SlideShare a Scribd company logo
1 of 18
Download to read offline
International Journal of Software Engineering and Its Applications
Vol. 10, No. 7 (2016), pp. 101-118
http://dx.doi.org/10.14257/ijseia.2016.10.7.10
ISSN: 1738-9984 IJSEIA
Copyright ⓒ 2016 SERSC
Testing Desktop Application: Police Station Information
Management System
Abdul Salam Shah1*
, Muhammad Fayaz2
, Asadullah Shah3
and Shahnawaz Shah4
1
SZABIST, Islamabad, Pakistan
2
University of Malakand, KPK, Pakistan
3
International Islamic University Malaysia (IIUM), Kuala Lumpur, Malaysia
4
University of Sindh, Jamshoro, Pakistan
1*
shahsalamss@gmail.com, 2
hamaz_khan@yahoo.com,
3
asadullah@iium.edu.my, 4
shahnawaz@usindh.edu.pk
Abstract
The police stations have adequate importance in the society to control the law and
order situations of the country. In Pakistan, police stations manage criminal records and
information manually. We have previously developed and improved a desktop application
for the record keeping of the different registers of the police stations. The data of police
stations is sensitive and that need to be handled within secured and fully functional
software to avoid any unauthorized access. For the proper utilization of the newly
developed software, it is necessary to test and analyze the system before deployment into
the real environment. In this paper, we have performed the testing of an application. For
this purpose, we have used Ranorex, automated testing tool for the functional and
performance testing, and reported the results of test cases as pass or fail.
Keywords: Automated Testing, Crime, Functional Testing, Police, Performance
Testing, Police Stations, Record Management, Ranorex, Test Cases
1. Introduction
The software developed for the Police Stations of Pakistan needs a proper assessment
of its functionalities. The developed application (software) will store data in an organized
form and searching of records will be easier as compared to the manual system. It also
enhances the efficiency of the Police without extra efforts required for record keeping and
accessing [1]. The improvement in the software quality is totally dependent on the level of
understanding of what the software is performing and how it is performing the tasks?
The better analysis and understanding of the development process of software plays
and important role in both; the scientific and practice area of software engineering [2].
The assessments can be classified into developer oriented, carried by developer and
customer oriented carried by the customer or third party [3-4]. Another dominant areas of
research in the software assessment are how to combine the metrics to get the higher level
of assessment value for the software and its processes? [5]. The analysis tools take less
time and cost, but they are not fully reliable, the expert based assessment takes place
manually and that takes too much time and higher cost. The professionalism and expertise
level of the experts are the key factors for the success of analysis [2]. The availability of
developer at the time of customer oriented assessment makes the assessment easier
because the developer understands the software better and can perform more analytical
evaluations [6-7].
However, the availability of developer during assessment has disadvantages. Often, the
developer might not want to tell the flaws of software to others due to his reputation [2].
*
Corresponding Author
International Journal of Software Engineering and Its Applications
Vol. 10, No. 7 (2016)
102 Copyright ⓒ 2016 SERSC
The comparison of developer and customer oriented assessment is not easier in terms of
the difficulty.
The assessment is also dependent upon the expertise of the people and the level of the
complexity of assessment [2, 8]. In human based assessment, there is also subjectivity
factor that needs to be minimized. The assessment from the developer has some factor of
bias too, but the assessment from the third party is free from the personal bias. The
personal assessment is important and cannot be neglected because the software is also
developed by human developers, not the machines or software and the humans can better
analyze it than others. Even some automated tools require personal attention and analysis
of every step to improve and maintain the quality of the software, so we cannot totally
rely upon the software assessment tools [2, 9].
The data of police is quite sensitive, so the developed application needs to be tested
properly, and before the deployment, it needs to pass almost 90% of the tests in order to
ensure reliability, security and functionality of the application. The critical components of
the application must be tested against as much as possible test cases. The test cases can be
from installation, login, and layout to complex functioning of the system like crime
register and its search options but here it will not be possible to perform the exhaustive
testing because it takes extra time [8-9].
In this study, we have performed the testing of important functionalities of developed
software for the police department which is not yet tested for the implementation in the
police stations [1]. The manual testing of the system takes time and extra effort to avoid
that we have used Ranorex which is an automated testing tool, further we have also used
manual testing wherever required.
The remaining paper is: in Section 2 literature review is presented, Section 3 discusses
some challenges, Section 4 Methodology, Section 5 Testing Tools Used, Section 6 testing
environment, Section 7 coding, Section 8 Verification and Validation Process, and finally
in Section 9 the conclusion of the study is provided.
2. Literature Review
Remencius et. al., in [2], have performed the assessment for Italian public
administrative applications and reported in the form of case study. The Italy
administration has provided software for the assessment in terms of security, quality and
performance. They have more concern to ensure that software is protected from
unauthorized access and only the authorized users can access their system data and the
system can handle 2000 clients at a time. The different components of software have to be
deployed on more than one servers and also two different databases i. e., Oracle and
MySQL. The software has been developed in Java. The assessment of the system was
carried out in the six parts and in agile like fashion; with feedbacks about the assessment
from the administration and ensuring that everything is according to their needs.
The assessment of the structure of code was performed in code metrics, which were
calculated with the static code analysis tool. The analysis was carried out by experts of
Java and JavaScript and the configuration of the system was also analyzed [10-11]. Some
automated assessment tools has been used, but the results were not reliable, that’s why
authors have used manual assessment.
The expert’s opinions were used, at the end, no serious issues were identified with the
spring framework code. In the case of ambiguities, the guesses were used and as well as
experts opinions. The assessment from the client side has been easier because of the best
practice guide from IBM. The major part of the analysis of Dojo Toolkit was also manual
and performed by the experts. The system has some issue with the speed; it performed
slower with the older versions of the internet explorer. The reason of slower speed can be
the code or other external or internal factors. The system has been tested against Mozilla,
Chrome, and Internet Explorer. To test performance of the system as per requirement of
International Journal of Software Engineering and Its Applications
Vol. 10, No. 7 (2016)
Copyright ⓒ 2016 SERSC 103
the administration as 2000 users live at the same time, Apache J-Meter has been used
[12]. Multiple distributed machines have been used for the testing, some performance
issues have been identified during stress testing. The experts have done assessment
manually, first, the detailed inspection of code has been carried out to detect the
configuration and design issues. Then, security exposures have been identified by sending
some unauthorized requests of data modification and introducing malicious activities with
the help of Apache J-Meter.
Sarigiannidis, et. al., in [13], have carried out a study on software development projects
for the investigation of the relationship between people quality, process quality, and risk.
The structural modeling techniques were used to analyze the empirical data. The people
quality has a negative impact on the project risk level as concluded from the main results
of the study. On the other side, the process quality has slightly limited effects, the only
risk due to the project team.
The software’s success depends on its quality, effectiveness, and completeness. The
management of the software development projects is quite difficult besides the issue of
the quality of the software, the software's incorporate complex characteristic, the same are
not associated with other projects of different fields of study. The software has risk
associated like budget overrun, delays in the projects, weakness to respond the
requirements of the users [14].
The study has been carried on the 220 different Greek software related companies that
are developing different projects in the country. The participating companies had to
choose the project under development at that time, also the other important requirement
that they have to tell about the human resource involved in that project. The process
quality and people quality were used to measure the total project quality. The research
depends on different kind of data collected from different nature of projects teams having
different characteristics, which covered several perspectives of people with dissimilar
levels of responsibilities in the development process. Among the all factors the software
requirements have the highest exposure to risk and the organizational environment at the
lowest level. These findings of the study suggest that the proper training of staff and
communication with their personnel and proper staffing according to the skills of staff
must be ensured in the software companies of Greek.
Zhi et. al., in [15] have summarized the published literature of software documentation
cost, benefit, and quality. The literature has been selected by systematic mapping
technology. The investigation of the document like requirement, design, implementation
and test, in addition, the code comments were carried out. The time that has been
consumed during software development and the effort of the software development team
are referred here as the cost of the project. The major cost driver during the software
development process is the efforts consumed in documentation.
The artifact which is developed requires enough amount of cost in terms of time and
other facts, the same artifact should be used for the development and maintenance phase
otherwise the cost spent on it will be useless and is a huge loss. The benefits of an artifact
can be mentioned in terms of reduction in the duration of the task, improvement in the
quality of code, increase the productivity, but not limited to these can be of any type of
improvements related to software development. They have targeted on the documents of
development phase in terms of cost, benefit and quality. The study has focused on the
development documentation. The documents about the software structure known as
architecture documentation, are considered as the type of design, which define that how
the system will be built and the other technical details about the software.
The total number of 69 papers in the relevant field has been selected. The relationship
model was derived between the entities during the documentation process for the analysis
of cost or benefit of documentation. The development and maintenance tasks are
performed by the practitioner, the tasks consume a particular amount of effort that can be
measured in units that can be considered as an attribute of the task. The task is further
International Journal of Software Engineering and Its Applications
Vol. 10, No. 7 (2016)
104 Copyright ⓒ 2016 SERSC
divided into pre-maintenance and maintenance tasks. The maintenance tasks can be
further divided into corrective, perfective, adaptive and preventive maintenance tasks.
Each maintenance task is further divided into two steps as comprehension of the program
and subsequent manipulation of modification. The typical document management system
of infrastructure to access software documents is mostly utilized by software practitioner
for easiness of the management of the documents. It is understood that the well-
structured documents are easier to read as compared to the unstructured and fuzzy
documents, that why the documents structure has the direct impact on the quality of the
document.
The papers, authors have considered objects, related to the software systems and other
human-related subjects.
3. What are the Challenges?
The developed application will be installed on the Microsoft windows based systems
because most of the police stations in Pakistan use Microsoft windows and the system is
developed keeping in view of the current scenario of the police stations to avoid extra
expenses of buying new computers. The windows vary from windows XP, windows 7,
windows 8 to windows 10 that causes the testing difficult further the manual testing takes
a lot of effort and time the same needs to be automated. The automation is not easier due
to the diverse functionalities of the system but much functionality can be automated. The
problems of installation and graphical appearance may vary from windows to windows.
Further, the windows can be 32 bit to 64 bit. The testing execution can be a great
challenge on various platforms due to limited resources.
4. Methodology
The test automation activities can be best summarized in the Figure 1 which is
basically taken from the web [16].
Figure 1. Flow of Automated Testing Activities
Here we have tried to follow the guidelines of the above steps of the Figure 1, the
proposed methodology of the paper can be described as:
1. Prioritizing Test Cases
2. Dividing Test Cases into Different Categories
3. Selection of Testing Tool and Testing Environment
International Journal of Software Engineering and Its Applications
Vol. 10, No. 7 (2016)
Copyright ⓒ 2016 SERSC 105
4. Coding and Simulation
5. Perform the Validation and Verification
4.1. Prioritizing Test Cases
The developed software for police station supports these main functionalities:
 Forms having different text fields.
 Sub-windows.
 Interaction of application with database.
 Search functionality with different criteria and display results.
The standard test scenarios for a desktop application has been tried as per functionality
of the application, the checklist is taken from the [17-18], as per requirement and
functionality of the developed application.
4.2. General Test Scenarios
 The mandatory fields must be validated and denoted by an asterisk ‘*’ symbol.
