-analysis (whitepaper)Test case-point-analysis (whitepaper)
Test case-point-analysis (whitepaper)KMS Technology
 
A&D - Fact Finding Techniques
A&D - Fact Finding TechniquesA&D - Fact Finding Techniques
A&D - Fact Finding Techniquesvinay arora
 
Introduction to system life cycle
Introduction to system life cycleIntroduction to system life cycle
Introduction to system life cycleHaa'Meem Mohiyuddin
 
Extending Function Point Estimation for Testing MDM Applications
Extending Function Point Estimation for Testing MDM ApplicationsExtending Function Point Estimation for Testing MDM Applications
Extending Function Point Estimation for Testing MDM ApplicationsCognizant
 
Test Estimation Techniques
Test Estimation TechniquesTest Estimation Techniques
Test Estimation TechniquesNishant Worah
 
SOFTWARE TESTING: ISSUES AND CHALLENGES OF ARTIFICIAL INTELLIGENCE & MACHINE ...
SOFTWARE TESTING: ISSUES AND CHALLENGES OF ARTIFICIAL INTELLIGENCE & MACHINE ...SOFTWARE TESTING: ISSUES AND CHALLENGES OF ARTIFICIAL INTELLIGENCE & MACHINE ...
SOFTWARE TESTING: ISSUES AND CHALLENGES OF ARTIFICIAL INTELLIGENCE & MACHINE ...ijaia
 
T19 performance testing effort - estimation or guesstimation revised
T19   performance testing effort - estimation or guesstimation revisedT19   performance testing effort - estimation or guesstimation revised
T19 performance testing effort - estimation or guesstimation revisedTEST Huddle
 
Test Case Point Analysis
Test Case Point AnalysisTest Case Point Analysis
Test Case Point Analysisvuqn
 
testing strategies and tactics
 testing strategies and tactics testing strategies and tactics
testing strategies and tacticsPreeti Mishra
 
Cost Based Performance Modelling
Cost Based Performance ModellingCost Based Performance Modelling
Cost Based Performance ModellingEugene Margulis
 
Systems analysis plm
Systems analysis plmSystems analysis plm
Systems analysis plmOmar Jacalne
 
Principles of effort estimation
Principles of effort estimationPrinciples of effort estimation
Principles of effort estimationCS, NcState
 
Software engineering
Software engineeringSoftware engineering
Software engineeringSiddu-majety
 

What's hot (20)

Test Estimation using Test Case Point Analysis method
Test Estimation using Test Case Point Analysis methodTest Estimation using Test Case Point Analysis method
Test Estimation using Test Case Point Analysis method
 
Test effort estimation
Test effort estimationTest effort estimation
Test effort estimation
 
Test effort estimation a reason behind successful testing
Test effort estimation   a reason behind successful testingTest effort estimation   a reason behind successful testing
Test effort estimation a reason behind successful testing
 
Test case-point-analysis (whitepaper)
Test case-point-analysis (whitepaper)Test case-point-analysis (whitepaper)
Test case-point-analysis (whitepaper)
 
A&D - Fact Finding Techniques
A&D - Fact Finding TechniquesA&D - Fact Finding Techniques
A&D - Fact Finding Techniques
 
System Life Cycle
System Life CycleSystem Life Cycle
System Life Cycle
 
Software metrics
Software metricsSoftware metrics
Software metrics
 
Introduction to system life cycle
Introduction to system life cycleIntroduction to system life cycle
Introduction to system life cycle
 
Extending Function Point Estimation for Testing MDM Applications
Extending Function Point Estimation for Testing MDM ApplicationsExtending Function Point Estimation for Testing MDM Applications
Extending Function Point Estimation for Testing MDM Applications
 
Test Estimation Techniques
Test Estimation TechniquesTest Estimation Techniques
Test Estimation Techniques
 
SOFTWARE TESTING: ISSUES AND CHALLENGES OF ARTIFICIAL INTELLIGENCE & MACHINE ...
SOFTWARE TESTING: ISSUES AND CHALLENGES OF ARTIFICIAL INTELLIGENCE & MACHINE ...SOFTWARE TESTING: ISSUES AND CHALLENGES OF ARTIFICIAL INTELLIGENCE & MACHINE ...
SOFTWARE TESTING: ISSUES AND CHALLENGES OF ARTIFICIAL INTELLIGENCE & MACHINE ...
 
