SlideShare a Scribd company logo
Software Testing Basics Elaine Weyuker AT&T Labs – Research Florham Park, NJ November 11, 2002
What is Software Testing? ,[object Object]
Goals of Testing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Software Testing Difficulties ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Determining the Correctness of Outputs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Dimensions of Test Case Selection ,[object Object],[object Object]
Stages of Testing ,[object Object],[object Object],[object Object],[object Object]
Unit Testing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Integration Testing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Integration Testing ,[object Object],[object Object],[object Object],[object Object]
Integration Testing ,[object Object],[object Object],[object Object],[object Object]
Stages of Testing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
System Testing ,[object Object],[object Object]
Realities of System Testing ,[object Object],[object Object],[object Object],[object Object]
More Realities of Software Testing ,[object Object],[object Object],[object Object],[object Object],[object Object]
Test Selection Strategies Every systematic test selection strategy can be viewed as a way of dividing the input domain into  subdomains , and selecting one or more test case from each. The division can be based on such things as code characteristics (white box), specification details (black box), domain structure, risk analysis, etc.  Subdomains are not necessarily disjoint, even though the testing literature frequently refers to them as  partitions.
The Down Side of Code-Based Techniques ,[object Object],[object Object]
The Down Side of Specification-Based Techniques ,[object Object],[object Object],[object Object]
Operational Distributions ,[object Object],[object Object]
How Usage Data Can Be Collected For New Systems ,[object Object],[object Object],[object Object],[object Object],[object Object]
Operational Distribution-Based Test Case Selection ,[object Object],[object Object],[object Object]
The Down Side of Operational Distribution-Based Techniques ,[object Object],[object Object],[object Object]
The Up Side of Operational Distribution-Based Techniques ,[object Object],[object Object],[object Object]
Domain-Based Test Case Selection ,[object Object],[object Object],[object Object],[object Object]
Domain-Based Testing Example ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Random Testing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Benefits of Random Testing ,[object Object],[object Object]
The Down Side of Random Testing ,[object Object],[object Object],[object Object],[object Object],[object Object]
Risk-based Testing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Risk-based Testing ,[object Object],[object Object],[object Object]
Risk Priority Table 9 High  = 3  High = 3 Withdraw cash 4 Medium = 2 Medium = 2 Transfer money 1 Low = 1 Low = 1 Read balance 3 High = 3 Low = 1 Make payment 3 Low = 1 High = 3 Buy train ticket 6 High = 3 Medium = 2 Security Priority (L x C) Failure Consequence Occurrence Likelihood Features & Attributes
Ordered Risk Priority Table 1 Low = 1 Low = 1 Read balance 6 High  = 3  Medium = 2 Security 9 High  = 3  High = 3 Withdraw cash 4 Medium = 2 Medium = 2 Transfer money 3 High  = 3  Low = 1 Make payment 3 Low  1 High  = 3  Buy train ticket Priority (L x C) Failure Consequence Occurrence Likelihood Features & Attributes
Acceptance Testing ,[object Object],[object Object],[object Object],[object Object],[object Object]
Regression Testing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Prioritizing Test Cases ,[object Object],[object Object],[object Object],[object Object],[object Object]
Bases for Test Prioritization ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
White-box Testing ,[object Object],[object Object],[object Object],[object Object],[object Object]
White-box Testing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Control Flow and Data Flow Criteria ,[object Object],[object Object]
Issues of White-box Testing ,[object Object],[object Object],[object Object],[object Object],[object Object]
Test Automation ,[object Object],[object Object],[object Object]
Why should tests be automated? ,[object Object],[object Object],[object Object]
Test Automation Issues ,[object Object],[object Object],[object Object],[object Object]
Observations on Automated Tests ,[object Object],[object Object],[object Object]
Uses of Automated Testing ,[object Object],[object Object],[object Object],[object Object]
Financial Implications of Improved Testing ,[object Object],[object Object]
Estimated Cost of Inadequate Testing *NIST Report: The Economic Impact of Inadequate Infrastructure for Software Testing, 2002.  $22 billion $59 billion Total U.S. Economy $1,510,000,000 $3,340,000,000 Financial Services $589,000,000 $1,800,000,000 Transportation Manufacture Potential Cost Reduction from Feasible Improvements Cost of Inadequate Software Testing

More Related Content

Similar to provacompleta2

Chapter 3 SOFTWARE TESTING PROCESS
Chapter 3 SOFTWARE TESTING PROCESSChapter 3 SOFTWARE TESTING PROCESS
Chapter 3 SOFTWARE TESTING PROCESS
st. michael
 
Software testing mtech project in jalandhar
Software testing mtech project in jalandharSoftware testing mtech project in jalandhar
Software testing mtech project in jalandhar
deepikakaler1
 
