SlideShare a Scribd company logo
 It is a good all-round specification-based black-box technique. It can be
applied at any level of testing and is often a good technique.
 It is better to use the technique informally than not at all, it is much
better to use the technique in a formal way to attain the full benefits
that it can deliver.
 The idea behind the technique is to divide a set of test conditions into
groups or sets that can be considered the same.
 The equivalence partitioning technique then describes that we need to
test only one condition from each partition.
 For example, a saving account in a bank earns a different rate of interest
depending on the balance in the account.
 When we say a partition is ‘invalid ‘,it doesn’t mean that it represents a
value that cannot be entered by user. It just means that it is not one of
the expected inputs for this particular field.
 The software should correctly handle values from the invalid partition,
by replying with an error message ‘Balance must me at least $0.00.
 Definition:
A boundary value is any input or output value on the
edge of an equivalence partition. It’s a black box test
design technique where test cases are designed by
using boundary values; BVA is used in range checking.
 Objective :
Boundary value analysis leads to a selection of test
cases that exercise bounding values.
 Guidelines :
If an input condition specifies a range bounded by
values a and b, test cases should be designed with
value a and b, just above and below a and b.
CONDITIONS
(Candidate)
VALID
BOUNDARY
& EDGES
TAG
(applicable)
INVALID
BOUNDARY
TAG
(not-
applicable)
Relevant
Experience
Number
should be 0
to 99
0 ,1 –
98,99
A1 -0.01 &
99.01
B1
Year of
Passing
1975 to 2008
1975,1976 –
2007,2008
A2 1974 –
2009
B2
 A black-box test design technique where the cases
are designed to execute the combinations of
inputs(causes) with their associated outputs(effects)
in a table format where each column represents a
unique combination.
 The input conditions and actions are often stated
either true/false(Boolean).
 It overcomes the defect of EP/BVP which becomes
complicated when different combinations of inputs
has to be given.
State Transition diagram represents one specific entity
at a time
It describes the states of an entity
It also describes the events that affect the entity, the
transitions of the entity from one state to another, and
actions that are initiated by the entity.
o What is a Scenario?
o Who is an Actor?
o What is a Use case?
Maintains
Database
Withdraw cash
Deposit cash
Administrator
customer
Actors
Use Cases
Main Success
Scenario
Step Action
1 A:Actor Clicks on the
Login page of the site.
2 S:System prompts the
actor to supply Username
and Password.
3 A: Actor supplies the
Username and Password
Details.
4 S:System Gets the User ID
and decrypts the
Password. System
compares User ID & the
Password provided by the
user with the stored User
ID & Password. If the
comparison is successful
actor is directed to the
Next Page.
5 Use Case ends
Extensions Step Action
3a S:If invalid Username and
Password is given then a
message should be
displayed “to reenter
Username and Password”
3b A:If User forgets the
Password then Actor should
invoke forgot password
S:System prompts for email
address
A:Actor provides the email
address
S:System Validates the user
provided email address with
stored email Address.
If System validation is
successful ,reset password is
emailed to actor.
4a S:If validation is not
successful then go to 3a
Thank You

More Related Content

Viewers also liked

V Model in Software Testing
V Model in Software TestingV Model in Software Testing
V Model in Software Testing
Abdul Raheem
 
V model Over View (Software Engineering)
V model Over View (Software Engineering) V model Over View (Software Engineering)
V model Over View (Software Engineering)
Badar Rameez. CH.
 
V model final
V model finalV model final
V model final
suhasreddy1
 
V model in SDLC
V model in SDLCV model in SDLC
V model in SDLC
Jasour Obeidat
 
Types of testing
Types of testingTypes of testing
Types of testing
Sonam Agarwal
 
Types of Test
Types of Test Types of Test
Types of Test
jasper gaboc
 

Viewers also liked (6)

V Model in Software Testing
V Model in Software TestingV Model in Software Testing
V Model in Software Testing
 
V model Over View (Software Engineering)
V model Over View (Software Engineering) V model Over View (Software Engineering)
V model Over View (Software Engineering)
 
V model final
V model finalV model final
V model final
 
V model in SDLC
V model in SDLCV model in SDLC
V model in SDLC
 
Types of testing
Types of testingTypes of testing
Types of testing
 
Types of Test
Types of Test Types of Test
Types of Test
 

Similar to Black Box Testing

Black Box Testing
Black Box TestingBlack Box Testing
Black Box Testing
Mustafa Sherazi
 
CTFL Module 04
CTFL Module 04CTFL Module 04
CTFL Module 04
Davis Thomas
 
Implementing Blackbox Testing
Implementing Blackbox TestingImplementing Blackbox Testing
Implementing Blackbox Testing
Edureka!
 
