Slides from Software Testing Techniques course offered at Kansas State University in Spring'16 and Spring'17. Entire course material can be found at https://github.com/rvprasad/software-testing-course.
Software Test Metrics and MeasurementsDavis Thomas
Explains in detail with example about calculation of -
1.Percentage Test cases Executed [Test Coverage]
2.Percentage Test cases not executed
3.Percentage Test cases Passed
4.Percentage Test cases Failed
5.Percentage Test cases BLOCKED/Deferred
6.Defect Density
7.Defect Removal Efficiency (DRE)
8.Defect Leakage
9.Defect Rejection ratio [Invalid bug ratio]
10.Percentage of Critical defects
11.Percentage of High defects
12.Percentage of Medium defects
13.Percentage of Low/Lowest defects
Software Testing and Quality Assurance Assignment 3Gurpreet singh
Short questions :
Que 1 : Define Software Testing.
Que 2 : What is risk identification ?
Que 3 : What is SCM ?
Que 4 : Define Debugging.
Que 5 : Explain Configuration audit.
Que 6 : Differentiate between white box testing & black box testing.
Que 7 : What do you mean by metrics ?
Que 8 : What do you mean by version control ?
Que 9 : Explain Object Oriented Software Engineering.
Que 10 : What are the advantages and disadvantages of manual testing tools ?
Long Questions:
Que 1 : What do you mean by baselines ? Explain their importance.
Que 2 : What do you mean by change control ? Explain the various steps in detail.
Que 3 : Explain various types of testing in detail.
Que 4 : Differentiate between automated testing and manual testing.
Que 5 : What is web engineering ? Explain in detail its model and features.
Slides from Software Testing Techniques course offered at Kansas State University in Spring'16 and Spring'17. Entire course material can be found at https://github.com/rvprasad/software-testing-course.
Software Test Metrics and MeasurementsDavis Thomas
Explains in detail with example about calculation of -
1.Percentage Test cases Executed [Test Coverage]
2.Percentage Test cases not executed
3.Percentage Test cases Passed
4.Percentage Test cases Failed
5.Percentage Test cases BLOCKED/Deferred
6.Defect Density
7.Defect Removal Efficiency (DRE)
8.Defect Leakage
9.Defect Rejection ratio [Invalid bug ratio]
10.Percentage of Critical defects
11.Percentage of High defects
12.Percentage of Medium defects
13.Percentage of Low/Lowest defects
Software Testing and Quality Assurance Assignment 3Gurpreet singh
Short questions :
Que 1 : Define Software Testing.
Que 2 : What is risk identification ?
Que 3 : What is SCM ?
Que 4 : Define Debugging.
Que 5 : Explain Configuration audit.
Que 6 : Differentiate between white box testing & black box testing.
Que 7 : What do you mean by metrics ?
Que 8 : What do you mean by version control ?
Que 9 : Explain Object Oriented Software Engineering.
Que 10 : What are the advantages and disadvantages of manual testing tools ?
Long Questions:
Que 1 : What do you mean by baselines ? Explain their importance.
Que 2 : What do you mean by change control ? Explain the various steps in detail.
Que 3 : Explain various types of testing in detail.
Que 4 : Differentiate between automated testing and manual testing.
Que 5 : What is web engineering ? Explain in detail its model and features.
These slides gives you information about path testing and data flow testing in software testing. These slides will be helpful for Engineering, CSE students.
This Lecture Note discusses the followings:
- What is NFA
- DFA vs NFA
- How does NFA compute
- Designing different NFA machines
- Regular operations on NFAs
- Conversion from NFA to DFA
In software testing, there are many paths between the entry and exit of a software program. So it’s difficult to fully test all paths of even a simple unit. This is a challenge when we design test cases.
This ppt covers the following topics
Software quality
A framework for product metrics
A product metrics taxonomy
Metrics for the analysis model
Metrics for the design model
Metrics for maintenance
The 7 software testing principles briefly explained. Everyone who works in software development company should know these principles.
It happens frequently that testers or qa people are not taken into account as part of the process in the software development lifecycle and this happens expecially when the principles are not known.
A short presentation to share knowledge about topic Decidability of Theory of Automata Course.
To make people to be aware how to know which formal languages are decidable and why...!
Using Monte Carlo Simulation in Project Estimates by Akram Najjar
The PMI Lebanon is glad to announce that Akram Najjar is the speaker for the a lecture titled “Using Monte Carlo Simulation in Project Estimates” delivered on Thursday, 28 July 2016
Lecture Outline
* Why are single point estimates unreliable and what is the alternative?