T19 performance testing effort - estimation or guesstimation revised
T19   performance testing effort - estimation or guesstimation revisedT19   performance testing effort - estimation or guesstimation revised
T19 performance testing effort - estimation or guesstimation revised
 
Test Case Point Analysis
Test Case Point AnalysisTest Case Point Analysis
Test Case Point Analysis
 
Software Metrics
Software MetricsSoftware Metrics
Software Metrics
 
Design testabilty
Design testabiltyDesign testabilty
Design testabilty
 
testing strategies and tactics
 testing strategies and tactics testing strategies and tactics
testing strategies and tactics
 
Cost Based Performance Modelling
Cost Based Performance ModellingCost Based Performance Modelling
Cost Based Performance Modelling
 
Systems analysis plm
Systems analysis plmSystems analysis plm
Systems analysis plm
 
Principles of effort estimation
Principles of effort estimationPrinciples of effort estimation
Principles of effort estimation
 
Software engineering
Software engineeringSoftware engineering
Software engineering
 

Viewers also liked

Nuclear Accidents and Lessons Learned
Nuclear Accidents and Lessons Learned Nuclear Accidents and Lessons Learned
Nuclear Accidents and Lessons Learned Momina Mateen
 
3.4 Online Services and Working Patterns
3.4 Online Services and Working Patterns3.4 Online Services and Working Patterns
3.4 Online Services and Working PatternsMomina Mateen
 
3.6 Online Services and Health and Safety
3.6 Online Services and Health and Safety3.6 Online Services and Health and Safety
3.6 Online Services and Health and SafetyMomina Mateen
 
3.5 Online Services and Security and Privacy of Data
3.5 Online Services and Security and Privacy of Data3.5 Online Services and Security and Privacy of Data
3.5 Online Services and Security and Privacy of DataMomina Mateen
 
2.10 Art and Design Work
2.10 Art and Design Work2.10 Art and Design Work
2.10 Art and Design WorkMomina Mateen
 
2.9 Technical and Customer Support
2.9 Technical and Customer Support2.9 Technical and Customer Support
2.9 Technical and Customer SupportMomina Mateen
 
2.7 Use of ICT in Data Management
2.7 Use of ICT in Data Management2.7 Use of ICT in Data Management
2.7 Use of ICT in Data ManagementMomina Mateen
 
2.7 use of ict in data management
2.7 use of ict in data management2.7 use of ict in data management
2.7 use of ict in data managementHaa'Meem Mohiyuddin
 
2.8 Payroll Applications
2.8 Payroll Applications2.8 Payroll Applications
2.8 Payroll ApplicationsMomina Mateen
 
3.1 Online Services (Part 1)
3.1 Online Services (Part 1)3.1 Online Services (Part 1)
3.1 Online Services (Part 1)Momina Mateen
 

Viewers also liked (13)

Nuclear Accidents and Lessons Learned
Nuclear Accidents and Lessons Learned Nuclear Accidents and Lessons Learned
Nuclear Accidents and Lessons Learned
 
4.4 implementation
4.4 implementation4.4 implementation
4.4 implementation
 
3.4 Online Services and Working Patterns
3.4 Online Services and Working Patterns3.4 Online Services and Working Patterns
3.4 Online Services and Working Patterns
 
3.6 Online Services and Health and Safety
3.6 Online Services and Health and Safety3.6 Online Services and Health and Safety
3.6 Online Services and Health and Safety
 