 The validation errors must be displayed at the correct position via a message.
 The first entry of drop-down fields must be blank or ‘Select’.
 The application must ask for confirmation before deleting any record.
 All field must be set to default values on the click of the reset button.
 The maximum field values for input fields must be checked.
 The values crossing maximum limit must generate a warning message and the
database should not store these values.
 Ensure all input fields for the special characters.
 Standard style for field labels should be ensured.
 The forms must be spell checked for grammatical mistakes.
 The functionality of buttons on all forms must be checked.
 The double submission of the form must be restricted.
4.3. Graphical User Interface (GUI) and Usability Test Scenarios
 The fields of forms must be well aligned.
 The scroll bar must be enabled when required.
 The style, size, and color of fonts used in the forms must be standard.
 The fields which are disabled must be grayed and click option disabled.
 The mouse pointer must change to the cursor when to click on the text field.
 The user must not be able to manually type any text into the drop down lists.
 In the case of form submission error, the filled information must remain intact.
 After corrections, the user must be able to submit the form again.
 The values of the dropdown field must be in sorted order.
 In the case of error, the correct form fields must be highlighted.
 The confirmation message for update or delete should be displayed.
 Only one radio option should be selected and multiple check boxes.
 For the invalid values of filter criteria, proper messages should be displayed.
4.4. Test Scenarios for Result Grid
 The resulting grid should display the parameters which are searched.
 The grid must display the number of results retrieved.
 The criteria of search during searching must be displayed on result grid.
 The specified columns with correct values must be included by result grids.
International Journal of Software Engineering and Its Applications
Vol. 10, No. 7 (2016)
106 Copyright ⓒ 2016 SERSC
 The column and rows of result grid must be displayed with proper spacing.
 The resulting grid should exclude the duplicate records.
 The data of dynamic columns must be checked.
4.5. Test Scenarios for a Window
 The default size of the window must be checked.
 The child windows must be checked for getting closed on the close of a parent
window.
 When the child window is open, the user cannot use the parent window.
 Minimize, maximize and close functionality of windows must be checked.
 The re-size ability of windows must be checked.
 The scroll bar functionality, of the window, must be checked.
 The cancel functionality of child windows must be checked.
4.6. Database Testing Test Scenarios
 The data must be cross checked that either database is saving it correctly or not.
 The columns which are not accepting null values must be checked.
 The integrity of data must be checked.
 The primary key column of tables must be checked.
 The log of every operation must be maintained.
 The indexes should be added for tables of the database.
 The data should be committed to the database in case of successful operation only.
 Ensure that the database is saving radio button and dropdown lists properly.
 Check the data type and data length of database fields.
 Check that Primary key, foreign key of tables are applied correctly.
 Check that Primary key column should not be Null.
5. Testing Tool Used
The Ranorex is a product by GmbH for test automation that has the functionality of the
testing desktop, web-based and mobile applications. The Ranorex uses the programming
languages such as C# and VB.NET as a base and it does not have any self-scripting
language. The code completion, debugging and testing of the project has been made
possible with Ranorex Studio. The user can carry test automation in a specific
environment as per requirement. The Ranorex supports acceptance testing, test
automation, functional testing, black box testing, GUI testing, mobile application testing,
web testing, regression testing, Java testing, data-driven testing, keyword-driven testing
and cross-platform testing source [19-21].
6. Testing Environment
The testing was carried out with the following software, hardware specification and
other additional resources.
Processor: i3-2310M CPU @ 2.10 Ghz
RAM: 8.00 GB
System Type: 64bit
Operating System: Windows 10 Professional
Development Environment: VB.NET 2010
Automated Testing Tool: Ranorex
International Journal of Software Engineering and Its Applications
Vol. 10, No. 7 (2016)
Copyright ⓒ 2016 SERSC 107
7. Coding
The coding of some important test is provided here like the username and password
validation, search module and add entry module. The authors have not contributed in
terms of coding the same has been taken from [22].
7.1. Username and Password Validation:
Namespace Police Station Project
Public Partial Class Login
Private Sub Init ()
End Sub Public Sub Click On Password Field ()
Report. Log (Report Level. Info, "Mouse", " Mouse Left Click item’ Login Form.
Tab_Page_List. Input_Fields. Text_Password’ at 175;9. ",
Repo. Login Form. Tab_Page_List. Input_Fields. Text_Password_Info )
Repo. Login Form. Tab_Page_List. Input_Fields. Text_Password. Click (" 175;9 ")
End Sub
End Class
End Namespace
Public Sub Login Form ( a Title As String , a Username As String , a Password As
String )
Repo. Login Form. Title. TextValue = aTitle
Repo. Login Form. Username. TextValue = aUsername
Repo. Login Form. Password. TextValue = aPassword
Repo. Login Form. Repeat Password. TextValue = aPassword
End Sub
7.2. Search Module:
Public Sub ValidateTextValue (repository item As Ranorex. Adapter, val As String)
Keyboard. Press ( repository item, val)
Validate. Are Equal (repository item. [ As ](of Ranorex . Text) (). TextValue , val )
Report. Screenshot ( repository item, True )
End Sub
Const NullString As String = "( null )"
Public Sub Validate_Database Field (OLEConnectionString As String, SQLQuery
As String, expectedValue As String, customLogMessage As String )
If OLE Connection String. Trim (). Equals (String. Empty) Or Else OLE Connection
String. Trim (). Equals (NullString) Then
Throw New Ranorex. RanorexException ("Connection String is empty")
End If
If SQLQuery. Trim (). Equals (String. Empty) Then
Throw New Ranorex. RanorexException ("SQLQuery is empty")
End If
As New OleDbConnection (OLE Connection String)
connection. Open ()
Dim command As OleDbCommand = Nothing
Dim SQLReader As OleDbDataReader = Nothing
Try command = New OleDbCommand (SQLQuery, connection)
SQLReader = command. ExecuteReader ()
SQLReader. Read ()
If SQLReader . FieldCount > 0 Then
Dim actualValue = SQLReader. GetString (0)
If customLogMessage . Trim () . Equals ( String. Empty ) Then
International Journal of Software Engineering and Its Applications
Vol. 10, No. 7 (2016)
108 Copyright ⓒ 2016 SERSC
customLogMessage = " Actual value = ’{0} ’ , expected value = ’{1} ’ ( database
query = " & SQLQuery & ") "
End If
Ranorex. Validate. AreEqual (actualValue , expectedValue , customLogMessage )
Else Throw New Ranorex . RanorexException (String . Format ("SQL statement did
not return any results : {0} ", SQLQuery ))
End If
Finally
command. Dispose ()
SQLReader. Dispose ()
End Try
End Using
End Sub
8. Verification and Validation Process
Requirements for RE-001:
There should be a login screen for the Police Official/Officer through which he can
login to the system and can use it for inserting/deleting/updating record.
1. A login screen should contain a form for Sign In and a link for new user to register.
The password reset option should not be there.
2. A Login button and Exit Button should be placed at the right side on the screen
below the form fields.
3. The login name for the customer should be email address registered during account
creation or username the administrator assigned him.
4. The password length must be eight characters long in which at least two digits and
one special symbol are mandatory. Password cannot be all the digits and also the
username or email address of the person.
The functionality of stay login should not be implemented and system will
automatically request for password if system not used for 15 minutes.
Verification for RE-001:
There should be a login screen for user through which he can login to the system and
view/update/delete data. The login Screen should have two options i.e., one for Sign In
whiles other for Sign Up. A Login button and Sign Up button and Exit button should
be place on the right place on the screen below the form fields. The login name for the
customer should be email address or CNIC No registered during account creation. The
password length must be eight characters long in which two digits and one special symbol
are mandatory. On login screen there should be an option to change password. The
functionality of stay login should not be implemented. All Function buttons must be
located on left side of Login form.
Table1. Requirement Checklist of RE-001
No Requirements Status
1 Login & Sign Up Buttons 
2 Function Buttons 
3 Stay Login X
4 Reset Password 
International Journal of Software Engineering and Its Applications
Vol. 10, No. 7 (2016)
Copyright ⓒ 2016 SERSC 109
Validation of RE-001:
For the validation of RE-001 we have performed testing. For a given scenario we have
executed Five test cases among them two are valid and three un-valid. All test cases were
carried out on Login Form only.
Table 3. Test Case T-1-1
Test Case ID T-1-1 Designed By QA Engineer
Test Case Title Login with valid user
name and password.
Executed By Test Engineer
Module Name Police officer login.
Priority High Execution Date 05/12/2015
Pre-Conditions The user has valid combination of Email and Password.
Dependencies A user must Sign-Up before login.
Steps Test Data Expected
Result
Actual
Result
Status
1. Launch the
application.
2. Navigate to
the login page.
3. Provide valid
Email.
4. Provide valid
password.
5. Click on login
button.
Email:
shahsalamss@gmail.com
Password:
test#123
If user has
entered
correct user
name and
password the
application
must allow
him to login
successfully.
The user has
successfully
login.
Pass
Post-Condition The user has successfully login to the system and directed
towards the main screen of the application.
Suggestion The authentic user must create account for login.
Table 4. Test Case T-1-2
Test Case ID T-1-2 Designed By QA Engineer
Test Case Title Login with valid user
name & password
Executed By Test Engineer
Module Name Police officer login
Priority High Execution Date 05/12/2015
Pre-Conditions The user has valid CNIC & Password.
Dependencies A user must Sign-Up before login.
Steps Test Data Expected
Result
Actual
Result
Status
1. Launch the
application.
2. Navigate to
the login
page.
3. Provide valid
CNIC
number.
4. Provide valid
password.
5. Click on
CNIC:
61101-8447560-9
Password:
test#123
If user has
entered
correct CNIC
and password
the
application
must allow
him to login
successfully.
The user has
successfully
login.
Pass
International Journal of Software Engineering and Its Applications
Vol. 10, No. 7 (2016)
110 Copyright ⓒ 2016 SERSC
login button.
Post-Condition The user has successfully login to the system and directed towards
the main screen of the application.
Suggestion The authentic user must create account for login.
Table 5. Test Case T-1-3
Test Case ID T-1-3 Designed By QA Engineer
Test Case Title Login with invalid user
name and password
Executed By Test Engineer
Module Name Police officer login
Priority Critical Execution Date 05/12/2015
Pre-Conditions User has invalid Email & Password.
Dependencies A user must not Sign-Up before Login.
Steps Test Data Expected
Result
Actual
Result
Status
1. Navigate to
the login
page.
2. Invalid
Email.
3. Invalid
Password.
4. Click on
login button.
Email:
Shahsalamss#gamil.com
Password:
test123
User should
not be able to
login.
User cannot
login to the
system.
Pass
Post-Condition User did not login to the system.
Suggestion A message should be displayed which describe that username or
password you have entered is incorrect.
Table 6. Test Case T-1-4
Test Case ID T-1-4 Designed By QA Engineer
Test Case Title Login with Invalid user
name & password Test
Executed By Test Engineer
Module Name Police Officer Login
Priority Critical Execution Date 05/12/2015
Pre-Conditions User has Invalid CNIC and Password.
Dependencies A user must not Sign-Up before Login.
Steps Test Data Expected
Result
Actual
Result
Status
1. Navigate to
the login page.
2. Invalid Email.
3. Invalid
Password.
4. Click on login
button.
Email:
61101-825u25
Password:
test123
User should
not be able to
login.
User failed
to login to
the system.
Pass
Post-Condition User did not login to the system.
Suggestion A message should be displayed which describe that username or
password you have entered is incorrect.
International Journal of Software Engineering and Its Applications
Vol. 10, No. 7 (2016)
Copyright ⓒ 2016 SERSC 111
Table 7. Test Case T-1-5
Test Case ID T-1-5 Designed By QA Engineer
Test Case Title Login with empty
username & Password
Test
Executed By Test Engineer
Module Name Police Officer Login
Priority High Execution Date 05/12/2015
Pre-Conditions Both fields are empty.
Dependencies A user must not Sign-Up before Login.
Steps Test Data Expected
Result
Actual
Result
Status
1. Navigate to
the login
page.
2. Do not enter
any value in
username &
password
field.
3. Click on login
button.
Email:
Password:
User should
not be able to
login.
User failed
to login to
the system.
Pass
Post-Condition User failed to login and a message generated that user name and
password are empty.
Requirements for RE-002:
There should be a main screen for the Police Official/Officer through which he can use
it for inserting/deleting/updating record and searching.
1. A main screen should contain a form for navigation which contains buttons on the
left side.
2. The data grid must be there.
3. A search box must be there with a search button at the right side on the screen after
the search box.
4. The Buttons which leads to the other forms must be on the left side of the screen,
also the buttons of update, delete edit must also be there at every form.
5. The search criteria should be with the FIR number and CNIC.
Verification for RE-002:
There should be a main screen for user through which he can access the system and
navigate easily to the system and view/update/delete data. The main Screen should a
search box and search button. A Function buttons and Navigation buttons should be
place on the left place on the screen before the form fields. Data Grid must be there to
display the search results of the queries. The Search criteria should be strict to the FIR
Number and CNIC only. All Function buttons must be located on left side of main
form.
International Journal of Software Engineering and Its Applications
Vol. 10, No. 7 (2016)
112 Copyright ⓒ 2016 SERSC
Table 2. Requirement Checklist of RE-002
No Requirements Status
1 Buttons at Left Side 
2 Data Grid 
3 Search Box 