* What are distributions and how do we extract random samples from them (using Excel)? Two costing examples.
* How to setup a Monte Carlo Simulation model in a spreadsheet?
* Two PM examples (in detail)
* How to statistically analyze the thousands of runs to reach reliable estimates?
Lecture Objectives
* A Project Manager usually knows how certain parameters (such as duration, resource rates or quantities) behave. However, the PM can almost never define reliable single point estimates for these parameters. The result: many projects fail due to unreliable estimates. The alternative? The PM has to use his/her knowledge of how specific parameters behave statistically. For example, the PM knows that a specific task’s duration is distributed according to the bell shaped curve OR that another is uniformly distributed (flat variation), or triangular, or Beta-PERT, etc. The PM can then use Monte Carlo Simulation (MCS) to arrive at statistically significant and robust results. Monte Carlo Simulation (MCS) is a technique that relies on two processes. Process 1 aims at developing a spreadsheet model that calculates the critical path or the total cost, etc. The calculation is setup in a single row (or Run). This row is then duplicated a large number of times (thousands). Process 2 aims at inserting Excel functions in each of the parameters (durations, costs). In each row (or Run), such functions will provide a sample drawn from a statistical distribution that properly describes the behavior of that parameter. For example, a specific duration follows a Normal (Bell) distribution with an Average A and a Standard Deviation S. The model will then generate for each run and for that duration a different value that conforms with the bell shaped curve as defined (A and S). Each of these thousands of runs will provide the PM with a different “simulation” of the duration or the total cost, etc. By statistically analyzing the thousands of results, the PM can arrive at a robust and reliable estimate. Proprietary Add On’s for Monte Carlo Simulation in Microsoft Project are available. However, it is easy, free and more flexible to use native Microsoft functions to carry out the full simulation. The talk covered all the steps needed for such simulations giving several examples
These slides gives you information about path testing and data flow testing in software testing. These slides will be helpful for Engineering, CSE students.
This Lecture Note discusses the followings:
- What is NFA
- DFA vs NFA
- How does NFA compute
- Designing different NFA machines
- Regular operations on NFAs
- Conversion from NFA to DFA
In software testing, there are many paths between the entry and exit of a software program. So it’s difficult to fully test all paths of even a simple unit. This is a challenge when we design test cases.
This ppt covers the following topics
Software quality
A framework for product metrics
A product metrics taxonomy
Metrics for the analysis model
Metrics for the design model
Metrics for maintenance
The 7 software testing principles briefly explained. Everyone who works in software development company should know these principles.
It happens frequently that testers or qa people are not taken into account as part of the process in the software development lifecycle and this happens expecially when the principles are not known.
A short presentation to share knowledge about topic Decidability of Theory of Automata Course.
To make people to be aware how to know which formal languages are decidable and why...!
Using Monte Carlo Simulation in Project Estimates by Akram Najjar
The PMI Lebanon is glad to announce that Akram Najjar is the speaker for the a lecture titled “Using Monte Carlo Simulation in Project Estimates” delivered on Thursday, 28 July 2016
Lecture Outline
* Why are single point estimates unreliable and what is the alternative?
* What are distributions and how do we extract random samples from them (using Excel)? Two costing examples.
* How to setup a Monte Carlo Simulation model in a spreadsheet?
* Two PM examples (in detail)
* How to statistically analyze the thousands of runs to reach reliable estimates?
Lecture Objectives
* A Project Manager usually knows how certain parameters (such as duration, resource rates or quantities) behave. However, the PM can almost never define reliable single point estimates for these parameters. The result: many projects fail due to unreliable estimates. The alternative? The PM has to use his/her knowledge of how specific parameters behave statistically. For example, the PM knows that a specific task’s duration is distributed according to the bell shaped curve OR that another is uniformly distributed (flat variation), or triangular, or Beta-PERT, etc. The PM can then use Monte Carlo Simulation (MCS) to arrive at statistically significant and robust results. Monte Carlo Simulation (MCS) is a technique that relies on two processes. Process 1 aims at developing a spreadsheet model that calculates the critical path or the total cost, etc. The calculation is setup in a single row (or Run). This row is then duplicated a large number of times (thousands). Process 2 aims at inserting Excel functions in each of the parameters (durations, costs). In each row (or Run), such functions will provide a sample drawn from a statistical distribution that properly describes the behavior of that parameter. For example, a specific duration follows a Normal (Bell) distribution with an Average A and a Standard Deviation S. The model will then generate for each run and for that duration a different value that conforms with the bell shaped curve as defined (A and S). Each of these thousands of runs will provide the PM with a different “simulation” of the duration or the total cost, etc. By statistically analyzing the thousands of results, the PM can arrive at a robust and reliable estimate. Proprietary Add On’s for Monte Carlo Simulation in Microsoft Project are available. However, it is easy, free and more flexible to use native Microsoft functions to carry out the full simulation. The talk covered all the steps needed for such simulations giving several examples
Coursework Assignment Design of a taxi meter .docxvanesaburnand
Coursework Assignment
Design of a taxi meter
Module Name: Electronic Systems Integration
Module Code: 6006ELE
Level: 6
Credit Rating: 20
Weighting: 50%
Lecturer: Dr Zhigang Ji
Contact: If you have any issues with this coursework you may contact your lecturer.