3.5 Online Services and Security and Privacy of Data
3.5 Online Services and Security and Privacy of Data3.5 Online Services and Security and Privacy of Data
3.5 Online Services and Security and Privacy of Data
 
2.8 payroll applications
2.8 payroll applications2.8 payroll applications
2.8 payroll applications
 
Nutrition
NutritionNutrition
Nutrition
 
2.10 Art and Design Work
2.10 Art and Design Work2.10 Art and Design Work
2.10 Art and Design Work
 
2.9 Technical and Customer Support
2.9 Technical and Customer Support2.9 Technical and Customer Support
2.9 Technical and Customer Support
 
2.7 Use of ICT in Data Management
2.7 Use of ICT in Data Management2.7 Use of ICT in Data Management
2.7 Use of ICT in Data Management
 
2.7 use of ict in data management
2.7 use of ict in data management2.7 use of ict in data management
2.7 use of ict in data management
 
2.8 Payroll Applications
2.8 Payroll Applications2.8 Payroll Applications
2.8 Payroll Applications
 
3.1 Online Services (Part 1)
3.1 Online Services (Part 1)3.1 Online Services (Part 1)
3.1 Online Services (Part 1)
 

Similar to 4.3 Development and Testing

Agile Acceptance testing with Fitnesse
Agile Acceptance testing with FitnesseAgile Acceptance testing with Fitnesse
Agile Acceptance testing with FitnesseClareMcLennan
 
What I learned from 5 years of sciencing the crap out of DevOps
What I learned from 5 years of sciencing the crap out of DevOpsWhat I learned from 5 years of sciencing the crap out of DevOps
What I learned from 5 years of sciencing the crap out of DevOpsDevOpsDays DFW
 
Agile Work Quality: Test Driven Development and Unit Tests
Agile Work Quality:  Test Driven Development and Unit TestsAgile Work Quality:  Test Driven Development and Unit Tests
Agile Work Quality: Test Driven Development and Unit TestsDavid Pledger
 
Performance tuning Grails applications
 Performance tuning Grails applications Performance tuning Grails applications
Performance tuning Grails applicationsGR8Conf
 
Proactive performance monitoring with adaptive thresholds
Proactive performance monitoring with adaptive thresholdsProactive performance monitoring with adaptive thresholds
Proactive performance monitoring with adaptive thresholdsJohn Beresniewicz
 
Scientific Revenue USF 2016 talk
Scientific Revenue USF 2016 talkScientific Revenue USF 2016 talk
Scientific Revenue USF 2016 talkScientificRevenue
 
GCSE ICT TESTING
GCSE ICT TESTING GCSE ICT TESTING
GCSE ICT TESTING morgan98
 
Darim's Synagogue Data Series, Part 3
Darim's Synagogue Data Series, Part 3Darim's Synagogue Data Series, Part 3
Darim's Synagogue Data Series, Part 3Idealware
 
Road to Continuous Delivery - Wix.com
Road to Continuous Delivery - Wix.comRoad to Continuous Delivery - Wix.com
Road to Continuous Delivery - Wix.comAviran Mordo
 
EM12c Monitoring, Metric Extensions and Performance Pages
EM12c Monitoring, Metric Extensions and Performance PagesEM12c Monitoring, Metric Extensions and Performance Pages
EM12c Monitoring, Metric Extensions and Performance PagesEnkitec
 
A Software Testing Intro
A Software Testing IntroA Software Testing Intro
A Software Testing IntroEvozon Test Lab
 
Introduction to software testing
Introduction to software testingIntroduction to software testing
Introduction to software testingSyed Usman Ahmed
 
Shawn Wallace - Test automation in brownfield applications
Shawn Wallace - Test automation in brownfield applicationsShawn Wallace - Test automation in brownfield applications
Shawn Wallace - Test automation in brownfield applicationsQA or the Highway
 
