SlideShare a Scribd company logo
1 of 18
What is Software Testing?
The process of validating and verifying a software program or
application or product:
 Meets the business and technical requirements
 Works as expected
 Can be implemented with the same characteristic.
 Functional testing is performed to
verify that a software application
performs and functions correctly
according to design specifications.
What is Functional Testing
 Risk based testing uses risk to prioritize and emphasize the
appropriate tests during test execution. Risk is the
probability of occurrence of an undesirable outcome.
 Exhaustive testing is a testing or quality assurance
approach in which all possible combinations of scenarios
and use/test cases are used for testing.
Risk Based and Exhaustive Testing
Why do we need Risk Based Testing
 Identifying risk helps planning, specification, preparation and
execution.
 Risk-based testing involves both mitigation and consistency
 Involves measuring how well we are doing at finding and removing
defects in critical areas.
 Identifies proactive opportunities to remove or prevent defects
Risk Analysis fundamentals in software testing
Risk Identification
Involves collecting information about
the project and classifying it to
determine the amount of potential risk
in the test phase and in production (in
the future).
Risk Strategy
Strategizing and planning involves the
identification and assessment of risks and
the development of contingency plans for
possible alternative project activity or the
mitigation of all risks.
Risk Assessment
 Is this a risk or not?
 How serious is the risk?
 What are the consequences?
 What is the likelihood of this risk happening?
Risk assessments involves asking questions such as-
Risk Mitigation and Reporting
 Risk mitigation/avoidance activities
avoid risks or minimize their impact.
 Risk reporting is based on information
obtained from the previous topics
Risk Prediction
 Risk prediction involves forecasting risks using the history
and knowledge of previously identified risks.
 During test execution each individual function is monitored
using additional testing.
Metrics for Progress Tracking
1. the number of tests planned, executed and completed
2. the number of faults per function
3. the number of hours used in testing per fault found
4. the number of hours used in fixing per fault
Exhaustive Testing
The process of testing for absolutely
everything just to make sure that the
product cannot be destroyed or
crashed by some random
happenstance.
Why Choose Risk Based Over Exhaustive
 Considerable savings on time, money, and effort
 Improving the efficiency of the tests
 It brings the focus on actual business needs over functional
perfection
 Strike a balance between end user requirements and technical
perfection
Other Slideshare Decks You Might Like
Learn more about our Q A Services
For any queries on Software Testing
Suyati provides marketing technology and integration services for companies
that wish to combine the best of breed solutions and create a unified approach
to customer acquisition. This unified digital marketing approach requires system
integration between various CMS and CRM platforms, and a slew of eCommerce,
Marketing Automation, Social Media Listening, email and social marketing, and
customer service systems. Our specialized knowledge in Salesforce, open source
and .Net based systems enables us to build effective custom integrated solutions
for our clients.

More Related Content

Viewers also liked

Bringing the hacker mindset into requirements and testing by Eapen Thomas and...
Bringing the hacker mindset into requirements and testing by Eapen Thomas and...Bringing the hacker mindset into requirements and testing by Eapen Thomas and...
Bringing the hacker mindset into requirements and testing by Eapen Thomas and...QA or the Highway
 
What to do with the problems you cannot solve?
What to do with the problems you cannot solve?What to do with the problems you cannot solve?
What to do with the problems you cannot solve?SQALab
 
Forget Quality!
Forget Quality!Forget Quality!
Forget Quality!SQALab
 
Methods for Validating and Testing Software Requirements (lecture slides)
Methods for Validating and Testing Software Requirements (lecture slides)Methods for Validating and Testing Software Requirements (lecture slides)
Methods for Validating and Testing Software Requirements (lecture slides)Dagmar Monett
 
Software Testing without Requirements: Survival Guide
Software Testing without Requirements: Survival GuideSoftware Testing without Requirements: Survival Guide
Software Testing without Requirements: Survival GuideOleksandr Lutsaievskyi
 
A New Model for Testing
A New Model for TestingA New Model for Testing
A New Model for TestingSQALab
 
Risk-Based Testing - Designing & managing the test process (2002)
Risk-Based Testing - Designing & managing the test process (2002)Risk-Based Testing - Designing & managing the test process (2002)
Risk-Based Testing - Designing & managing the test process (2002)Neil Thompson
 
Example requirements specification
Example requirements specificationExample requirements specification
Example requirements specificationindrisrozas
 
Implementation of Risk-Based Approach for Quality & Cost Optimization
Implementation of Risk-Based Approach for Quality & Cost OptimizationImplementation of Risk-Based Approach for Quality & Cost Optimization
Implementation of Risk-Based Approach for Quality & Cost OptimizationSonata Software
 

Viewers also liked (9)

Bringing the hacker mindset into requirements and testing by Eapen Thomas and...
Bringing the hacker mindset into requirements and testing by Eapen Thomas and...Bringing the hacker mindset into requirements and testing by Eapen Thomas and...
Bringing the hacker mindset into requirements and testing by Eapen Thomas and...
 