ISTQB, ISEB Lecture Notes- 4
ISTQB, ISEB Lecture Notes- 4ISTQB, ISEB Lecture Notes- 4
ISTQB, ISEB Lecture Notes- 4
onsoftwaretest
 
Black_Box_testing_Decision_Table (1).ppt
Black_Box_testing_Decision_Table (1).pptBlack_Box_testing_Decision_Table (1).ppt
Black_Box_testing_Decision_Table (1).ppt
EnghamzaKhalailah
 
SE 09 (test design techs).pptx
SE 09 (test design techs).pptxSE 09 (test design techs).pptx
SE 09 (test design techs).pptx
ZohairMughal1
 
Blackbox
BlackboxBlackbox
Blackbox
Oana Feidi
 
Code coverage in theory and in practice form the do178 b perspective
Code coverage in theory and in practice form the do178 b perspectiveCode coverage in theory and in practice form the do178 b perspective
Code coverage in theory and in practice form the do178 b perspective
Engineering Software Lab
 
Code Coverage in Theory and in practice form the DO178B perspective
Code Coverage in Theory and in practice form the DO178B perspective   Code Coverage in Theory and in practice form the DO178B perspective
Code Coverage in Theory and in practice form the DO178B perspective
Engineering Software Lab
 
blckboxtesting.ppt il.;io'/ ulio'[ yjko8i[0'-p/ yk
blckboxtesting.ppt il.;io'/ ulio'[ yjko8i[0'-p/ ykblckboxtesting.ppt il.;io'/ ulio'[ yjko8i[0'-p/ yk
blckboxtesting.ppt il.;io'/ ulio'[ yjko8i[0'-p/ yk
SMayankSharma
 
Black box testing techniques
Black box testing techniques Black box testing techniques
Black box testing techniques
Nguyen Quoc Dung
 
Lesson 2....PPT 1
Lesson 2....PPT 1Lesson 2....PPT 1
Lesson 2....PPT 1
bhushan Nehete
 
Blackbox
BlackboxBlackbox
Blackbox
Oana Feidi
 
Testing Fundamentals
Testing FundamentalsTesting Fundamentals
Testing Fundamentals
Kiran Kumar
 
Testcase design techniques final
Testcase design techniques finalTestcase design techniques final
Testcase design techniques final
shraavank
 
Test Effectiveness
Test EffectivenessTest Effectiveness
Test Effectiveness
Arunkumar Nehru KS
 
Blackbox
BlackboxBlackbox
Blackbox
GuruKrishnaTeja
 
What are Software Testing Methodologies | Software Testing Techniques | Edureka
What are Software Testing Methodologies | Software Testing Techniques | EdurekaWhat are Software Testing Methodologies | Software Testing Techniques | Edureka
What are Software Testing Methodologies | Software Testing Techniques | Edureka
Edureka!
 
Se (techniques for black box testing ppt)
Se (techniques for black box testing ppt)Se (techniques for black box testing ppt)
Se (techniques for black box testing ppt)
Mani Kanth
 
Dynamic Testing
Dynamic TestingDynamic Testing
Dynamic Testing
Jimi Patel
 

Similar to Black Box Testing (20)

Black Box Testing
Black Box TestingBlack Box Testing
Black Box Testing
 
CTFL Module 04
CTFL Module 04CTFL Module 04
CTFL Module 04
 
Implementing Blackbox Testing
Implementing Blackbox TestingImplementing Blackbox Testing
Implementing Blackbox Testing
 
ISTQB, ISEB Lecture Notes- 4
ISTQB, ISEB Lecture Notes- 4ISTQB, ISEB Lecture Notes- 4
ISTQB, ISEB Lecture Notes- 4
 
Black_Box_testing_Decision_Table (1).ppt
Black_Box_testing_Decision_Table (1).pptBlack_Box_testing_Decision_Table (1).ppt
Black_Box_testing_Decision_Table (1).ppt
 
SE 09 (test design techs).pptx
SE 09 (test design techs).pptxSE 09 (test design techs).pptx
SE 09 (test design techs).pptx
 
Blackbox
BlackboxBlackbox
Blackbox
 
Code coverage in theory and in practice form the do178 b perspective
Code coverage in theory and in practice form the do178 b perspectiveCode coverage in theory and in practice form the do178 b perspective
Code coverage in theory and in practice form the do178 b perspective
 