Managing with Metrics Webinar Shaun Bradshaw and Philip lew
Managing with Metrics Webinar Shaun Bradshaw and Philip lewManaging with Metrics Webinar Shaun Bradshaw and Philip lew
Managing with Metrics Webinar Shaun Bradshaw and Philip lewXBOSoft
 
Software engineering Testing technique,test case,test suit design
Software engineering Testing technique,test case,test suit designSoftware engineering Testing technique,test case,test suit design
Software engineering Testing technique,test case,test suit designMaitree Patel
 
Learn Software Testing in 6 Lessons
Learn Software Testing in 6 LessonsLearn Software Testing in 6 Lessons
Learn Software Testing in 6 LessonsSyed Ahmed
 
<p>Software Testing</p>
<p>Software Testing</p><p>Software Testing</p>
<p>Software Testing</p>Atul Mishra
 
An overview to Software Testing
An overview to Software TestingAn overview to Software Testing
An overview to Software TestingAtul Mishra
 
Test data documentation ss
Test data documentation ssTest data documentation ss
Test data documentation ssAshwiniPoloju
 

Similar to 4.3 Development and Testing (20)

Agile Acceptance testing with Fitnesse
Agile Acceptance testing with FitnesseAgile Acceptance testing with Fitnesse
Agile Acceptance testing with Fitnesse
 
What I learned from 5 years of sciencing the crap out of DevOps
What I learned from 5 years of sciencing the crap out of DevOpsWhat I learned from 5 years of sciencing the crap out of DevOps
What I learned from 5 years of sciencing the crap out of DevOps
 
Agile Work Quality: Test Driven Development and Unit Tests
Agile Work Quality:  Test Driven Development and Unit TestsAgile Work Quality:  Test Driven Development and Unit Tests
Agile Work Quality: Test Driven Development and Unit Tests
 
Ioug oow12 em12c
Ioug oow12 em12cIoug oow12 em12c
Ioug oow12 em12c
 
Performance tuning Grails applications
 Performance tuning Grails applications Performance tuning Grails applications
Performance tuning Grails applications
 
Proactive performance monitoring with adaptive thresholds
Proactive performance monitoring with adaptive thresholdsProactive performance monitoring with adaptive thresholds
Proactive performance monitoring with adaptive thresholds
 
Scientific Revenue USF 2016 talk
Scientific Revenue USF 2016 talkScientific Revenue USF 2016 talk
Scientific Revenue USF 2016 talk
 
GCSE ICT TESTING
GCSE ICT TESTING GCSE ICT TESTING
GCSE ICT TESTING
 
Darim's Synagogue Data Series, Part 3
Darim's Synagogue Data Series, Part 3Darim's Synagogue Data Series, Part 3
Darim's Synagogue Data Series, Part 3
 
Road to Continuous Delivery - Wix.com
Road to Continuous Delivery - Wix.comRoad to Continuous Delivery - Wix.com
Road to Continuous Delivery - Wix.com
 
EM12c Monitoring, Metric Extensions and Performance Pages
EM12c Monitoring, Metric Extensions and Performance PagesEM12c Monitoring, Metric Extensions and Performance Pages
EM12c Monitoring, Metric Extensions and Performance Pages
 
A Software Testing Intro
A Software Testing IntroA Software Testing Intro
A Software Testing Intro
 
Introduction to software testing
Introduction to software testingIntroduction to software testing
Introduction to software testing
 
Shawn Wallace - Test automation in brownfield applications
Shawn Wallace - Test automation in brownfield applicationsShawn Wallace - Test automation in brownfield applications
Shawn Wallace - Test automation in brownfield applications
 
Managing with Metrics Webinar Shaun Bradshaw and Philip lew
Managing with Metrics Webinar Shaun Bradshaw and Philip lewManaging with Metrics Webinar Shaun Bradshaw and Philip lew
Managing with Metrics Webinar Shaun Bradshaw and Philip lew
 