What to do with the problems you cannot solve?
What to do with the problems you cannot solve?What to do with the problems you cannot solve?
What to do with the problems you cannot solve?
 
Forget Quality!
Forget Quality!Forget Quality!
Forget Quality!
 
Methods for Validating and Testing Software Requirements (lecture slides)
Methods for Validating and Testing Software Requirements (lecture slides)Methods for Validating and Testing Software Requirements (lecture slides)
Methods for Validating and Testing Software Requirements (lecture slides)
 
Software Testing without Requirements: Survival Guide
Software Testing without Requirements: Survival GuideSoftware Testing without Requirements: Survival Guide
Software Testing without Requirements: Survival Guide
 
A New Model for Testing
A New Model for TestingA New Model for Testing
A New Model for Testing
 
Risk-Based Testing - Designing & managing the test process (2002)
Risk-Based Testing - Designing & managing the test process (2002)Risk-Based Testing - Designing & managing the test process (2002)
Risk-Based Testing - Designing & managing the test process (2002)
 
Example requirements specification
Example requirements specificationExample requirements specification
Example requirements specification
 
Implementation of Risk-Based Approach for Quality & Cost Optimization
Implementation of Risk-Based Approach for Quality & Cost OptimizationImplementation of Risk-Based Approach for Quality & Cost Optimization
Implementation of Risk-Based Approach for Quality & Cost Optimization
 

More from Suyati Technologies

The Rise of mCommerce: State of mobile driven commerce in 2018
The Rise of mCommerce: State of mobile driven commerce in 2018The Rise of mCommerce: State of mobile driven commerce in 2018
The Rise of mCommerce: State of mobile driven commerce in 2018Suyati Technologies
 
How Technology made up the 2016 US Presidential Election
How Technology made up the 2016 US Presidential ElectionHow Technology made up the 2016 US Presidential Election
How Technology made up the 2016 US Presidential ElectionSuyati Technologies
 
Is Internet of Things (IoT) a Top Technology Investment Today?
Is Internet of Things (IoT) a Top Technology Investment Today?Is Internet of Things (IoT) a Top Technology Investment Today?
Is Internet of Things (IoT) a Top Technology Investment Today?Suyati Technologies
 
How Cloud Technology fuels Digital Transformation
How Cloud Technology fuels Digital TransformationHow Cloud Technology fuels Digital Transformation
How Cloud Technology fuels Digital TransformationSuyati Technologies
 
How Cloud Enhances Agile Software Development
How Cloud Enhances Agile Software DevelopmentHow Cloud Enhances Agile Software Development
How Cloud Enhances Agile Software DevelopmentSuyati Technologies
 
The UX Design 101- For Engaging Mobile Apps
The UX Design 101- For Engaging Mobile AppsThe UX Design 101- For Engaging Mobile Apps
The UX Design 101- For Engaging Mobile AppsSuyati Technologies
 
Industry 4.0 and Internet of Things (IoT)- The Emerging Marketing Trends
Industry 4.0 and Internet of Things (IoT)- The Emerging Marketing TrendsIndustry 4.0 and Internet of Things (IoT)- The Emerging Marketing Trends
Industry 4.0 and Internet of Things (IoT)- The Emerging Marketing TrendsSuyati Technologies
 
5 Ways in which Big Data can help the Hospitality Industry
5 Ways in which Big Data can help the Hospitality Industry5 Ways in which Big Data can help the Hospitality Industry
5 Ways in which Big Data can help the Hospitality IndustrySuyati Technologies
 
How Magento’s Mobile Friendly Themes Increase Conversion Rates
How Magento’s Mobile Friendly Themes Increase Conversion RatesHow Magento’s Mobile Friendly Themes Increase Conversion Rates
How Magento’s Mobile Friendly Themes Increase Conversion RatesSuyati Technologies
 
Enterprise Wearables: 5 Reasons to Adopt Wearable Technology
Enterprise Wearables: 5 Reasons to Adopt Wearable TechnologyEnterprise Wearables: 5 Reasons to Adopt Wearable Technology
Enterprise Wearables: 5 Reasons to Adopt Wearable TechnologySuyati Technologies
 
Tethering Users to your App- The Guidelines
Tethering Users to your App- The GuidelinesTethering Users to your App- The Guidelines
Tethering Users to your App- The GuidelinesSuyati Technologies
 