Contact details are:
Email: [email protected]
Tel: 0151 231 2505
Room: 509a, James Parson Building, Byrom Street
Issue Date: 29 January 2018
Hand-in Date: 26 March 2018
Feedback: Feedback will be given when your coursework is returned to you within three
weeks. Feedback will be both written and verbal.
Programmes: BEng (Hons) Electrical and Electronics Engineering
School of Engineering,
Technology and Maritime Operations
mailto:[email protected]
Introduction
The objective is to design a taxi meter and simulate it using the Proteus ISIS. In this assignment, students
are required to
• Design the typical data acquisition system.
• Design the power supply to provide stable and specific voltage output.
• Analyze a hardware design problem and produce suitable design solution using microcontroller
and human/physical interfaces.
• Write program using assembly language for the microcontroller.
Learning Outcomes Assessed
LO3 Design and implement microprocessor based analogue and digital systems.
LO4 Design peripheral components for digital and analogue systems power supplies, bus structures,
memories and interfacing/signal processing circuits.
This assignment will assess elements of the above learning outcomes.
UK-SPEC Learning Outcomes
US1 Knowledge and understanding of scientific principles and methodology necessary to underpin
their education in their engineering discipline, to enable appreciation of its scientific and
engineering context, and to support their understanding of historical, current, and future
developments and technologies.
US2 Knowledge and understanding of mathematical principles necessary to underpin their education
in their engineering discipline and to enable them to apply mathematical methods, tools and
notations proficiently in the analysis and solution of engineering problems.
US3 Ability to apply and integrate knowledge and understanding of other engineering disciplines to
support study of their own engineering discipline.
E1 Understanding of engineering principles and the ability to apply them to analyse key engineering
processes.
E2 Ability to identify, classify and describe the performance of systems and components through the
use of analytical methods and modelling techniques.
E3 Ability to apply quantitative methods and computer software relevant to their engineering
discipline, in order to solve engineering problems.
E4 Understanding of and ability to apply a systems approach to engineering problems
D1 Investigate and define a problem and identify constraints including environmental and
sustainability limitations, health and safety.
As part of our team's enrollment for Data Science Super Specialization course under UpX Academy, we submitted many projects for our final assessments, one of them was Telecom Churn Analysis Model.
The input data was provided by UpX academy and language we used is R. As part of the project, our main objective was :-
-> To predict Customer Churn.
-> To Highlight the main variables/factors influencing Customer Churn.
-> To Use various ML algorithms to build prediction models, evaluate the accuracy and performance of these models.
-> Finding out the best model for our business case & providing executive Summary.
To address the mentioned business problem, we tried to follow a thorough approach. We did a detailed level Exploratory Data Analysis which consists of various Box Plots, Bar Plots etc..
Further we tried our best to build as many Classification models possible which fits our business case (Logistic Regression/kNN/Decision Trees/Random Forest/SVM) and also tried to touch Cox Hazard Survival analysis Model. Later for every model we tried to boost their performances by applying various performance tuning techniques.
As we all are still into our learning mode w.r.t these concepts & starting new, please feel free to provide feedback on our work. Any suggestions are most welcome... :)
Thanks!!
This presentation is on problem solving & design for students taking computer science [2210]. Unfortunately I can't give the full explanation here. For any suggestions or clarifications, you can mail me on buxooa72@gmail.com.
Identify and explain the problem-solving steps. • Compare/contrast ideas within algorithms (pseudo-code and Flowcharts) to apply logical thinking in problem-solving.