Software engineering Testing technique,test case,test suit design
Software engineering Testing technique,test case,test suit designSoftware engineering Testing technique,test case,test suit design
Software engineering Testing technique,test case,test suit design
 
Learn Software Testing in 6 Lessons
Learn Software Testing in 6 LessonsLearn Software Testing in 6 Lessons
Learn Software Testing in 6 Lessons
 
<p>Software Testing</p>
<p>Software Testing</p><p>Software Testing</p>
<p>Software Testing</p>
 
An overview to Software Testing
An overview to Software TestingAn overview to Software Testing
An overview to Software Testing
 
Test data documentation ss
Test data documentation ssTest data documentation ss
Test data documentation ss
 

More from Momina Mateen

Al Baqarah Ayah 74-82 Notes
Al Baqarah Ayah 74-82 Notes Al Baqarah Ayah 74-82 Notes
Al Baqarah Ayah 74-82 Notes Momina Mateen
 
Al Baqarah Ayah 74-82 Word to Word
Al Baqarah Ayah 74-82 Word to Word Al Baqarah Ayah 74-82 Word to Word
Al Baqarah Ayah 74-82 Word to Word Momina Mateen
 
Al Mulk Verse 29 (for kids)
Al Mulk Verse 29 (for kids)Al Mulk Verse 29 (for kids)
Al Mulk Verse 29 (for kids)Momina Mateen
 
Al Mulk Verse 28 (for kids)
Al Mulk Verse 28 (for kids)Al Mulk Verse 28 (for kids)
Al Mulk Verse 28 (for kids)Momina Mateen
 
Al Mulk Verse 27 (for kids)
Al Mulk Verse 27 (for kids)Al Mulk Verse 27 (for kids)
Al Mulk Verse 27 (for kids)Momina Mateen
 
Al Mulk Verse 26 (for kids)
Al Mulk Verse 26 (for kids)Al Mulk Verse 26 (for kids)
Al Mulk Verse 26 (for kids)Momina Mateen
 
Al Mulk Verse 25 (for kids)
Al Mulk Verse 25 (for kids)Al Mulk Verse 25 (for kids)
Al Mulk Verse 25 (for kids)Momina Mateen
 
Al Mulk Verse 24 (for kids)
Al Mulk Verse 24 (for kids)Al Mulk Verse 24 (for kids)
Al Mulk Verse 24 (for kids)Momina Mateen
 
Al Mulk Verse 23 (for kids)
Al Mulk Verse 23 (for kids)Al Mulk Verse 23 (for kids)
Al Mulk Verse 23 (for kids)Momina Mateen
 
Al Mulk Verse 22 (for kids)
Al Mulk Verse 22 (for kids)Al Mulk Verse 22 (for kids)
Al Mulk Verse 22 (for kids)Momina Mateen
 
Al Mulk Verse 30 (for kids)
Al Mulk Verse 30 (for kids)Al Mulk Verse 30 (for kids)
Al Mulk Verse 30 (for kids)Momina Mateen
 
Al Mulk Verse 20 (for kids)
Al Mulk Verse 20 (for kids)Al Mulk Verse 20 (for kids)
Al Mulk Verse 20 (for kids)Momina Mateen
 
Al Mulk Verse 18 (for kids)
Al Mulk Verse 18 (for kids)Al Mulk Verse 18 (for kids)
Al Mulk Verse 18 (for kids)Momina Mateen
 
Al Mulk Verse 17 (for kids)
Al Mulk Verse 17 (for kids)Al Mulk Verse 17 (for kids)
Al Mulk Verse 17 (for kids)Momina Mateen
 
Al Mulk Verse 16 (for kids)
Al Mulk Verse 16 (for kids)Al Mulk Verse 16 (for kids)
Al Mulk Verse 16 (for kids)Momina Mateen
 