The Impact of Internet of Things (IoT) in Manufacturing Today
The Impact of Internet of Things (IoT) in Manufacturing TodayThe Impact of Internet of Things (IoT) in Manufacturing Today
The Impact of Internet of Things (IoT) in Manufacturing TodaySuyati Technologies
 
Salesforce Lightning for Microsoft Continuum on Windows 10
Salesforce Lightning for Microsoft Continuum on Windows 10Salesforce Lightning for Microsoft Continuum on Windows 10
Salesforce Lightning for Microsoft Continuum on Windows 10Suyati Technologies
 
Personalization Struggles in Marketing
Personalization Struggles in MarketingPersonalization Struggles in Marketing
Personalization Struggles in MarketingSuyati Technologies
 
Salesforce Health Cloud – The Changing Face of Healthcare Data
Salesforce Health Cloud – The Changing Face of Healthcare DataSalesforce Health Cloud – The Changing Face of Healthcare Data
Salesforce Health Cloud – The Changing Face of Healthcare DataSuyati Technologies
 
Optimization of Supply Chain Management with Big Data
Optimization of Supply Chain Management with Big DataOptimization of Supply Chain Management with Big Data
Optimization of Supply Chain Management with Big DataSuyati Technologies
 
Cloud Computing will enable New Business Models in 3 years
Cloud Computing will enable New Business Models in 3 yearsCloud Computing will enable New Business Models in 3 years
Cloud Computing will enable New Business Models in 3 yearsSuyati Technologies
 

More from Suyati Technologies (20)

The Rise of mCommerce: State of mobile driven commerce in 2018
The Rise of mCommerce: State of mobile driven commerce in 2018The Rise of mCommerce: State of mobile driven commerce in 2018
The Rise of mCommerce: State of mobile driven commerce in 2018
 
CRM Trends to Watch for in 2017
CRM Trends to Watch for in 2017CRM Trends to Watch for in 2017
CRM Trends to Watch for in 2017
 
How Technology made up the 2016 US Presidential Election
How Technology made up the 2016 US Presidential ElectionHow Technology made up the 2016 US Presidential Election
How Technology made up the 2016 US Presidential Election
 
Is Internet of Things (IoT) a Top Technology Investment Today?
Is Internet of Things (IoT) a Top Technology Investment Today?Is Internet of Things (IoT) a Top Technology Investment Today?
Is Internet of Things (IoT) a Top Technology Investment Today?
 
How Cloud Technology fuels Digital Transformation
How Cloud Technology fuels Digital TransformationHow Cloud Technology fuels Digital Transformation
How Cloud Technology fuels Digital Transformation
 
How Cloud Enhances Agile Software Development
How Cloud Enhances Agile Software DevelopmentHow Cloud Enhances Agile Software Development
How Cloud Enhances Agile Software Development
 
The UX Design 101- For Engaging Mobile Apps
The UX Design 101- For Engaging Mobile AppsThe UX Design 101- For Engaging Mobile Apps
The UX Design 101- For Engaging Mobile Apps
 
Industry 4.0 and Internet of Things (IoT)- The Emerging Marketing Trends
Industry 4.0 and Internet of Things (IoT)- The Emerging Marketing TrendsIndustry 4.0 and Internet of Things (IoT)- The Emerging Marketing Trends
Industry 4.0 and Internet of Things (IoT)- The Emerging Marketing Trends
 
5 Ways in which Big Data can help the Hospitality Industry
5 Ways in which Big Data can help the Hospitality Industry5 Ways in which Big Data can help the Hospitality Industry
5 Ways in which Big Data can help the Hospitality Industry
 
How Magento’s Mobile Friendly Themes Increase Conversion Rates
How Magento’s Mobile Friendly Themes Increase Conversion RatesHow Magento’s Mobile Friendly Themes Increase Conversion Rates
How Magento’s Mobile Friendly Themes Increase Conversion Rates
 
Enterprise Wearables: 5 Reasons to Adopt Wearable Technology
Enterprise Wearables: 5 Reasons to Adopt Wearable TechnologyEnterprise Wearables: 5 Reasons to Adopt Wearable Technology
Enterprise Wearables: 5 Reasons to Adopt Wearable Technology
 
Tethering Users to your App- The Guidelines
Tethering Users to your App- The GuidelinesTethering Users to your App- The Guidelines
Tethering Users to your App- The Guidelines
 
The Impact of Internet of Things (IoT) in Manufacturing Today
The Impact of Internet of Things (IoT) in Manufacturing TodayThe Impact of Internet of Things (IoT) in Manufacturing Today
The Impact of Internet of Things (IoT) in Manufacturing Today
 