4 Navigation Buttons 
5 Search Criteria With FIR Number and CNIC 
Validation of RE-002:
For the validation of RE-002 we have performed testing. For a given scenario we
have executed Ten test cases among them Eight are valid and two un-valid. All test
cases were carried out on Main Form only.
Table 8. Test Case T-2-1
Test Case ID T-2-1 Designed By QA Engineer
Test Case Title Search With Valid FIR
No
Executed By Test Engineer
Module Name FIR Search
Priority High Execution Date 05/12/2015
Pre-Conditions User have Valid FIR No
Dependencies Against Each FIR Data must be stored to be displayed
Steps Test Data Expected
Result
Actual
Result
Status
1. Navigate to
the main
page.
2. Launch the
FIR Search
Screen
All FIR’s data stored in
database.
The Data of
Each FIR
should
appear in the
Grid i.e.
name,
number,
CNIC etc.
The Data of
Each FIR
appearing
with details
Pass
Post-Condition FIR data displayed.
Table 9. Test Case T-2-2
Test Case ID T-2-2 Designed By QA Engineer
Test Case Title Search With Valid CNIC
No
Executed By Test Engineer
Module Name FIR Search
Priority High Execution Date 05/12/2015
Pre-Conditions User have valid CNIC Number of person who filled FIR.
Dependencies Against Each FIR Data must be stored to be displayed.
Steps Test Data Expected
Result
Actual
Result
Status
1. Navigate to
the main
page.
2. Launch the
FIR search
screen.
All FIR’s data stored in
database.
The data of
each FIR
should
appear in the
grid i.e.
name,
The data of
each FIR
appearing
with details.
Pass
International Journal of Software Engineering and Its Applications
Vol. 10, No. 7 (2016)
Copyright ⓒ 2016 SERSC 113
number,
CNIC etc.
Post-Condition FIR data displayed.
Table 10. Test Case T-2-3
Test Case ID T-2-3 Designed By QA Engineer
Test Case Title Search With Invalid FIR
No
Executed By Test Engineer
Module Name FIR Search
Priority Critical Execution Date 05/12/2015
Pre-Conditions User has Invalid FIR No.
Dependencies Against Each FIR Data must be stored to be displayed.
Steps Test Data Expected
Result
Actual
Result
Status
1. Navigate to
the main
page.
2. Launch the
FIR Search
Screen
All FIR’s data stored in
database.
The Data of
FIR should
not appear in
the Grid
The Data of
FIR not
appearing in
the Grid
Pass
Post-Condition FIR data not displayed.
Suggestion A message should be displayed which describe that FIR No. or
CNIC you have entered is incorrect.
Table 11. Test Case T-2-4
Test Case ID T-2-4 Designed By QA Engineer
Test Case Title Search With Invalid
CNIC No
Executed By Test Engineer
Module Name FIR Search
Priority Critical Execution Date 05/12/2015
Pre-Conditions User have Invalid CNIC
Dependencies Against Each FIR Data must be stored to be displayed
Steps Test Data Expected
Result
Actual
Result
Status
1. Navigate to
the main
page.
2. Launch the
FIR Search
Screen.
All FIR’s data stored in
database.
The Data of
FIR should
not appear in
the Grid.
The Data of
FIR not
appearing in
the Grid
Pass
Post-Condition FIR data not displayed.
Suggestion A message should be displayed which describe that FIR No. or
CNIC you have entered is incorrect.
Table 12. Test Case T-2-5
Test Case ID T-2-5 Designed By QA Engineer
Test Case Title Buttons Functionality Executed By Test Engineer
Module Name Crime Register Button
Priority High Execution Date 05/12/2015
Pre-Conditions Buttons should be active
Dependencies Against each important functionality the buttons should be added.
International Journal of Software Engineering and Its Applications
Vol. 10, No. 7 (2016)
114 Copyright ⓒ 2016 SERSC
Steps Test Data Expected
Result
Actual
Result
Status
1. Launch the
Application
2. Click on
Crime
Register
button
3. Enter any
Data
Buttons and their codding Upon button
click the user
should be
moved to a
desired form
Upon click
no desired
form opened Failed
Post-Condition The desired crime register form should appear on screen.
Suggestion There should be problem with the codding.
Table 13. Test Case T-2-6
Test Case ID T-2-6 Designed By QA Engineer
Test Case Title Buttons Functionality Executed By Test Engineer
Module Name Police Station Button
Priority High Execution Date 05/12/2015
Pre-Conditions Buttons should be active
Dependencies Against each important functionality the buttons should be added
Steps Test Data Expected
Result
Actual
Result
Status
1. Launch the
Application
2. Click on
Police Station
button
3. Enter any
Data
Buttons and their
codding.
Upon button
click the user
should be
moved to a
desired form
Upon click
the desired
Police
Station form
opened
Pass
Post-Condition The desired Police Station form should appear on screen.
Table 14. Test Case T-2-7
Test Case ID T-2-7 Designed By QA Engineer
Test Case Title Menu Items Executed By Test Engineer
Module Name Menu
Priority High Execution Date 05/12/2015
Pre-Conditions Menu Items Should be added.
Dependencies Against each important functionality the Menu Item should be
added
Steps Test Data Expected
Result
Actual
Result
Status
1. Launch the
Application.
2. Go to Menu.
Menu Items Upon Menu
Item click the
user should
be moved to
a desired
functionality/
Form
Upon click
the desired
Menu Item
form opened
Pass
Post-Condition Desired menu Item open.
International Journal of Software Engineering and Its Applications
Vol. 10, No. 7 (2016)
Copyright ⓒ 2016 SERSC 115
Table 15. Test Case T-2-8
Test Case ID T-2-8 Designed By QA Engineer
Test Case Title Add Button Executed By Test Engineer
Module Name Record Add functionality
with all mandatory fields
filled
Priority Critical Execution Date 05/12/2015
Pre-Conditions Add button should be present and active on form.
Dependencies Proper Table must be present in database
Steps Test Data Expected
Result
Actual
Result
Status
1. Launch the
Application.
2. Click on the
Add Button.
3. Type data in
text fields.
Add Button and Its
codding.
The Record
must be
added into
table with
proper
message via
dialog box.
The record
successfully
added into
database.
Pass
Post-Condition Record added and message of record inserted appeared on screen.
Table 16. Test Case T-2-9
Test Case ID T-2-9 Designed By QA Engineer
Test Case Title Add Button Executed By Test Engineer
Module Name Record Add functionality
with some empty
mandatory fields filled
Priority Critical Execution Date 05/12/2015
Pre-Conditions Add button should be present and active on form.
Dependencies Proper table must be present in database
Steps Test Data Expected
Result
Actual
Result
Status
1. Launch the
Application.
2. Click on the
Add Button.
3. Type data in
text fields
with some
empty fields.
Add Button and Its
codding
The Record
must not be
added into
table with
proper
message via
dialog box.
The record
not added
into
database.
Pass
Post-Condition Record not added and message of missing fields displayed.
Table 17. Test Case T-2-10
Test Case ID T-2-10 Designed By QA Engineer
Test Case Title Delete Button Executed By Test Engineer
Module Name Record Delete
functionality
Priority Critical Execution Date 05/12/2015
Pre-Conditions Delete button should be present and active on form.
Dependencies Proper Table must be present in database with data
Steps Test Data Expected Actual Status
International Journal of Software Engineering and Its Applications
Vol. 10, No. 7 (2016)
116 Copyright ⓒ 2016 SERSC
Result Result
1. Launch the
Application.
2. Select the FIR
No.
3. Click Crime
Delete Button.
Delete Button and Its
codding.
The Record
must be
deleted with
proper
message via
dialog box.
The record
not deleted.
Failed
Post-Condition Record not deleted and message of failure displayed.
9. Conclusion
The developed system will help a lot to maintain the record of police station, although it
is not a complete system, still some improvements are needed in the developed components
and there is a need to add some additional necessary components. Further, all the registers
are not digitized, this system covered few important registers which have more use in daily
routine crime cases and are most frequently used. The proper testing of the software is
important that enhances the quality of the software. The testing of important components
has been carried out but further testing is required for the improvement. It is concluded that
the developed software is efficient, reliable, portable and user-friendly and can be easily
implemented in police stations as a trial basis and system can be further improved after
identification of the problems during implementation in real environment and real data of
Police stations.
References
[1] A. S. Shah, M. Fayaz, A. Shah and S. Shah, “An Application Development for Record
Keeping of Police Stations in Pakistan”, Journal of Scientific Research and Advances, vol. 2,
no. 4, (2015), pp. 144-150.
[2] T. Remencius, A. Sillitti and G. Succi, “Assessment of Software Developed by a Third-Party: A Case
Study and Comparison”, Information Sciences, vol. 328, (2016), pp. 237-249.
[3] I. D. Coman and A. Sillitti, “An Empirical Exploratory Study on Inferring Developers Activities from
Low-Level Data”, In: Proceedings of the 19th
International Conference on Software Engineering and
Knowledge Engineering (SEKE), Boston, MA, USA, (2007).
[4] G. L. Kovács, S. Drozdik, P. Zuliani and G. Succi, “Open Source Software for the Public
Administration”, In: Proceedings of the Sixth International Workshop on Computer Science and
Information Technologies, Budapest, Hungary, (2004).
[5] K. Mordal, N. Anquetil, J. Laval, A. Serebrenik, B. Vasilescu and S. Ducasse, “Software Quality
Metrics Aggregation in Industry”, Journal of Software Evolution Process, vol. 25, no. 10, (2013), pp.
1117–1135.
[6] G. Garousi, V. Garousi, G. Ruhe, J. Zhi, M. Moussavi and B. Smith, “Usage and Usefulness of
Technical Software Documentation: An Industrial Case Study”, Information and Software Technology,
vol. 57, (2015), pp. 664-682.
[7] G. Garousi, V. Garousi, M. Moussavi, G. Ruhe and B. Smith, “Evaluating Usage and Quality of
Technical Software Documentation: An Empirical Study”, In: Proceedings of the 17th
International
Conference on Evaluation and Assessment in Software Engineering, New York, (2013), pp. 24-35.
[8] J. M. Memon, A. Khan, A. Baig and A. Shah, “A Study of Software Protection Techniques”,
Innovations Advanced Techniques in Computer and Information Sciences and Engineering, Springer
Netherlands, (2007), pp. 249-253.
[9] A. Shah, A. Raza, B. Hassan and A. S. Shah, “A Review Of Slicing Techniques In Software
Engineering”, In: International Conference on Engineering and Technology, Srilanka, (2015)
March 17-18, pp. 1-15.
[10] Spring Framework, http://spring.io/. Retrieved 2016-06-09.
[11] E. Petrinja, A. Sillitti and G. Succi, “Comparing OpenBRR, QSOS, and OMM Assessment Models”, In:
Proceedings of the Sixth International Conference on Open Source Systems (OSS 2010), Notre Dame,
IN,USA, (2010), pp. 224-238.
[12] http://jmeter.apache.org/ Retrieved 2016-02-07.
[13] L. Sarigiannidis, and P.D. Chatzoglou, “Quality VS Risk: An Investigation of Their Relationship in
Software Development Projects”, International Journal of Project Management, vol. 32, no. 6, (2014),
pp. 1073-1082.
International Journal of Software Engineering and Its Applications
Vol. 10, No. 7 (2016)
Copyright ⓒ 2016 SERSC 117
[14] L. Sarigiannidis and P. Chatzoglou, “Software Development Project Risk Management: A New
Conceptual Framework”, Journal of Software Engineering and Applications, vol. 4, no. 5, (2011), pp.
293-305.
[15] J. Zhi, V. Garousi-Yusifo-glu, B. Sun, G. Garousi, S. Shahnewaz and G. Ruhe, “Cost, Benefits and
Quality of Software Development Documentation: A Systematic Mapping”, Journal of Systems and
Software, vol. 99, (2015), pp. 175-198.
[16] http://www.ranorex.com/blog/how-to-automate-your-tests-without-programming-skills-preparation/
Retrieved 2016-06-09.
[17] https://www.linkedin.com/pulse/180-sample-test-cases-testing-web-desktop-tushar-singhal Retrieved 07/02/2016.
[18] http://www.softwaretestinghelp.com/sample-test-cases-testing-web-desktop-applications/ Retrieved 07/02/2016.
[19] http://www.ranorex.com/Documentation/Ranorex-Tutorial.pdf.
[20] https://en.wikipedia.org/wiki/Ranorex. Retrieved 2016-02-06.
[21] "Ranorex – UI Test Automation Tool for Professionals Award". QA Testing Tools. Retrieved 2016-02-
06.
[22] http://www.ranorex.com/support/user-guide-20/code-examples.html.
Authors
Abdul Salam Shah, has completed MS degree in Computer
Science from SZABIST, Islamabad, Pakistan in 2016. He did his BS
degree in Computer Science from Isra University Hyderabad, Sindh
Pakistan in 2012. In addition to his degree, he has completed short
courses and diploma certificates in Databases, Machine Learning,
Artificial Intelligence, Cybercrime, Cybersecurity, Networking, and
Software Engineering. He has published articles in various journals
of high repute. He is a young professional and he started his career in
the Ministry of Planning, Development and Reforms, Islamabad
Pakistan. His research area includes Machine Learning, Artificial
Intelligence, Digital Image Processing and Data Mining.
Mr. Shah has contributed in a book titled "Research
Methodologies; an Islamic perspectives," International Islamic
University Malaysia, November, 2015.
Muhammad Fayaz, is currently perusing Ph.D. in Computer
Science from, JEJU National University, South Korea. Before joining
the JEJU National University, he has also completed the course work
of Ph.D from University of Malakand, Chakdara, KPK, Pakistan. He
received MS in Computer Science from SZABIST, Islamabad,
Pakistan in 2014. He did MSC from the University of Malakand,
KPK, Pakistan in 2011.
Asadullah Shah is working as Professor and Head of department
of Information Systems (HOD) at the Kulliyyah of ICT, International
Islamic University Malaysia (IIUM) before joining IIUM, he worked
as Head of Telecommunication Engineering & Management
department, IoBM Karachi Sindh, Dean Faculty of Computer and
Management Sciences, Isra University Hyderabad Sindh and Head of
Telecommunication Engineering and IT, Sukkur IBA, Sindh-Pakistan.
He did his Ph.D. from the university of Surrey UK, in 1998, with
the specialization in Multimedia Communication. He started his
academic carrier from University of Sindh Jamshoro, Pakistan in
1986 as a lecturer.
International Journal of Software Engineering and Its Applications
Vol. 10, No. 7 (2016)
118 Copyright ⓒ 2016 SERSC
He has published 200 research articles in highly reputable
international and national journal in the field of computers,
communication and IT. Also, he has published 12 books in his 30
years of the academic carrier. Currently he is supervising great
number of postgraduate students, working in multiple disciplines,
specially, animation, social media and image processing in the
Department of Information Systems, Kulliyyah of Information and
Communication Technology, International Islamic University
Malaysia.
Shahnawaz Shah is working as Lecturer at the Institute of Information and
Communication Technology, University of Sindh, Jamshoro, Pakistan. He is also
pursuing M.Phil. Degree in Telecommunication from the University of Sindh, Jamshoro,
Pakistan. He did his BS degree in Telecommunication from University of Sindh,
Jamshoro, Pakistan, in 2007.