Al mulk verse 14 (for kids)
Al mulk verse 14 (for kids)Al mulk verse 14 (for kids)
Al mulk verse 14 (for kids)Momina Mateen
 
Al Mulk Verse 13 (for kids)
Al Mulk Verse 13 (for kids)Al Mulk Verse 13 (for kids)
Al Mulk Verse 13 (for kids)Momina Mateen
 
Al mulk verse 15 (for kids)
Al mulk verse 15 (for kids)Al mulk verse 15 (for kids)
Al mulk verse 15 (for kids)Momina Mateen
 

More from Momina Mateen (20)

Al Baqarah Ayah 74-82 Notes
Al Baqarah Ayah 74-82 Notes Al Baqarah Ayah 74-82 Notes
Al Baqarah Ayah 74-82 Notes
 
Al Baqarah Ayah 74-82 Word to Word
Al Baqarah Ayah 74-82 Word to Word Al Baqarah Ayah 74-82 Word to Word
Al Baqarah Ayah 74-82 Word to Word
 
Zakariyya and Yahya
Zakariyya and YahyaZakariyya and Yahya
Zakariyya and Yahya
 
Al Mulk Verse 29 (for kids)
Al Mulk Verse 29 (for kids)Al Mulk Verse 29 (for kids)
Al Mulk Verse 29 (for kids)
 
Al Mulk Verse 28 (for kids)
Al Mulk Verse 28 (for kids)Al Mulk Verse 28 (for kids)
Al Mulk Verse 28 (for kids)
 
Al Mulk Verse 27 (for kids)
Al Mulk Verse 27 (for kids)Al Mulk Verse 27 (for kids)
Al Mulk Verse 27 (for kids)
 
Al Mulk Verse 26 (for kids)
Al Mulk Verse 26 (for kids)Al Mulk Verse 26 (for kids)
Al Mulk Verse 26 (for kids)
 
Al Mulk Verse 25 (for kids)
Al Mulk Verse 25 (for kids)Al Mulk Verse 25 (for kids)
Al Mulk Verse 25 (for kids)
 
Al Mulk Verse 24 (for kids)
Al Mulk Verse 24 (for kids)Al Mulk Verse 24 (for kids)
Al Mulk Verse 24 (for kids)
 
Al Mulk Verse 23 (for kids)
Al Mulk Verse 23 (for kids)Al Mulk Verse 23 (for kids)
Al Mulk Verse 23 (for kids)
 
Al Mulk Verse 22 (for kids)
Al Mulk Verse 22 (for kids)Al Mulk Verse 22 (for kids)
Al Mulk Verse 22 (for kids)
 
Al Mulk Revision
Al Mulk RevisionAl Mulk Revision
Al Mulk Revision
 
Al Mulk Verse 30 (for kids)
Al Mulk Verse 30 (for kids)Al Mulk Verse 30 (for kids)
Al Mulk Verse 30 (for kids)
 
Al Mulk Verse 20 (for kids)
Al Mulk Verse 20 (for kids)Al Mulk Verse 20 (for kids)
Al Mulk Verse 20 (for kids)
 
Al Mulk Verse 18 (for kids)
Al Mulk Verse 18 (for kids)Al Mulk Verse 18 (for kids)
Al Mulk Verse 18 (for kids)
 
Al Mulk Verse 17 (for kids)
Al Mulk Verse 17 (for kids)Al Mulk Verse 17 (for kids)
Al Mulk Verse 17 (for kids)
 
Al Mulk Verse 16 (for kids)
Al Mulk Verse 16 (for kids)Al Mulk Verse 16 (for kids)
Al Mulk Verse 16 (for kids)
 
Al mulk verse 14 (for kids)
Al mulk verse 14 (for kids)Al mulk verse 14 (for kids)
Al mulk verse 14 (for kids)
 