'A critique of testing' UK TMF forum January 2015 Georgina Tilby
This presentation draws upon the 'Critique of Testing' Ebook that was discussed at January's UK TMF forum. The slides explore the fundamental concepts of test case design and provide a detailed analysis of each method in terms of them.
C++ programming program design including data structures Ahmad Idrees
The aim of this list of programming languages is to include all notable programming languages in existence, both those in current use and ... Note: This page does not list esoteric programming languages. .... Computer programming portal ...
General overview of analytical models. Presentation covers, the following topics:
• What is analytical model?
• What are business requirements for the model?
• How to fulfill those requirements ?
Measure, Metrics, Indicators, Metrics of Process Improvement, Statistical Software Process Improvement, Metrics of Project Management, Metrics of the Software Product, 12 Steps to Useful Software Metrics
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
2. CONCEPTS DISCUSSED
• Fundamentals of testing:
Basic Definitions, Test Cases, Identifying Test
Cases, Fault Taxonomies, Levels of Testing,
Generalized Pseudocode, The Triangle
Problem, The NextDate Function, The
Commission Problem, The SATM System, The
Currency Converter, Saturn Windshield Wiper
Controller, Garage Door Opener
7. SAMPLE QUESTION(s)
• Explain about the various terminologies
involved in understanding the basic testing
concepts.
• List out the various testing terminologies and
explain it.
• Describe the life cycle of software testing with
suitable diagram.
9. INSIGHT FROM A VENN DIAGRAM
• Software view
– Code-based view Considers what it is
– Behavioral view Considers what it does
• Testing is fundamentally concerned with behavior
• Difficulty for tester
– the base documents are usually written by and for
developers
– the emphasis is therefore on code-based, instead of
behavioral, information
10. • Consider a universe of program behaviors
• Given a program and its specification, consider
– set S specified behaviors and
– set P programmed behaviors
• PROBLEMS FACED BY TESTER
What if certain specified behaviors have not been
programmed?
– Faults of omission
What if certain programmed (implemented) behaviors
have not been specified?
–Faults of commission
12. IDENTIFYING TEST CASES
• Two fundamental approaches aka traditional
testing methods are used to identify test cases
1. Functional Testing aka Specification-based
Testing aka Black Box Testing
2. Structural Testing aka Code-based Testing
aka White Box Testing
13. • Specification-based Testing
–program can be considered to be a function
that maps values from its input domain to
values in its output range
• How test cases are identified?
–With the information used is the
specification of the software
14. • Advantage of this approach / method:
– Independent of how the software is implemented,
so if the implementation changes, the test cases are
still useful; and
– test case development can occur in parallel with
the implementation thereby reducing the overall
project development interval
• Disadvantages
– significant redundancies may exist among test
cases
– Possibility of gaps of untested software
15.
16. • Code-based Testing
– Lends itself to the definition and use of test
coverage metrics
– Test coverage metrics provide a way to explicitly
state the extent to which a software item has been
tested
19. • Process refers to how we do something
• Product end result of a process
• The point at which testing and Software Quality
Assurance (SQA) meet is that SQA typically tries to
improve the product by improving the process.
• In that sense, testing is clearly more product oriented.
20. • Faults can be classified in several ways:
–the development phase in which the
corresponding
• error occurred,
• the consequences of corresponding failures,
• difficulty to resolve,
• risk of no resolution, and so on.
• Software Anomalies “a departure from the
expected” (IEEE)
31. • Draw the dataflow diagram for a structured
triangle program implementation.
• With a neat diagram, explain the currency
converter system.
• With a neat diagram, explain the SATM
system.
SAMPLE QUESTION(S)
32. • The Triangle problem
• The NextDate function
• The Commission problem
• The Automated Teller Machine
• The Currency Converter
• The Windshield-Wiper Controller
• Garage Door Opener
33. TRIANGLE PROBLEM – PROBLEM
STATEMENT
• Simple Version: The triangle program accepts three
integers, a, b, and c, as input. These are taken to be
sides of a triangle. The output of the program is the type
of triangle determined by the three sides:
Equilateral, Isosceles, Scalene, or Not A Triangle
34. • Improved Version: “Simple version” plus better
definition of inputs: The integers a, b and c must satisfy
the following conditions:
c1: 1<=a<=200 c4: a<=b+c
c2: 1<=b<=200 c5: b<=a+c
c3: 1<=c<=200 c6: c<=a+b
39. TRIANGLE PROBLEM CONT…
Final Version: “Improved version” plus better definition of outputs: If an
input value fails any of conditions c1, c2, or c3, the program notes this
with an output message. For example:
– “Value of a is not in the range of permitted values.”