Software testing mtech project in ludhiana
Software testing mtech project in ludhianaSoftware testing mtech project in ludhiana
Software testing mtech project in ludhiana
deepikakaler1
 
6months industrial training in software testing, ludhiana
6months industrial training in software testing, ludhiana6months industrial training in software testing, ludhiana
6months industrial training in software testing, ludhiana
deepikakaler1
 
6months industrial training in software testing, jalandhar
6months industrial training in software testing, jalandhar6months industrial training in software testing, jalandhar
6months industrial training in software testing, jalandhar
deepikakaler1
 
6 weeks summer training in software testing,ludhiana
6 weeks summer training in software testing,ludhiana6 weeks summer training in software testing,ludhiana
6 weeks summer training in software testing,ludhiana
deepikakaler1
 

Similar to provacompleta2 (6)

Chapter 3 SOFTWARE TESTING PROCESS
Chapter 3 SOFTWARE TESTING PROCESSChapter 3 SOFTWARE TESTING PROCESS
Chapter 3 SOFTWARE TESTING PROCESS
 
Software testing mtech project in jalandhar
Software testing mtech project in jalandharSoftware testing mtech project in jalandhar
Software testing mtech project in jalandhar
 
Software testing mtech project in ludhiana
Software testing mtech project in ludhianaSoftware testing mtech project in ludhiana
Software testing mtech project in ludhiana
 
6months industrial training in software testing, ludhiana
6months industrial training in software testing, ludhiana6months industrial training in software testing, ludhiana
6months industrial training in software testing, ludhiana
 
6months industrial training in software testing, jalandhar
6months industrial training in software testing, jalandhar6months industrial training in software testing, jalandhar
6months industrial training in software testing, jalandhar
 
6 weeks summer training in software testing,ludhiana
6 weeks summer training in software testing,ludhiana6 weeks summer training in software testing,ludhiana
6 weeks summer training in software testing,ludhiana
 

More from lmscollaborative2 (18)

contrucci
contruccicontrucci
contrucci
 
contrucci
contruccicontrucci
contrucci
 
test3
test3test3
test3
 
remoto2
remoto2remoto2
remoto2
 
finalelocale2
finalelocale2finalelocale2
finalelocale2
 
 
provoora
provooraprovoora
provoora
 
provaoggi2
provaoggi2provaoggi2
provaoggi2
 
domenica3
domenica3domenica3
domenica3
 
domenica2
domenica2domenica2
domenica2
 
domenica1
domenica1domenica1
domenica1
 
provarealw4
provarealw4provarealw4
provarealw4
 
provarealw3
provarealw3provarealw3
provarealw3
 
testsfw5
testsfw5testsfw5
testsfw5
 
testsfw4
testsfw4testsfw4
testsfw4
 
testsfw2
testsfw2testsfw2
testsfw2
 
test
testtest
test
 
as3
as3as3
as3
 

Recently uploaded

GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 

Recently uploaded (20)

GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 

provacompleta2

  • 1. Software Testing Basics Elaine Weyuker AT&T Labs – Research Florham Park, NJ November 11, 2002
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16. Test Selection Strategies Every systematic test selection strategy can be viewed as a way of dividing the input domain into subdomains , and selecting one or more test case from each. The division can be based on such things as code characteristics (white box), specification details (black box), domain structure, risk analysis, etc. Subdomains are not necessarily disjoint, even though the testing literature frequently refers to them as partitions.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31. Risk Priority Table 9 High = 3 High = 3 Withdraw cash 4 Medium = 2 Medium = 2 Transfer money 1 Low = 1 Low = 1 Read balance 3 High = 3 Low = 1 Make payment 3 Low = 1 High = 3 Buy train ticket 6 High = 3 Medium = 2 Security Priority (L x C) Failure Consequence Occurrence Likelihood Features & Attributes
  • 32. Ordered Risk Priority Table 1 Low = 1 Low = 1 Read balance 6 High = 3 Medium = 2 Security 9 High = 3 High = 3 Withdraw cash 4 Medium = 2 Medium = 2 Transfer money 3 High = 3 Low = 1 Make payment 3 Low 1 High = 3 Buy train ticket Priority (L x C) Failure Consequence Occurrence Likelihood Features & Attributes
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47. Estimated Cost of Inadequate Testing *NIST Report: The Economic Impact of Inadequate Infrastructure for Software Testing, 2002. $22 billion $59 billion Total U.S. Economy $1,510,000,000 $3,340,000,000 Financial Services $589,000,000 $1,800,000,000 Transportation Manufacture Potential Cost Reduction from Feasible Improvements Cost of Inadequate Software Testing