Al Mulk Verse 13 (for kids)
Al Mulk Verse 13 (for kids)Al Mulk Verse 13 (for kids)
Al Mulk Verse 13 (for kids)
 
Al mulk verse 15 (for kids)
Al mulk verse 15 (for kids)Al mulk verse 15 (for kids)
Al mulk verse 15 (for kids)
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 

Recently uploaded (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

4.3 Development and Testing

  • 1. 4.3 Development and Testing By: Momina Mateen
  • 2. Click for more >>> Creating the system Testing the system Improving the system Back to Contents
  • 3. Creating the System • Once the data structure has been designed, it needs to be created using the software that has been recommended by the systems analyst. • The programmer produces the program code that is needed to solve the problem. • The nature of the problem determines how much programming is required. For example: (Small Company) Main requirement: production of invoices and payslips Solution: basic database package, spreadsheet package and word processor. Big companies may require a whole brand new software to be written for them. Back to In Our Scenario Contents
  • 4. In Our Scenario • Daniel needs to create a file structure for the customers, their orders and the payroll. • It is most probable that by this stage Daniel will have already designed the structures and has already selected the software for this. • Now he has to use the software to create the files. Back to Back to Creating the System Contents
  • 5. Testing Strategies • It is vital that the analyst makes a test plan. There are two main ways of doing this: 1. Test Data 2. Live Data Back to Contents
  • 6. Test Data 1. Normal Data 2. Extreme Data 3. Abnormal Data Back to Example of a Test Back to Testing Strategies Plan Contents
  • 7. Normal Data • This is data that is acceptable. • It should not produce an error when input into the system. Example: In a payslip no-one should have worked more than 65 hours or less than 0 hours. So data that lies within that is entered and if an error message is produced it means that there is a problem with the system. Back to Types of Example of a Test Back to Testing Test Data Strategies Plan Contents
  • 8. Extreme Data • Used only when a range of data is input. • Things like name and address will not have any extreme data. • But in the case of a payslip where the most amount of hours worked could be 65 and the lowest could be 0; entering 65 or 0 would be considered as extreme data. Back to Types of Example of a Test Back to Testing Test Data Strategies Plan Contents
  • 9. Abnormal Data • This is data this not acceptable. For example: You wouldn’t want alphabetic characters in a numeric field. • When data range is used; any number outside that range will be considered as abnormal. • For instance with the payslip; any number that lies outside the range of 0 and 65 hours will be considered as abnormal data. Back to Types of Example of a Test Back to Testing Test Data Strategies Plan Contents
  • 10. Test Plan Test Test Data Expected Actual Results Comment Results -1 Rejected Error message Abnormal Data 65 Accepted Wages Extreme Data Calculated Input hours 0 Accepted Wages Extreme Data worked calculated but the result was 0 40 Accepted Wages Normal Data calculated 140 Rejected Error message Abnormal Data Akhbar Rejected Error message Abnormal Data Back to Back to Testing Strategies Contents
  • 11. Live Data • This is data that has been used in the existing system. • It is useful to use it because the outputs of the system are already known. In our scenario: Daniel can use the hours worked by the workers in the past week and then using this he can check whether or not he has the correct output from the system. He will then select a week where there was a special circumstance such as a holiday and then check the output from that week. Then he can choose a week that was somewhat an average week. These sets of data will be run on the new system and their output will be compared to the ones that already exist. If there are any discrepancies between the data; amendments need to be made. Back to Back to Testing Strategies Contents
  • 12. Improvements that could be needed as a result of testing • Before implementation; the system needs to be cleared of any errors that were identified in the testing stage. • This may include altering the validation check. • “Checking the data validation, calculations, and file structures is reasonably straightforward as the test plan will show where there are differences between the expected and the actual results.” What if the output from the system still doesn’t have exactly what is expected when the live data is used? • Single stepping is the solution. This is basically when the software allows you to run the system one step at a time so the exact point where the differences arises can be identified. Back to Contents