More Related Content

What's hot

Volume 2-issue-6-1983-1986
Volume 2-issue-6-1983-1986Volume 2-issue-6-1983-1986
Volume 2-issue-6-1983-1986Editor IJARCET
 
Developing software analyzers tool using software reliability growth model
Developing software analyzers tool using software reliability growth modelDeveloping software analyzers tool using software reliability growth model
Developing software analyzers tool using software reliability growth modelIAEME Publication
 
IRJET- Factors Affecting the Delivery of Quality Software and their Relations...
IRJET- Factors Affecting the Delivery of Quality Software and their Relations...IRJET- Factors Affecting the Delivery of Quality Software and their Relations...
IRJET- Factors Affecting the Delivery of Quality Software and their Relations...IRJET Journal
 
IRJET-A Review of Testing Technology in Web Application System
IRJET-A Review of Testing Technology in Web Application SystemIRJET-A Review of Testing Technology in Web Application System
IRJET-A Review of Testing Technology in Web Application SystemIRJET Journal
 
Successive Software Reliability Growth Model: A Modular Approach
Successive Software Reliability Growth Model: A Modular ApproachSuccessive Software Reliability Growth Model: A Modular Approach
Successive Software Reliability Growth Model: A Modular Approachajeetmnnit
 
Defect effort prediction models in software maintenance projects
Defect  effort prediction models in software maintenance projectsDefect  effort prediction models in software maintenance projects
Defect effort prediction models in software maintenance projectsiaemedu
 
A Compound Metric for Identification of Fault Prone Modules
A Compound Metric for Identification of Fault Prone ModulesA Compound Metric for Identification of Fault Prone Modules
A Compound Metric for Identification of Fault Prone Modulesiosrjce
 
EVALUATION AND STUDY OF SOFTWARE DEGRADATION IN THE EVOLUTION OF SIX VERSIONS...
EVALUATION AND STUDY OF SOFTWARE DEGRADATION IN THE EVOLUTION OF SIX VERSIONS...EVALUATION AND STUDY OF SOFTWARE DEGRADATION IN THE EVOLUTION OF SIX VERSIONS...
EVALUATION AND STUDY OF SOFTWARE DEGRADATION IN THE EVOLUTION OF SIX VERSIONS...csandit
 
Information hiding based on optimization technique for Encrypted Images
Information hiding based on optimization technique for Encrypted ImagesInformation hiding based on optimization technique for Encrypted Images
Information hiding based on optimization technique for Encrypted ImagesIRJET Journal
 
DESQA a Software Quality Assurance Framework
DESQA a Software Quality Assurance FrameworkDESQA a Software Quality Assurance Framework
DESQA a Software Quality Assurance FrameworkIJERA Editor
 
Automated Testing: An Edge Over Manual Software Testing
Automated Testing: An Edge Over Manual Software TestingAutomated Testing: An Edge Over Manual Software Testing
Automated Testing: An Edge Over Manual Software Testingijtsrd
 
Parameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE Method
Parameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE MethodParameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE Method
Parameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE MethodIRJET Journal
 
A study of various viewpoints and aspects software quality perspective
A study of various viewpoints and aspects  software quality perspectiveA study of various viewpoints and aspects  software quality perspective
A study of various viewpoints and aspects software quality perspectiveeSAT Journals
 

What's hot (16)

05 extended report
05 extended report05 extended report
05 extended report
 
Volume 2-issue-6-1983-1986
Volume 2-issue-6-1983-1986Volume 2-issue-6-1983-1986
Volume 2-issue-6-1983-1986
 
Developing software analyzers tool using software reliability growth model
Developing software analyzers tool using software reliability growth modelDeveloping software analyzers tool using software reliability growth model
Developing software analyzers tool using software reliability growth model
 
IRJET- Factors Affecting the Delivery of Quality Software and their Relations...
IRJET- Factors Affecting the Delivery of Quality Software and their Relations...IRJET- Factors Affecting the Delivery of Quality Software and their Relations...
IRJET- Factors Affecting the Delivery of Quality Software and their Relations...
 
IRJET-A Review of Testing Technology in Web Application System
IRJET-A Review of Testing Technology in Web Application SystemIRJET-A Review of Testing Technology in Web Application System
IRJET-A Review of Testing Technology in Web Application System
 
Successive Software Reliability Growth Model: A Modular Approach
Successive Software Reliability Growth Model: A Modular ApproachSuccessive Software Reliability Growth Model: A Modular Approach
Successive Software Reliability Growth Model: A Modular Approach
 
Defect effort prediction models in software maintenance projects
Defect  effort prediction models in software maintenance projectsDefect  effort prediction models in software maintenance projects
Defect effort prediction models in software maintenance projects
 
A Compound Metric for Identification of Fault Prone Modules
A Compound Metric for Identification of Fault Prone ModulesA Compound Metric for Identification of Fault Prone Modules
A Compound Metric for Identification of Fault Prone Modules
 
EVALUATION AND STUDY OF SOFTWARE DEGRADATION IN THE EVOLUTION OF SIX VERSIONS...
EVALUATION AND STUDY OF SOFTWARE DEGRADATION IN THE EVOLUTION OF SIX VERSIONS...EVALUATION AND STUDY OF SOFTWARE DEGRADATION IN THE EVOLUTION OF SIX VERSIONS...
EVALUATION AND STUDY OF SOFTWARE DEGRADATION IN THE EVOLUTION OF SIX VERSIONS...
 
Information hiding based on optimization technique for Encrypted Images
Information hiding based on optimization technique for Encrypted ImagesInformation hiding based on optimization technique for Encrypted Images
Information hiding based on optimization technique for Encrypted Images
 
DESQA a Software Quality Assurance Framework
DESQA a Software Quality Assurance FrameworkDESQA a Software Quality Assurance Framework
DESQA a Software Quality Assurance Framework
 
Automated Testing: An Edge Over Manual Software Testing
Automated Testing: An Edge Over Manual Software TestingAutomated Testing: An Edge Over Manual Software Testing
Automated Testing: An Edge Over Manual Software Testing
 
Parameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE Method
Parameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE MethodParameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE Method
Parameter Estimation of GOEL-OKUMOTO Model by Comparing ACO with MLE Method
 
@#$@#$@#$"""@#$@#$"""
@#$@#$@#$"""@#$@#$"""@#$@#$@#$"""@#$@#$"""
@#$@#$@#$"""@#$@#$"""
 
Software engg unit 2
Software engg unit 2 Software engg unit 2
Software engg unit 2
 
A study of various viewpoints and aspects software quality perspective
A study of various viewpoints and aspects  software quality perspectiveA study of various viewpoints and aspects  software quality perspective
A study of various viewpoints and aspects software quality perspective
 

Viewers also liked

Functions, Roles and Duties of Police in General
Functions, Roles and Duties of Police in GeneralFunctions, Roles and Duties of Police in General
Functions, Roles and Duties of Police in GeneralPhani Mohan K
 
Connecting in the Facebook Age: Development and Validation of a New Measure o...
Connecting in the Facebook Age: Development and Validation of a New Measure o...Connecting in the Facebook Age: Development and Validation of a New Measure o...
Connecting in the Facebook Age: Development and Validation of a New Measure o...Jessica Vitak
 
Beauty Spa Milton, Yoga Milton
Beauty Spa Milton, Yoga MiltonBeauty Spa Milton, Yoga Milton
Beauty Spa Milton, Yoga MiltonFitness Plus
 
Forage cap metal peaks corporal pattern
Forage cap metal peaks corporal patternForage cap metal peaks corporal pattern
Forage cap metal peaks corporal patternE-Land Group
 
Inovatyon microfranquia v3
Inovatyon microfranquia v3 Inovatyon microfranquia v3
Inovatyon microfranquia v3 Wellisson Araujo
 
Creative Teams
Creative TeamsCreative Teams
Creative TeamsZul Othman
 
10 steps learning development
10 steps   learning development10 steps   learning development
10 steps learning developmentStudy Hub
 
Legal Recruits Limited
Legal Recruits Limited Legal Recruits Limited
Legal Recruits Limited Danae Smith
 
Web components
Web componentsWeb components
Web componentsDiego Melo
 
Дятлова
ДятловаДятлова
Дятловаrcnovo
 
ItStream.tv - Nuova Piattaforma streaming tutta italiana
ItStream.tv - Nuova Piattaforma streaming tutta italianaItStream.tv - Nuova Piattaforma streaming tutta italiana
ItStream.tv - Nuova Piattaforma streaming tutta italianaAldo Obbiettivo
 
FHA DE Certificate - UW TINA
FHA DE Certificate - UW TINAFHA DE Certificate - UW TINA
FHA DE Certificate - UW TINATina Martini
 

Viewers also liked (20)

Functions, Roles and Duties of Police in General
Functions, Roles and Duties of Police in GeneralFunctions, Roles and Duties of Police in General
Functions, Roles and Duties of Police in General
 
Connecting in the Facebook Age: Development and Validation of a New Measure o...
Connecting in the Facebook Age: Development and Validation of a New Measure o...Connecting in the Facebook Age: Development and Validation of a New Measure o...
Connecting in the Facebook Age: Development and Validation of a New Measure o...
 