Salesforce Lightning for Microsoft Continuum on Windows 10
Salesforce Lightning for Microsoft Continuum on Windows 10Salesforce Lightning for Microsoft Continuum on Windows 10
Salesforce Lightning for Microsoft Continuum on Windows 10
 
Personalization Struggles in Marketing
Personalization Struggles in MarketingPersonalization Struggles in Marketing
Personalization Struggles in Marketing
 
Salesforce Health Cloud – The Changing Face of Healthcare Data
Salesforce Health Cloud – The Changing Face of Healthcare DataSalesforce Health Cloud – The Changing Face of Healthcare Data
Salesforce Health Cloud – The Changing Face of Healthcare Data
 
Optimization of Supply Chain Management with Big Data
Optimization of Supply Chain Management with Big DataOptimization of Supply Chain Management with Big Data
Optimization of Supply Chain Management with Big Data
 
Cloud Computing will enable New Business Models in 3 years
Cloud Computing will enable New Business Models in 3 yearsCloud Computing will enable New Business Models in 3 years
Cloud Computing will enable New Business Models in 3 years
 
How Does A CMS Function
How Does A CMS FunctionHow Does A CMS Function
How Does A CMS Function
 
Web Design Trends for 2016
Web Design Trends for 2016Web Design Trends for 2016
Web Design Trends for 2016
 

Recently uploaded

React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf31events.com
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanyChristoph Pohl
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtimeandrehoraa
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)jennyeacort
 
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...Akihiro Suda
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Angel Borroy López
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commercemanigoyal112
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsSafe Software
 
Large Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLarge Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLionel Briand
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalLionel Briand
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfDrew Moseley
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odishasmiwainfosol
 

Recently uploaded (20)

React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtime
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
 
Advantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your BusinessAdvantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your Business
 
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commerce
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data Streams
 
Large Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLarge Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and Repair
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive Goal
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdf
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
 

Risk Based Testing V/s Exhaustive Testing

  • 1.
  • 2. What is Software Testing? The process of validating and verifying a software program or application or product:  Meets the business and technical requirements  Works as expected  Can be implemented with the same characteristic.
  • 3.  Functional testing is performed to verify that a software application performs and functions correctly according to design specifications. What is Functional Testing
  • 4.  Risk based testing uses risk to prioritize and emphasize the appropriate tests during test execution. Risk is the probability of occurrence of an undesirable outcome.  Exhaustive testing is a testing or quality assurance approach in which all possible combinations of scenarios and use/test cases are used for testing. Risk Based and Exhaustive Testing
  • 5. Why do we need Risk Based Testing  Identifying risk helps planning, specification, preparation and execution.  Risk-based testing involves both mitigation and consistency  Involves measuring how well we are doing at finding and removing defects in critical areas.  Identifies proactive opportunities to remove or prevent defects
  • 6. Risk Analysis fundamentals in software testing
  • 7. Risk Identification Involves collecting information about the project and classifying it to determine the amount of potential risk in the test phase and in production (in the future).
  • 8. Risk Strategy Strategizing and planning involves the identification and assessment of risks and the development of contingency plans for possible alternative project activity or the mitigation of all risks.
  • 9. Risk Assessment  Is this a risk or not?  How serious is the risk?  What are the consequences?  What is the likelihood of this risk happening? Risk assessments involves asking questions such as-
  • 10. Risk Mitigation and Reporting  Risk mitigation/avoidance activities avoid risks or minimize their impact.  Risk reporting is based on information obtained from the previous topics
  • 11. Risk Prediction  Risk prediction involves forecasting risks using the history and knowledge of previously identified risks.  During test execution each individual function is monitored using additional testing.
  • 12. Metrics for Progress Tracking 1. the number of tests planned, executed and completed 2. the number of faults per function 3. the number of hours used in testing per fault found 4. the number of hours used in fixing per fault
  • 13. Exhaustive Testing The process of testing for absolutely everything just to make sure that the product cannot be destroyed or crashed by some random happenstance.
  • 14. Why Choose Risk Based Over Exhaustive  Considerable savings on time, money, and effort  Improving the efficiency of the tests  It brings the focus on actual business needs over functional perfection  Strike a balance between end user requirements and technical perfection
  • 15. Other Slideshare Decks You Might Like
  • 16. Learn more about our Q A Services
  • 17. For any queries on Software Testing
  • 18. Suyati provides marketing technology and integration services for companies that wish to combine the best of breed solutions and create a unified approach to customer acquisition. This unified digital marketing approach requires system integration between various CMS and CRM platforms, and a slew of eCommerce, Marketing Automation, Social Media Listening, email and social marketing, and customer service systems. Our specialized knowledge in Salesforce, open source and .Net based systems enables us to build effective custom integrated solutions for our clients.