– “Value of b is not in the range of permitted values.”
– “Value of c is not in the range of permitted values.”
If values of a, b, and c satisfy conditions c1, c2, and c3, one of four
mutually exclusive outputs is given:
1. If all three sides are equal, the program output is Equilateral.
2. If exactly one pair of sides is equal, the program output is Isosceles.
3. If no pair of sides is equal, the program output is Scalene.
4. If any of conditions c4, c5, and c6 is not met, the program
output is NotATriangle.
42. PROBLEM STATEMENT
NextDate is a function of three variables: month,
date, and year.
It returns the date of the day after the input date.
The month, date, and year variables have integer
values subject to these conditions:
c1: 1<= month <=12
c2: 1<=day<=31
c3: 1812<=year<=2012
43. NEXTDATE FUNCTION – PROBLEM
STATEMENT CONT…
• If any of conditions c1, c2, or c3 fails,
NextDate produces an output indicating the
corresponding variable has an out-of-range
value.
• For example:
– “Value of month not in the range 1..12”.
– Because numerous invalid day–month–year
combinations exist, NextDate collapses these into
one message: “Invalid Input Date.”
45. LEAP YEAR
• Any year that is evenly divisible by 4 is a leap year. For example:
1988, 1992, and 1996
However, there is still a small error that must be accounted for. To
eliminate this error, the Gregorian calendar stipulates that a year that is
evenly divisible by 100 (for example, 1900) is a leap year only if it
is also evenly divisible by 400. For this reason, the following years are
not leap years:
1700, 1800, 1900, 2100, 2200, 2300, 2500, 2600
• This is because they are evenly divisible by 100 but not by 400
The following years are leap years:1600, 2000, 2400
• This is because they are evenly divisible by both 100 and 400
46. 12 MONTHS OF THE YEAR
• The Gregorian calendar and the Julian calendar both consist of
the following twelve months:
1. January - 31 days
2. February - 28 days; 29 days in Leap Years
3. March - 31 days
4. April - 30 days
5. May - 31 days
6. June - 30 days
7. July - 31 days
8. August - 31 days
9. September - 30 days
10. October - 31 days
11. November - 30 days
12. December - 31 days
How many have 28, 30 or 31 days?
The Gregorian calendar has:
4 months with a length of 30 days
7 months that are 31 days long
February is the only month that is 28
days long in common years and 29 days
long in leap years
47.
48. Case 4: month is 2: 'February
If day < 28
Then tomorrowDay = day +1
Else
If day = 28
Then
If ((year is a leap year)
Then tomorrowDay = 29 'leap year
Else ‘not a leap year
tomorrowDay = 1
tomorrowMonth = 3
Endif
Else if day = 29
Then tomorrowDay = 1
tomorrowMonth = 3
Else Output (“Cannot have Feb”, day)
EndIf
EndIf
EndCase
Output (“Tomorrow’s date is “, tomorrowMonth, tomorrowDay, TomorrowYear)
End NextDate
49. THE COMMISSION PROBLEM
PROBLEM STATEMENT
A rifle salesperson in the former Arizona Territory sold rifle locks,
stocks, and barrels made by a gunsmith in Missouri.
Locks cost $45, stocks cost $30, and barrels cost $25.
The salesperson had to sell at least one complete rifle per month, and
production limits were such that most of the salesperson could sell in a
month was 70 locks, 80 stocks, and 90 barrels.
50. THE COMMISSION PROBLEM STATEMENT
CONT…
After each town visit, the salesperson sent a telegram to the Missouri gunsmith
with the number of locks, stocks, and barrels sold in that town.
At the end of a month, the salesperson sent a very short telegram showing –1
locks sold.
The gunsmith then knew the sales for the month were complete and computed
the salesperson’s commission as follows:
10% on sales up to (and including) $1000,
15% on the next $800, and
20% on any sales in excess of $1800
The commission program produced a monthly sales report that gave the total
number of locks, stocks, and barrels sold, the salesperson’s total dollar
sales, and, finally, the commission.
51. 10% on sales up to (and including) $1000,
15% on the next $800, and
20% on any sales in excess of $1800
Locks cost $45, stocks cost $30, and barrels
cost $25.