Beauty Spa Milton, Yoga Milton
Beauty Spa Milton, Yoga MiltonBeauty Spa Milton, Yoga Milton
Beauty Spa Milton, Yoga Milton
 
Trabajo Microp.1
Trabajo Microp.1Trabajo Microp.1
Trabajo Microp.1
 
Forage cap metal peaks corporal pattern
Forage cap metal peaks corporal patternForage cap metal peaks corporal pattern
Forage cap metal peaks corporal pattern
 
Inovatyon microfranquia v3
Inovatyon microfranquia v3 Inovatyon microfranquia v3
Inovatyon microfranquia v3
 
Hussam Alvi
Hussam AlviHussam Alvi
Hussam Alvi
 
Creative Teams
Creative TeamsCreative Teams
Creative Teams
 
курить здоровью вредить! моя
курить   здоровью вредить! моякурить   здоровью вредить! моя
курить здоровью вредить! моя
 
10 steps learning development
10 steps   learning development10 steps   learning development
10 steps learning development
 
Legal Recruits Limited
Legal Recruits Limited Legal Recruits Limited
Legal Recruits Limited
 
Fendall porta stream_i
Fendall porta stream_iFendall porta stream_i
Fendall porta stream_i
 
вид дееичастия
вид дееичастиявид дееичастия
вид дееичастия
 
てすと4
てすと4てすと4
てすと4
 
Web components
Web componentsWeb components
Web components
 
Дятлова
ДятловаДятлова
Дятлова
 
WorkBC Employment Services Center
WorkBC Employment Services CenterWorkBC Employment Services Center
WorkBC Employment Services Center
 
ItStream.tv - Nuova Piattaforma streaming tutta italiana
ItStream.tv - Nuova Piattaforma streaming tutta italianaItStream.tv - Nuova Piattaforma streaming tutta italiana
ItStream.tv - Nuova Piattaforma streaming tutta italiana
 
FHA DE Certificate - UW TINA
FHA DE Certificate - UW TINAFHA DE Certificate - UW TINA
FHA DE Certificate - UW TINA
 
SlideHome1
SlideHome1SlideHome1
SlideHome1
 

Similar to Testing desktop application police station information management system

ANALYSIS OF SOFTWARE QUALITY USING SOFTWARE METRICS
ANALYSIS OF SOFTWARE QUALITY USING SOFTWARE METRICSANALYSIS OF SOFTWARE QUALITY USING SOFTWARE METRICS
ANALYSIS OF SOFTWARE QUALITY USING SOFTWARE METRICSijcsa
 
Exploring the Efficiency of the Program using OOAD Metrics
Exploring the Efficiency of the Program using OOAD MetricsExploring the Efficiency of the Program using OOAD Metrics
Exploring the Efficiency of the Program using OOAD MetricsIRJET Journal
 
Relational Analysis of Software Developer’s Quality Assures
Relational Analysis of Software Developer’s Quality AssuresRelational Analysis of Software Developer’s Quality Assures
Relational Analysis of Software Developer’s Quality AssuresIOSR Journals
 
A RELIABLE AND AN EFFICIENT WEB TESTING SYSTEM
A RELIABLE AND AN EFFICIENT WEB TESTING SYSTEMA RELIABLE AND AN EFFICIENT WEB TESTING SYSTEM
A RELIABLE AND AN EFFICIENT WEB TESTING SYSTEMijseajournal
 
A RELIABLE AND AN EFFICIENT WEB TESTING SYSTEM
A RELIABLE AND AN EFFICIENT WEB TESTING SYSTEMA RELIABLE AND AN EFFICIENT WEB TESTING SYSTEM
A RELIABLE AND AN EFFICIENT WEB TESTING SYSTEMijseajournal
 
A Review of Agile Software Effort Estimation Methods
A Review of Agile Software Effort Estimation MethodsA Review of Agile Software Effort Estimation Methods
A Review of Agile Software Effort Estimation MethodsEditor IJCATR
 
Reliability Improvement with PSP of Web-Based Software Applications
Reliability Improvement with PSP of Web-Based Software ApplicationsReliability Improvement with PSP of Web-Based Software Applications
Reliability Improvement with PSP of Web-Based Software ApplicationsCSEIJJournal
 
The Impact of In-House Software Development Practices on System Usability in ...
The Impact of In-House Software Development Practices on System Usability in ...The Impact of In-House Software Development Practices on System Usability in ...
The Impact of In-House Software Development Practices on System Usability in ...IJMIT JOURNAL
 
THE IMPACT OF IN-HOUSE SOFTWARE DEVELOPMENT PRACTICES ON SYSTEM USABILITY IN ...
THE IMPACT OF IN-HOUSE SOFTWARE DEVELOPMENT PRACTICES ON SYSTEM USABILITY IN ...THE IMPACT OF IN-HOUSE SOFTWARE DEVELOPMENT PRACTICES ON SYSTEM USABILITY IN ...
THE IMPACT OF IN-HOUSE SOFTWARE DEVELOPMENT PRACTICES ON SYSTEM USABILITY IN ...IJMIT JOURNAL
 
Software Quality Measure
Software Quality MeasureSoftware Quality Measure
Software Quality MeasureEditor IJCATR
 
Introduction to Investigation And Utilizing Lean Test Metrics In Agile Softwa...
Introduction to Investigation And Utilizing Lean Test Metrics In Agile Softwa...Introduction to Investigation And Utilizing Lean Test Metrics In Agile Softwa...
Introduction to Investigation And Utilizing Lean Test Metrics In Agile Softwa...IJERA Editor
 
A survey of predicting software reliability using machine learning methods
A survey of predicting software reliability using machine learning methodsA survey of predicting software reliability using machine learning methods
A survey of predicting software reliability using machine learning methodsIAESIJAI
 
IRJET- Factors in Selection of Construction Project Management Software i...
IRJET-  	  Factors in Selection of Construction Project Management Software i...IRJET-  	  Factors in Selection of Construction Project Management Software i...
IRJET- Factors in Selection of Construction Project Management Software i...IRJET Journal
 
A Comparative Case Study On Tools For Internal Software Quality Measures
A Comparative Case Study On Tools For Internal Software Quality MeasuresA Comparative Case Study On Tools For Internal Software Quality Measures
A Comparative Case Study On Tools For Internal Software Quality MeasuresTodd Turner
 
Lecture-1,2-Introduction to SE.pptx
Lecture-1,2-Introduction to SE.pptxLecture-1,2-Introduction to SE.pptx
Lecture-1,2-Introduction to SE.pptxYaseenNazir3
 
Defect effort prediction models in software
Defect effort prediction models in softwareDefect effort prediction models in software
Defect effort prediction models in softwareIAEME Publication
 
Software For Software Development Life Cycle
Software For Software Development Life CycleSoftware For Software Development Life Cycle
Software For Software Development Life CycleChristina Padilla
 
76 s201916
76 s20191676 s201916
76 s201916IJRAT
 
Software quality model based on development team characteristics
Software quality model based on development team  characteristicsSoftware quality model based on development team  characteristics
Software quality model based on development team characteristicsIJECEIAES
 

Similar to Testing desktop application police station information management system (20)

ANALYSIS OF SOFTWARE QUALITY USING SOFTWARE METRICS
ANALYSIS OF SOFTWARE QUALITY USING SOFTWARE METRICSANALYSIS OF SOFTWARE QUALITY USING SOFTWARE METRICS
ANALYSIS OF SOFTWARE QUALITY USING SOFTWARE METRICS
 
Exploring the Efficiency of the Program using OOAD Metrics
Exploring the Efficiency of the Program using OOAD MetricsExploring the Efficiency of the Program using OOAD Metrics
Exploring the Efficiency of the Program using OOAD Metrics
 
Relational Analysis of Software Developer’s Quality Assures
Relational Analysis of Software Developer’s Quality AssuresRelational Analysis of Software Developer’s Quality Assures
Relational Analysis of Software Developer’s Quality Assures
 
A RELIABLE AND AN EFFICIENT WEB TESTING SYSTEM
A RELIABLE AND AN EFFICIENT WEB TESTING SYSTEMA RELIABLE AND AN EFFICIENT WEB TESTING SYSTEM
A RELIABLE AND AN EFFICIENT WEB TESTING SYSTEM
 
A RELIABLE AND AN EFFICIENT WEB TESTING SYSTEM
A RELIABLE AND AN EFFICIENT WEB TESTING SYSTEMA RELIABLE AND AN EFFICIENT WEB TESTING SYSTEM
A RELIABLE AND AN EFFICIENT WEB TESTING SYSTEM
 
A Review of Agile Software Effort Estimation Methods
A Review of Agile Software Effort Estimation MethodsA Review of Agile Software Effort Estimation Methods
A Review of Agile Software Effort Estimation Methods
 
Reliability Improvement with PSP of Web-Based Software Applications
Reliability Improvement with PSP of Web-Based Software ApplicationsReliability Improvement with PSP of Web-Based Software Applications
Reliability Improvement with PSP of Web-Based Software Applications
 
The Impact of In-House Software Development Practices on System Usability in ...
The Impact of In-House Software Development Practices on System Usability in ...The Impact of In-House Software Development Practices on System Usability in ...
The Impact of In-House Software Development Practices on System Usability in ...
 
THE IMPACT OF IN-HOUSE SOFTWARE DEVELOPMENT PRACTICES ON SYSTEM USABILITY IN ...
THE IMPACT OF IN-HOUSE SOFTWARE DEVELOPMENT PRACTICES ON SYSTEM USABILITY IN ...THE IMPACT OF IN-HOUSE SOFTWARE DEVELOPMENT PRACTICES ON SYSTEM USABILITY IN ...
THE IMPACT OF IN-HOUSE SOFTWARE DEVELOPMENT PRACTICES ON SYSTEM USABILITY IN ...
 
Software Quality Measure
Software Quality MeasureSoftware Quality Measure
Software Quality Measure
 
Introduction to Investigation And Utilizing Lean Test Metrics In Agile Softwa...
Introduction to Investigation And Utilizing Lean Test Metrics In Agile Softwa...Introduction to Investigation And Utilizing Lean Test Metrics In Agile Softwa...
Introduction to Investigation And Utilizing Lean Test Metrics In Agile Softwa...
 
A survey of predicting software reliability using machine learning methods
A survey of predicting software reliability using machine learning methodsA survey of predicting software reliability using machine learning methods
A survey of predicting software reliability using machine learning methods
 
Ka3517391743
Ka3517391743Ka3517391743
Ka3517391743
 
IRJET- Factors in Selection of Construction Project Management Software i...
IRJET-  	  Factors in Selection of Construction Project Management Software i...IRJET-  	  Factors in Selection of Construction Project Management Software i...
IRJET- Factors in Selection of Construction Project Management Software i...
 