Code Coverage in Theory and in practice form the DO178B perspective
Code Coverage in Theory and in practice form the DO178B perspective   Code Coverage in Theory and in practice form the DO178B perspective
Code Coverage in Theory and in practice form the DO178B perspective
 
blckboxtesting.ppt il.;io'/ ulio'[ yjko8i[0'-p/ yk
blckboxtesting.ppt il.;io'/ ulio'[ yjko8i[0'-p/ ykblckboxtesting.ppt il.;io'/ ulio'[ yjko8i[0'-p/ yk
blckboxtesting.ppt il.;io'/ ulio'[ yjko8i[0'-p/ yk
 
Black box testing techniques
Black box testing techniques Black box testing techniques
Black box testing techniques
 
Lesson 2....PPT 1
Lesson 2....PPT 1Lesson 2....PPT 1
Lesson 2....PPT 1
 
Blackbox
BlackboxBlackbox
Blackbox
 
Testing Fundamentals
Testing FundamentalsTesting Fundamentals
Testing Fundamentals
 
Testcase design techniques final
Testcase design techniques finalTestcase design techniques final
Testcase design techniques final
 
Test Effectiveness
Test EffectivenessTest Effectiveness
Test Effectiveness
 
Blackbox
BlackboxBlackbox
Blackbox
 
What are Software Testing Methodologies | Software Testing Techniques | Edureka
What are Software Testing Methodologies | Software Testing Techniques | EdurekaWhat are Software Testing Methodologies | Software Testing Techniques | Edureka
What are Software Testing Methodologies | Software Testing Techniques | Edureka
 
Se (techniques for black box testing ppt)
Se (techniques for black box testing ppt)Se (techniques for black box testing ppt)
Se (techniques for black box testing ppt)
 
Dynamic Testing
Dynamic TestingDynamic Testing
Dynamic Testing
 

Recently uploaded

RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 

Recently uploaded (20)

RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 

Black Box Testing

  • 1.
  • 2.  It is a good all-round specification-based black-box technique. It can be applied at any level of testing and is often a good technique.  It is better to use the technique informally than not at all, it is much better to use the technique in a formal way to attain the full benefits that it can deliver.  The idea behind the technique is to divide a set of test conditions into groups or sets that can be considered the same.  The equivalence partitioning technique then describes that we need to test only one condition from each partition.  For example, a saving account in a bank earns a different rate of interest depending on the balance in the account.  When we say a partition is ‘invalid ‘,it doesn’t mean that it represents a value that cannot be entered by user. It just means that it is not one of the expected inputs for this particular field.  The software should correctly handle values from the invalid partition, by replying with an error message ‘Balance must me at least $0.00.
  • 3.  Definition: A boundary value is any input or output value on the edge of an equivalence partition. It’s a black box test design technique where test cases are designed by using boundary values; BVA is used in range checking.  Objective : Boundary value analysis leads to a selection of test cases that exercise bounding values.  Guidelines : If an input condition specifies a range bounded by values a and b, test cases should be designed with value a and b, just above and below a and b.
  • 4. CONDITIONS (Candidate) VALID BOUNDARY & EDGES TAG (applicable) INVALID BOUNDARY TAG (not- applicable) Relevant Experience Number should be 0 to 99 0 ,1 – 98,99 A1 -0.01 & 99.01 B1 Year of Passing 1975 to 2008 1975,1976 – 2007,2008 A2 1974 – 2009 B2
  • 5.  A black-box test design technique where the cases are designed to execute the combinations of inputs(causes) with their associated outputs(effects) in a table format where each column represents a unique combination.  The input conditions and actions are often stated either true/false(Boolean).  It overcomes the defect of EP/BVP which becomes complicated when different combinations of inputs has to be given.
  • 6. State Transition diagram represents one specific entity at a time It describes the states of an entity It also describes the events that affect the entity, the transitions of the entity from one state to another, and actions that are initiated by the entity.
  • 7. o What is a Scenario? o Who is an Actor? o What is a Use case?
  • 9. Main Success Scenario Step Action 1 A:Actor Clicks on the Login page of the site. 2 S:System prompts the actor to supply Username and Password. 3 A: Actor supplies the Username and Password Details. 4 S:System Gets the User ID and decrypts the Password. System compares User ID & the Password provided by the user with the stored User ID & Password. If the comparison is successful actor is directed to the Next Page. 5 Use Case ends
  • 10. Extensions Step Action 3a S:If invalid Username and Password is given then a message should be displayed “to reenter Username and Password” 3b A:If User forgets the Password then Actor should invoke forgot password S:System prompts for email address A:Actor provides the email address S:System Validates the user provided email address with stored email Address. If System validation is successful ,reset password is emailed to actor. 4a S:If validation is not successful then go to 3a