52. End Commission
10% on sales up to (and including) $1000,
15% on the next $800, and
20% on any sales in excess of $1800
54. SATM PROBLEM STATEMENT CONT…
• Using a terminal with features, SATM
customers can select any of the transaction
types: deposits, withdrawals, and balance
inquiries
• These transactions can be done on two types of
accounts: checking and savings
• The SATM system communicates with bank
customers via 15 screens (shown in figure)
55. SCREEN 1 – WELCOME SCREEN
• When the bank customer arrives at an SATM
station, SCREEN 1 is displayed
56. SCREEN 2 and SCREEN 4
• Bank customer accesses the SATM system with a
plastic card encoded with a Personal Account
Number (PAN) which is a key to an internal
customer account file, containing, among other
things, the customer account name and account
information
• If the customers’ PAN matches the information in
the customer account file, the system presents
screen 2 to the customer.
• If the customer’s PAN is not found, screen 4 is
displayed, and the card is kept.
57.
58. SCREEN 3 and SCREEN 5
• At Screen 2, the customer is prompted to enter his or her
Personal Identification Number (PIN)
• If the PIN is correct, the system displays Screen 5; otherwise
Screen 3 is displayed
59. SCREEN 4
• The customer has 3 chances to get the PIN
correct; after three failures, Screen 4 is
displayed, and the card is kept
60. SCREEN 6
• On entry to screen 5, the system adds two
pieces of information to the customer’s
account file, the current date and an
increment to the number of ATM sessions
• The customer selects the desired transaction
from the option shown on screen 5; then the
system immediately displays screen 6, where
the customer chooses the account to which the
selected transaction will be applied
61.
62. • If balance is requested, the system checks the
local ATM file for any unposted transactions
and reconciles these with the beginning
balance for that day from the customer account
file.
• Screen 14 is then displayed
68. PROBLEM STATEMENT
• The application converts US dollars to any of four
currencies:
– Brazilian Reals,
– Canadian Dollars,
– European Union Euros
– Japanese Yen
• Currency selection is governed by the radio buttons
which are mutually exclusive
• When a country is selected, the system responds by
completing the label; for examples, “Equivalent in…”
becomes “Equivalent in Canadian dollars” if the
Canada button is clicked
• Also, a small Canadian flag appears next to the output
position for the equivalent currency amount
69. PROBLEM STATEMENT CONT…
• Either before or after currency selection, the user inputs
an amount in US dollars
• Once both tasks are accomplished, the user can click on
the Compute button, the Clear button or Quit button
• Clicking on Compute button results in the conversion
of the US dollar amount to the equivalent amount in the
selected currency
• Clicking on the Clear button resets the currency
selection, the US dollar amount and the equivalent
currency amount and the associated label
• Clicking on the Quit button ends the application
71. • Windshield wiper is controlled by a lever with a dial
• The lever has four positions – OFF, INT (for intermittent),
LOW, and HIGH
• The dial has three positions, numbered simply 1, 2, and 3
• The dial position indicate three intermittent speeds, and
dial position is relevant only when the lever is at the INT
position
The decision table wiper speeds (in wipes per minute) for the lever and dial positions
72. PROBLEM STATEMENT CONT…
• The decision table below shows the windshield
wiper speeds (in wipes per minute) for the
lever and dial positions
74. Components :
A drive motor,
A drive chain,
The garage door wheel tracks,
A lamp, and
An electronic controller
75. A system to open a garage door is composed of several components: a drive
motor, a drive chain, the garage door wheel tracks, a lamp, and an electronic
controller. This much of the system is powered by commercial 110 V
electricity. Several devices communicate with the garage door controller—a
wireless keypad (usually in an automobile), a digit keypad on the outside of
the garage door, and a wall-mounted button. In addition, there are two safety
features, a laser beam near the floor and an obstacle sensor. These latter two
devices operate only when the garage door is closing. If the light beam is
interrupted (possibly by a pet), the door immediately stops, and then reverses
direction until the door is fully open. If the door encounters an obstacle while it
is closing (say a child’s tricycle left in the path of the door), the door stops and
reverses direction until it is fully open. There is a third way to stop a door in
motion, either when it is closing or opening. A signal from any of the three
devices (wireless keypad, digit keypad, or wall-mounted control button). The
response to any of these signals is different—the door stops in place. A
subsequent signal from any of the devices starts the door in the same direction
as when it was stopped. Finally, there are sensors that detect when the door has
moved to one of the extreme positions, either fully open or fully closed. When
the door is in motion, the lamp is lit, and remains lit for approximately 30
seconds after the door reaches one of the extreme positions.
76.
77. REFERENCE
• Paul C. Jorgensen: Software Testing, A
Craftsman’s Approach, 4th Edition, Auerbach
Publications, 2013.