A Comparative Case Study On Tools For Internal Software Quality Measures
A Comparative Case Study On Tools For Internal Software Quality MeasuresA Comparative Case Study On Tools For Internal Software Quality Measures
A Comparative Case Study On Tools For Internal Software Quality Measures
 
Lecture-1,2-Introduction to SE.pptx
Lecture-1,2-Introduction to SE.pptxLecture-1,2-Introduction to SE.pptx
Lecture-1,2-Introduction to SE.pptx
 
Defect effort prediction models in software
Defect effort prediction models in softwareDefect effort prediction models in software
Defect effort prediction models in software
 
Software For Software Development Life Cycle
Software For Software Development Life CycleSoftware For Software Development Life Cycle
Software For Software Development Life Cycle
 
76 s201916
76 s20191676 s201916
76 s201916
 
Software quality model based on development team characteristics
Software quality model based on development team  characteristicsSoftware quality model based on development team  characteristics
Software quality model based on development team characteristics
 

More from Salam Shah

Implementation of user authentication as a service for cloud network
Implementation of user authentication as a service for cloud networkImplementation of user authentication as a service for cloud network
Implementation of user authentication as a service for cloud networkSalam Shah
 
Critical evaluation of frontal image based gender classification techniques
Critical evaluation of frontal image based gender classification techniquesCritical evaluation of frontal image based gender classification techniques
Critical evaluation of frontal image based gender classification techniquesSalam Shah
 
A robust technique of brain mri classification using color features and k nea...
A robust technique of brain mri classification using color features and k nea...A robust technique of brain mri classification using color features and k nea...
A robust technique of brain mri classification using color features and k nea...Salam Shah
 
An offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levelsAn offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levelsSalam Shah
 
Appraisal of the Most Prominent Attacks due to Vulnerabilities in Cloud Compu...
Appraisal of the Most Prominent Attacks due to Vulnerabilities in Cloud Compu...Appraisal of the Most Prominent Attacks due to Vulnerabilities in Cloud Compu...
Appraisal of the Most Prominent Attacks due to Vulnerabilities in Cloud Compu...Salam Shah
 
Navigation through citation network based on content similarity using cosine ...
Navigation through citation network based on content similarity using cosine ...Navigation through citation network based on content similarity using cosine ...
Navigation through citation network based on content similarity using cosine ...Salam Shah
 
Risk management of telecommunication and engineering laboratory
Risk management of telecommunication and engineering laboratoryRisk management of telecommunication and engineering laboratory
Risk management of telecommunication and engineering laboratorySalam Shah
 
An evaluation of automated tumor detection techniques of brain magnetic reson...
An evaluation of automated tumor detection techniques of brain magnetic reson...An evaluation of automated tumor detection techniques of brain magnetic reson...
An evaluation of automated tumor detection techniques of brain magnetic reson...Salam Shah
 
An appraisal of offline signature verification techniques
An appraisal of offline signature verification techniquesAn appraisal of offline signature verification techniques
An appraisal of offline signature verification techniquesSalam Shah
 
An application development for police stations in pakistan
An application development for police stations in pakistanAn application development for police stations in pakistan
An application development for police stations in pakistanSalam Shah
 
A review of slicing techniques in software engineering
A review of slicing techniques in software engineeringA review of slicing techniques in software engineering
A review of slicing techniques in software engineeringSalam Shah
 
A model for handling overloading of literature review process for social science
A model for handling overloading of literature review process for social scienceA model for handling overloading of literature review process for social science
A model for handling overloading of literature review process for social scienceSalam Shah
 

More from Salam Shah (12)

Implementation of user authentication as a service for cloud network
Implementation of user authentication as a service for cloud networkImplementation of user authentication as a service for cloud network
Implementation of user authentication as a service for cloud network
 
Critical evaluation of frontal image based gender classification techniques
Critical evaluation of frontal image based gender classification techniquesCritical evaluation of frontal image based gender classification techniques
Critical evaluation of frontal image based gender classification techniques
 
A robust technique of brain mri classification using color features and k nea...
A robust technique of brain mri classification using color features and k nea...A robust technique of brain mri classification using color features and k nea...
A robust technique of brain mri classification using color features and k nea...
 
An offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levelsAn offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levels
 
Appraisal of the Most Prominent Attacks due to Vulnerabilities in Cloud Compu...
Appraisal of the Most Prominent Attacks due to Vulnerabilities in Cloud Compu...Appraisal of the Most Prominent Attacks due to Vulnerabilities in Cloud Compu...
Appraisal of the Most Prominent Attacks due to Vulnerabilities in Cloud Compu...
 
Navigation through citation network based on content similarity using cosine ...
Navigation through citation network based on content similarity using cosine ...Navigation through citation network based on content similarity using cosine ...
Navigation through citation network based on content similarity using cosine ...
 
Risk management of telecommunication and engineering laboratory
Risk management of telecommunication and engineering laboratoryRisk management of telecommunication and engineering laboratory
Risk management of telecommunication and engineering laboratory
 
An evaluation of automated tumor detection techniques of brain magnetic reson...
An evaluation of automated tumor detection techniques of brain magnetic reson...An evaluation of automated tumor detection techniques of brain magnetic reson...
An evaluation of automated tumor detection techniques of brain magnetic reson...
 
An appraisal of offline signature verification techniques
An appraisal of offline signature verification techniquesAn appraisal of offline signature verification techniques
An appraisal of offline signature verification techniques
 
An application development for police stations in pakistan
An application development for police stations in pakistanAn application development for police stations in pakistan
An application development for police stations in pakistan
 
A review of slicing techniques in software engineering
A review of slicing techniques in software engineeringA review of slicing techniques in software engineering
A review of slicing techniques in software engineering
 
A model for handling overloading of literature review process for social science
A model for handling overloading of literature review process for social scienceA model for handling overloading of literature review process for social science
A model for handling overloading of literature review process for social science
 

Recently uploaded

Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Recently uploaded (20)

Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 

Testing desktop application police station information management system

  • 1. International Journal of Software Engineering and Its Applications Vol. 10, No. 7 (2016), pp. 101-118 http://dx.doi.org/10.14257/ijseia.2016.10.7.10 ISSN: 1738-9984 IJSEIA Copyright ⓒ 2016 SERSC Testing Desktop Application: Police Station Information Management System Abdul Salam Shah1* , Muhammad Fayaz2 , Asadullah Shah3 and Shahnawaz Shah4 1 SZABIST, Islamabad, Pakistan 2 University of Malakand, KPK, Pakistan 3 International Islamic University Malaysia (IIUM), Kuala Lumpur, Malaysia 4 University of Sindh, Jamshoro, Pakistan 1* shahsalamss@gmail.com, 2 hamaz_khan@yahoo.com, 3 asadullah@iium.edu.my, 4 shahnawaz@usindh.edu.pk Abstract The police stations have adequate importance in the society to control the law and order situations of the country. In Pakistan, police stations manage criminal records and information manually. We have previously developed and improved a desktop application for the record keeping of the different registers of the police stations. The data of police stations is sensitive and that need to be handled within secured and fully functional software to avoid any unauthorized access. For the proper utilization of the newly developed software, it is necessary to test and analyze the system before deployment into the real environment. In this paper, we have performed the testing of an application. For this purpose, we have used Ranorex, automated testing tool for the functional and performance testing, and reported the results of test cases as pass or fail. Keywords: Automated Testing, Crime, Functional Testing, Police, Performance Testing, Police Stations, Record Management, Ranorex, Test Cases 1. Introduction The software developed for the Police Stations of Pakistan needs a proper assessment of its functionalities. The developed application (software) will store data in an organized form and searching of records will be easier as compared to the manual system. It also enhances the efficiency of the Police without extra efforts required for record keeping and accessing [1]. The improvement in the software quality is totally dependent on the level of understanding of what the software is performing and how it is performing the tasks? The better analysis and understanding of the development process of software plays and important role in both; the scientific and practice area of software engineering [2]. The assessments can be classified into developer oriented, carried by developer and customer oriented carried by the customer or third party [3-4]. Another dominant areas of research in the software assessment are how to combine the metrics to get the higher level of assessment value for the software and its processes? [5]. The analysis tools take less time and cost, but they are not fully reliable, the expert based assessment takes place manually and that takes too much time and higher cost. The professionalism and expertise level of the experts are the key factors for the success of analysis [2]. The availability of developer at the time of customer oriented assessment makes the assessment easier because the developer understands the software better and can perform more analytical evaluations [6-7]. However, the availability of developer during assessment has disadvantages. Often, the developer might not want to tell the flaws of software to others due to his reputation [2]. * Corresponding Author
  • 2. International Journal of Software Engineering and Its Applications Vol. 10, No. 7 (2016) 102 Copyright ⓒ 2016 SERSC The comparison of developer and customer oriented assessment is not easier in terms of the difficulty. The assessment is also dependent upon the expertise of the people and the level of the complexity of assessment [2, 8]. In human based assessment, there is also subjectivity factor that needs to be minimized. The assessment from the developer has some factor of bias too, but the assessment from the third party is free from the personal bias. The personal assessment is important and cannot be neglected because the software is also developed by human developers, not the machines or software and the humans can better analyze it than others. Even some automated tools require personal attention and analysis of every step to improve and maintain the quality of the software, so we cannot totally rely upon the software assessment tools [2, 9]. The data of police is quite sensitive, so the developed application needs to be tested properly, and before the deployment, it needs to pass almost 90% of the tests in order to ensure reliability, security and functionality of the application. The critical components of the application must be tested against as much as possible test cases. The test cases can be from installation, login, and layout to complex functioning of the system like crime register and its search options but here it will not be possible to perform the exhaustive testing because it takes extra time [8-9]. In this study, we have performed the testing of important functionalities of developed software for the police department which is not yet tested for the implementation in the police stations [1]. The manual testing of the system takes time and extra effort to avoid that we have used Ranorex which is an automated testing tool, further we have also used manual testing wherever required. The remaining paper is: in Section 2 literature review is presented, Section 3 discusses some challenges, Section 4 Methodology, Section 5 Testing Tools Used, Section 6 testing environment, Section 7 coding, Section 8 Verification and Validation Process, and finally in Section 9 the conclusion of the study is provided. 2. Literature Review Remencius et. al., in [2], have performed the assessment for Italian public administrative applications and reported in the form of case study. The Italy administration has provided software for the assessment in terms of security, quality and performance. They have more concern to ensure that software is protected from unauthorized access and only the authorized users can access their system data and the system can handle 2000 clients at a time. The different components of software have to be deployed on more than one servers and also two different databases i. e., Oracle and MySQL. The software has been developed in Java. The assessment of the system was carried out in the six parts and in agile like fashion; with feedbacks about the assessment from the administration and ensuring that everything is according to their needs. The assessment of the structure of code was performed in code metrics, which were calculated with the static code analysis tool. The analysis was carried out by experts of Java and JavaScript and the configuration of the system was also analyzed [10-11]. Some automated assessment tools has been used, but the results were not reliable, that’s why authors have used manual assessment. The expert’s opinions were used, at the end, no serious issues were identified with the spring framework code. In the case of ambiguities, the guesses were used and as well as experts opinions. The assessment from the client side has been easier because of the best practice guide from IBM. The major part of the analysis of Dojo Toolkit was also manual and performed by the experts. The system has some issue with the speed; it performed slower with the older versions of the internet explorer. The reason of slower speed can be the code or other external or internal factors. The system has been tested against Mozilla, Chrome, and Internet Explorer. To test performance of the system as per requirement of
  • 3. International Journal of Software Engineering and Its Applications Vol. 10, No. 7 (2016) Copyright ⓒ 2016 SERSC 103 the administration as 2000 users live at the same time, Apache J-Meter has been used [12]. Multiple distributed machines have been used for the testing, some performance issues have been identified during stress testing. The experts have done assessment manually, first, the detailed inspection of code has been carried out to detect the configuration and design issues. Then, security exposures have been identified by sending some unauthorized requests of data modification and introducing malicious activities with the help of Apache J-Meter. Sarigiannidis, et. al., in [13], have carried out a study on software development projects for the investigation of the relationship between people quality, process quality, and risk. The structural modeling techniques were used to analyze the empirical data. The people quality has a negative impact on the project risk level as concluded from the main results of the study. On the other side, the process quality has slightly limited effects, the only risk due to the project team. The software’s success depends on its quality, effectiveness, and completeness. The management of the software development projects is quite difficult besides the issue of the quality of the software, the software's incorporate complex characteristic, the same are not associated with other projects of different fields of study. The software has risk associated like budget overrun, delays in the projects, weakness to respond the requirements of the users [14]. The study has been carried on the 220 different Greek software related companies that are developing different projects in the country. The participating companies had to choose the project under development at that time, also the other important requirement that they have to tell about the human resource involved in that project. The process quality and people quality were used to measure the total project quality. The research depends on different kind of data collected from different nature of projects teams having different characteristics, which covered several perspectives of people with dissimilar levels of responsibilities in the development process. Among the all factors the software requirements have the highest exposure to risk and the organizational environment at the lowest level. These findings of the study suggest that the proper training of staff and communication with their personnel and proper staffing according to the skills of staff must be ensured in the software companies of Greek. Zhi et. al., in [15] have summarized the published literature of software documentation cost, benefit, and quality. The literature has been selected by systematic mapping technology. The investigation of the document like requirement, design, implementation and test, in addition, the code comments were carried out. The time that has been consumed during software development and the effort of the software development team are referred here as the cost of the project. The major cost driver during the software development process is the efforts consumed in documentation. The artifact which is developed requires enough amount of cost in terms of time and other facts, the same artifact should be used for the development and maintenance phase otherwise the cost spent on it will be useless and is a huge loss. The benefits of an artifact can be mentioned in terms of reduction in the duration of the task, improvement in the quality of code, increase the productivity, but not limited to these can be of any type of improvements related to software development. They have targeted on the documents of development phase in terms of cost, benefit and quality. The study has focused on the development documentation. The documents about the software structure known as architecture documentation, are considered as the type of design, which define that how the system will be built and the other technical details about the software. The total number of 69 papers in the relevant field has been selected. The relationship model was derived between the entities during the documentation process for the analysis of cost or benefit of documentation. The development and maintenance tasks are performed by the practitioner, the tasks consume a particular amount of effort that can be measured in units that can be considered as an attribute of the task. The task is further
  • 4. International Journal of Software Engineering and Its Applications Vol. 10, No. 7 (2016) 104 Copyright ⓒ 2016 SERSC divided into pre-maintenance and maintenance tasks. The maintenance tasks can be further divided into corrective, perfective, adaptive and preventive maintenance tasks. Each maintenance task is further divided into two steps as comprehension of the program and subsequent manipulation of modification. The typical document management system of infrastructure to access software documents is mostly utilized by software practitioner for easiness of the management of the documents. It is understood that the well- structured documents are easier to read as compared to the unstructured and fuzzy documents, that why the documents structure has the direct impact on the quality of the document. The papers, authors have considered objects, related to the software systems and other human-related subjects. 3. What are the Challenges? The developed application will be installed on the Microsoft windows based systems because most of the police stations in Pakistan use Microsoft windows and the system is developed keeping in view of the current scenario of the police stations to avoid extra expenses of buying new computers. The windows vary from windows XP, windows 7, windows 8 to windows 10 that causes the testing difficult further the manual testing takes a lot of effort and time the same needs to be automated. The automation is not easier due to the diverse functionalities of the system but much functionality can be automated. The problems of installation and graphical appearance may vary from windows to windows. Further, the windows can be 32 bit to 64 bit. The testing execution can be a great challenge on various platforms due to limited resources. 4. Methodology The test automation activities can be best summarized in the Figure 1 which is basically taken from the web [16]. Figure 1. Flow of Automated Testing Activities Here we have tried to follow the guidelines of the above steps of the Figure 1, the proposed methodology of the paper can be described as: 1. Prioritizing Test Cases 2. Dividing Test Cases into Different Categories 3. Selection of Testing Tool and Testing Environment
  • 5. International Journal of Software Engineering and Its Applications Vol. 10, No. 7 (2016) Copyright ⓒ 2016 SERSC 105 4. Coding and Simulation 5. Perform the Validation and Verification 4.1. Prioritizing Test Cases The developed software for police station supports these main functionalities:  Forms having different text fields.  Sub-windows.  Interaction of application with database.  Search functionality with different criteria and display results. The standard test scenarios for a desktop application has been tried as per functionality of the application, the checklist is taken from the [17-18], as per requirement and functionality of the developed application. 4.2. General Test Scenarios  The mandatory fields must be validated and denoted by an asterisk ‘*’ symbol.  The validation errors must be displayed at the correct position via a message.  The first entry of drop-down fields must be blank or ‘Select’.  The application must ask for confirmation before deleting any record.  All field must be set to default values on the click of the reset button.  The maximum field values for input fields must be checked.  The values crossing maximum limit must generate a warning message and the database should not store these values.  Ensure all input fields for the special characters.  Standard style for field labels should be ensured.  The forms must be spell checked for grammatical mistakes.  The functionality of buttons on all forms must be checked.  The double submission of the form must be restricted. 4.3. Graphical User Interface (GUI) and Usability Test Scenarios  The fields of forms must be well aligned.  The scroll bar must be enabled when required.  The style, size, and color of fonts used in the forms must be standard.  The fields which are disabled must be grayed and click option disabled.  The mouse pointer must change to the cursor when to click on the text field.  The user must not be able to manually type any text into the drop down lists.  In the case of form submission error, the filled information must remain intact.  After corrections, the user must be able to submit the form again.  The values of the dropdown field must be in sorted order.  In the case of error, the correct form fields must be highlighted.  The confirmation message for update or delete should be displayed.  Only one radio option should be selected and multiple check boxes.  For the invalid values of filter criteria, proper messages should be displayed. 4.4. Test Scenarios for Result Grid  The resulting grid should display the parameters which are searched.  The grid must display the number of results retrieved.  The criteria of search during searching must be displayed on result grid.  The specified columns with correct values must be included by result grids.
  • 6. International Journal of Software Engineering and Its Applications Vol. 10, No. 7 (2016) 106 Copyright ⓒ 2016 SERSC  The column and rows of result grid must be displayed with proper spacing.  The resulting grid should exclude the duplicate records.  The data of dynamic columns must be checked. 4.5. Test Scenarios for a Window  The default size of the window must be checked.  The child windows must be checked for getting closed on the close of a parent window.  When the child window is open, the user cannot use the parent window.  Minimize, maximize and close functionality of windows must be checked.  The re-size ability of windows must be checked.  The scroll bar functionality, of the window, must be checked.  The cancel functionality of child windows must be checked. 4.6. Database Testing Test Scenarios  The data must be cross checked that either database is saving it correctly or not.  The columns which are not accepting null values must be checked.  The integrity of data must be checked.  The primary key column of tables must be checked.  The log of every operation must be maintained.  The indexes should be added for tables of the database.  The data should be committed to the database in case of successful operation only.  Ensure that the database is saving radio button and dropdown lists properly.  Check the data type and data length of database fields.  Check that Primary key, foreign key of tables are applied correctly.  Check that Primary key column should not be Null. 5. Testing Tool Used The Ranorex is a product by GmbH for test automation that has the functionality of the testing desktop, web-based and mobile applications. The Ranorex uses the programming languages such as C# and VB.NET as a base and it does not have any self-scripting language. The code completion, debugging and testing of the project has been made possible with Ranorex Studio. The user can carry test automation in a specific environment as per requirement. The Ranorex supports acceptance testing, test automation, functional testing, black box testing, GUI testing, mobile application testing, web testing, regression testing, Java testing, data-driven testing, keyword-driven testing and cross-platform testing source [19-21]. 6. Testing Environment The testing was carried out with the following software, hardware specification and other additional resources. Processor: i3-2310M CPU @ 2.10 Ghz RAM: 8.00 GB System Type: 64bit Operating System: Windows 10 Professional Development Environment: VB.NET 2010 Automated Testing Tool: Ranorex
  • 7. International Journal of Software Engineering and Its Applications Vol. 10, No. 7 (2016) Copyright ⓒ 2016 SERSC 107 7. Coding The coding of some important test is provided here like the username and password validation, search module and add entry module. The authors have not contributed in terms of coding the same has been taken from [22]. 7.1. Username and Password Validation: Namespace Police Station Project Public Partial Class Login Private Sub Init () End Sub Public Sub Click On Password Field () Report. Log (Report Level. Info, "Mouse", " Mouse Left Click item’ Login Form. Tab_Page_List. Input_Fields. Text_Password’ at 175;9. ", Repo. Login Form. Tab_Page_List. Input_Fields. Text_Password_Info ) Repo. Login Form. Tab_Page_List. Input_Fields. Text_Password. Click (" 175;9 ") End Sub End Class End Namespace Public Sub Login Form ( a Title As String , a Username As String , a Password As String ) Repo. Login Form. Title. TextValue = aTitle Repo. Login Form. Username. TextValue = aUsername Repo. Login Form. Password. TextValue = aPassword Repo. Login Form. Repeat Password. TextValue = aPassword End Sub 7.2. Search Module: Public Sub ValidateTextValue (repository item As Ranorex. Adapter, val As String) Keyboard. Press ( repository item, val) Validate. Are Equal (repository item. [ As ](of Ranorex . Text) (). TextValue , val ) Report. Screenshot ( repository item, True ) End Sub Const NullString As String = "( null )" Public Sub Validate_Database Field (OLEConnectionString As String, SQLQuery As String, expectedValue As String, customLogMessage As String ) If OLE Connection String. Trim (). Equals (String. Empty) Or Else OLE Connection String. Trim (). Equals (NullString) Then Throw New Ranorex. RanorexException ("Connection String is empty") End If If SQLQuery. Trim (). Equals (String. Empty) Then Throw New Ranorex. RanorexException ("SQLQuery is empty") End If As New OleDbConnection (OLE Connection String) connection. Open () Dim command As OleDbCommand = Nothing Dim SQLReader As OleDbDataReader = Nothing Try command = New OleDbCommand (SQLQuery, connection) SQLReader = command. ExecuteReader () SQLReader. Read () If SQLReader . FieldCount > 0 Then Dim actualValue = SQLReader. GetString (0) If customLogMessage . Trim () . Equals ( String. Empty ) Then
  • 8. International Journal of Software Engineering and Its Applications Vol. 10, No. 7 (2016) 108 Copyright ⓒ 2016 SERSC customLogMessage = " Actual value = ’{0} ’ , expected value = ’{1} ’ ( database query = " & SQLQuery & ") " End If Ranorex. Validate. AreEqual (actualValue , expectedValue , customLogMessage ) Else Throw New Ranorex . RanorexException (String . Format ("SQL statement did not return any results : {0} ", SQLQuery )) End If Finally command. Dispose () SQLReader. Dispose () End Try End Using End Sub 8. Verification and Validation Process Requirements for RE-001: There should be a login screen for the Police Official/Officer through which he can login to the system and can use it for inserting/deleting/updating record. 1. A login screen should contain a form for Sign In and a link for new user to register. The password reset option should not be there. 2. A Login button and Exit Button should be placed at the right side on the screen below the form fields. 3. The login name for the customer should be email address registered during account creation or username the administrator assigned him. 4. The password length must be eight characters long in which at least two digits and one special symbol are mandatory. Password cannot be all the digits and also the username or email address of the person. The functionality of stay login should not be implemented and system will automatically request for password if system not used for 15 minutes. Verification for RE-001: There should be a login screen for user through which he can login to the system and view/update/delete data. The login Screen should have two options i.e., one for Sign In whiles other for Sign Up. A Login button and Sign Up button and Exit button should be place on the right place on the screen below the form fields. The login name for the customer should be email address or CNIC No registered during account creation. The password length must be eight characters long in which two digits and one special symbol are mandatory. On login screen there should be an option to change password. The functionality of stay login should not be implemented. All Function buttons must be located on left side of Login form. Table1. Requirement Checklist of RE-001 No Requirements Status 1 Login & Sign Up Buttons  2 Function Buttons  3 Stay Login X 4 Reset Password 
  • 9. International Journal of Software Engineering and Its Applications Vol. 10, No. 7 (2016) Copyright ⓒ 2016 SERSC 109 Validation of RE-001: For the validation of RE-001 we have performed testing. For a given scenario we have executed Five test cases among them two are valid and three un-valid. All test cases were carried out on Login Form only. Table 3. Test Case T-1-1 Test Case ID T-1-1 Designed By QA Engineer Test Case Title Login with valid user name and password. Executed By Test Engineer Module Name Police officer login. Priority High Execution Date 05/12/2015 Pre-Conditions The user has valid combination of Email and Password. Dependencies A user must Sign-Up before login. Steps Test Data Expected Result Actual Result Status 1. Launch the application. 2. Navigate to the login page. 3. Provide valid Email. 4. Provide valid password. 5. Click on login button. Email: shahsalamss@gmail.com Password: test#123 If user has entered correct user name and password the application must allow him to login successfully. The user has successfully login. Pass Post-Condition The user has successfully login to the system and directed towards the main screen of the application. Suggestion The authentic user must create account for login. Table 4. Test Case T-1-2 Test Case ID T-1-2 Designed By QA Engineer Test Case Title Login with valid user name & password Executed By Test Engineer Module Name Police officer login Priority High Execution Date 05/12/2015 Pre-Conditions The user has valid CNIC & Password. Dependencies A user must Sign-Up before login. Steps Test Data Expected Result Actual Result Status 1. Launch the application. 2. Navigate to the login page. 3. Provide valid CNIC number. 4. Provide valid password. 5. Click on CNIC: 61101-8447560-9 Password: test#123 If user has entered correct CNIC and password the application must allow him to login successfully. The user has successfully login. Pass
  • 10. International Journal of Software Engineering and Its Applications Vol. 10, No. 7 (2016) 110 Copyright ⓒ 2016 SERSC login button. Post-Condition The user has successfully login to the system and directed towards the main screen of the application. Suggestion The authentic user must create account for login. Table 5. Test Case T-1-3 Test Case ID T-1-3 Designed By QA Engineer Test Case Title Login with invalid user name and password Executed By Test Engineer Module Name Police officer login Priority Critical Execution Date 05/12/2015 Pre-Conditions User has invalid Email & Password. Dependencies A user must not Sign-Up before Login. Steps Test Data Expected Result Actual Result Status 1. Navigate to the login page. 2. Invalid Email. 3. Invalid Password. 4. Click on login button. Email: Shahsalamss#gamil.com Password: test123 User should not be able to login. User cannot login to the system. Pass Post-Condition User did not login to the system. Suggestion A message should be displayed which describe that username or password you have entered is incorrect. Table 6. Test Case T-1-4 Test Case ID T-1-4 Designed By QA Engineer Test Case Title Login with Invalid user name & password Test Executed By Test Engineer Module Name Police Officer Login Priority Critical Execution Date 05/12/2015 Pre-Conditions User has Invalid CNIC and Password. Dependencies A user must not Sign-Up before Login. Steps Test Data Expected Result Actual Result Status 1. Navigate to the login page. 2. Invalid Email. 3. Invalid Password. 4. Click on login button. Email: 61101-825u25 Password: test123 User should not be able to login. User failed to login to the system. Pass Post-Condition User did not login to the system. Suggestion A message should be displayed which describe that username or password you have entered is incorrect.
  • 11. International Journal of Software Engineering and Its Applications Vol. 10, No. 7 (2016) Copyright ⓒ 2016 SERSC 111 Table 7. Test Case T-1-5 Test Case ID T-1-5 Designed By QA Engineer Test Case Title Login with empty username & Password Test Executed By Test Engineer Module Name Police Officer Login Priority High Execution Date 05/12/2015 Pre-Conditions Both fields are empty. Dependencies A user must not Sign-Up before Login. Steps Test Data Expected Result Actual Result Status 1. Navigate to the login page. 2. Do not enter any value in username & password field. 3. Click on login button. Email: Password: User should not be able to login. User failed to login to the system. Pass Post-Condition User failed to login and a message generated that user name and password are empty. Requirements for RE-002: There should be a main screen for the Police Official/Officer through which he can use it for inserting/deleting/updating record and searching. 1. A main screen should contain a form for navigation which contains buttons on the left side. 2. The data grid must be there. 3. A search box must be there with a search button at the right side on the screen after the search box. 4. The Buttons which leads to the other forms must be on the left side of the screen, also the buttons of update, delete edit must also be there at every form. 5. The search criteria should be with the FIR number and CNIC. Verification for RE-002: There should be a main screen for user through which he can access the system and navigate easily to the system and view/update/delete data. The main Screen should a search box and search button. A Function buttons and Navigation buttons should be place on the left place on the screen before the form fields. Data Grid must be there to display the search results of the queries. The Search criteria should be strict to the FIR Number and CNIC only. All Function buttons must be located on left side of main form.
  • 12. International Journal of Software Engineering and Its Applications Vol. 10, No. 7 (2016) 112 Copyright ⓒ 2016 SERSC Table 2. Requirement Checklist of RE-002 No Requirements Status 1 Buttons at Left Side  2 Data Grid  3 Search Box  4 Navigation Buttons  5 Search Criteria With FIR Number and CNIC  Validation of RE-002: For the validation of RE-002 we have performed testing. For a given scenario we have executed Ten test cases among them Eight are valid and two un-valid. All test cases were carried out on Main Form only. Table 8. Test Case T-2-1 Test Case ID T-2-1 Designed By QA Engineer Test Case Title Search With Valid FIR No Executed By Test Engineer Module Name FIR Search Priority High Execution Date 05/12/2015 Pre-Conditions User have Valid FIR No Dependencies Against Each FIR Data must be stored to be displayed Steps Test Data Expected Result Actual Result Status 1. Navigate to the main page. 2. Launch the FIR Search Screen All FIR’s data stored in database. The Data of Each FIR should appear in the Grid i.e. name, number, CNIC etc. The Data of Each FIR appearing with details Pass Post-Condition FIR data displayed. Table 9. Test Case T-2-2 Test Case ID T-2-2 Designed By QA Engineer Test Case Title Search With Valid CNIC No Executed By Test Engineer Module Name FIR Search Priority High Execution Date 05/12/2015 Pre-Conditions User have valid CNIC Number of person who filled FIR. Dependencies Against Each FIR Data must be stored to be displayed. Steps Test Data Expected Result Actual Result Status 1. Navigate to the main page. 2. Launch the FIR search screen. All FIR’s data stored in database. The data of each FIR should appear in the grid i.e. name, The data of each FIR appearing with details. Pass
  • 13. International Journal of Software Engineering and Its Applications Vol. 10, No. 7 (2016) Copyright ⓒ 2016 SERSC 113 number, CNIC etc. Post-Condition FIR data displayed. Table 10. Test Case T-2-3 Test Case ID T-2-3 Designed By QA Engineer Test Case Title Search With Invalid FIR No Executed By Test Engineer Module Name FIR Search Priority Critical Execution Date 05/12/2015 Pre-Conditions User has Invalid FIR No. Dependencies Against Each FIR Data must be stored to be displayed. Steps Test Data Expected Result Actual Result Status 1. Navigate to the main page. 2. Launch the FIR Search Screen All FIR’s data stored in database. The Data of FIR should not appear in the Grid The Data of FIR not appearing in the Grid Pass Post-Condition FIR data not displayed. Suggestion A message should be displayed which describe that FIR No. or CNIC you have entered is incorrect. Table 11. Test Case T-2-4 Test Case ID T-2-4 Designed By QA Engineer Test Case Title Search With Invalid CNIC No Executed By Test Engineer Module Name FIR Search Priority Critical Execution Date 05/12/2015 Pre-Conditions User have Invalid CNIC Dependencies Against Each FIR Data must be stored to be displayed Steps Test Data Expected Result Actual Result Status 1. Navigate to the main page. 2. Launch the FIR Search Screen. All FIR’s data stored in database. The Data of FIR should not appear in the Grid. The Data of FIR not appearing in the Grid Pass Post-Condition FIR data not displayed. Suggestion A message should be displayed which describe that FIR No. or CNIC you have entered is incorrect. Table 12. Test Case T-2-5 Test Case ID T-2-5 Designed By QA Engineer Test Case Title Buttons Functionality Executed By Test Engineer Module Name Crime Register Button Priority High Execution Date 05/12/2015 Pre-Conditions Buttons should be active Dependencies Against each important functionality the buttons should be added.
  • 14. International Journal of Software Engineering and Its Applications Vol. 10, No. 7 (2016) 114 Copyright ⓒ 2016 SERSC Steps Test Data Expected Result Actual Result Status 1. Launch the Application 2. Click on Crime Register button 3. Enter any Data Buttons and their codding Upon button click the user should be moved to a desired form Upon click no desired form opened Failed Post-Condition The desired crime register form should appear on screen. Suggestion There should be problem with the codding. Table 13. Test Case T-2-6 Test Case ID T-2-6 Designed By QA Engineer Test Case Title Buttons Functionality Executed By Test Engineer Module Name Police Station Button Priority High Execution Date 05/12/2015 Pre-Conditions Buttons should be active Dependencies Against each important functionality the buttons should be added Steps Test Data Expected Result Actual Result Status 1. Launch the Application 2. Click on Police Station button 3. Enter any Data Buttons and their codding. Upon button click the user should be moved to a desired form Upon click the desired Police Station form opened Pass Post-Condition The desired Police Station form should appear on screen. Table 14. Test Case T-2-7 Test Case ID T-2-7 Designed By QA Engineer Test Case Title Menu Items Executed By Test Engineer Module Name Menu Priority High Execution Date 05/12/2015 Pre-Conditions Menu Items Should be added. Dependencies Against each important functionality the Menu Item should be added Steps Test Data Expected Result Actual Result Status 1. Launch the Application. 2. Go to Menu. Menu Items Upon Menu Item click the user should be moved to a desired functionality/ Form Upon click the desired Menu Item form opened Pass Post-Condition Desired menu Item open.
  • 15. International Journal of Software Engineering and Its Applications Vol. 10, No. 7 (2016) Copyright ⓒ 2016 SERSC 115 Table 15. Test Case T-2-8 Test Case ID T-2-8 Designed By QA Engineer Test Case Title Add Button Executed By Test Engineer Module Name Record Add functionality with all mandatory fields filled Priority Critical Execution Date 05/12/2015 Pre-Conditions Add button should be present and active on form. Dependencies Proper Table must be present in database Steps Test Data Expected Result Actual Result Status 1. Launch the Application. 2. Click on the Add Button. 3. Type data in text fields. Add Button and Its codding. The Record must be added into table with proper message via dialog box. The record successfully added into database. Pass Post-Condition Record added and message of record inserted appeared on screen. Table 16. Test Case T-2-9 Test Case ID T-2-9 Designed By QA Engineer Test Case Title Add Button Executed By Test Engineer Module Name Record Add functionality with some empty mandatory fields filled Priority Critical Execution Date 05/12/2015 Pre-Conditions Add button should be present and active on form. Dependencies Proper table must be present in database Steps Test Data Expected Result Actual Result Status 1. Launch the Application. 2. Click on the Add Button. 3. Type data in text fields with some empty fields. Add Button and Its codding The Record must not be added into table with proper message via dialog box. The record not added into database. Pass Post-Condition Record not added and message of missing fields displayed. Table 17. Test Case T-2-10 Test Case ID T-2-10 Designed By QA Engineer Test Case Title Delete Button Executed By Test Engineer Module Name Record Delete functionality Priority Critical Execution Date 05/12/2015 Pre-Conditions Delete button should be present and active on form. Dependencies Proper Table must be present in database with data Steps Test Data Expected Actual Status
  • 16. International Journal of Software Engineering and Its Applications Vol. 10, No. 7 (2016) 116 Copyright ⓒ 2016 SERSC Result Result 1. Launch the Application. 2. Select the FIR No. 3. Click Crime Delete Button. Delete Button and Its codding. The Record must be deleted with proper message via dialog box. The record not deleted. Failed Post-Condition Record not deleted and message of failure displayed. 9. Conclusion The developed system will help a lot to maintain the record of police station, although it is not a complete system, still some improvements are needed in the developed components and there is a need to add some additional necessary components. Further, all the registers are not digitized, this system covered few important registers which have more use in daily routine crime cases and are most frequently used. The proper testing of the software is important that enhances the quality of the software. The testing of important components has been carried out but further testing is required for the improvement. It is concluded that the developed software is efficient, reliable, portable and user-friendly and can be easily implemented in police stations as a trial basis and system can be further improved after identification of the problems during implementation in real environment and real data of Police stations. References [1] A. S. Shah, M. Fayaz, A. Shah and S. Shah, “An Application Development for Record Keeping of Police Stations in Pakistan”, Journal of Scientific Research and Advances, vol. 2, no. 4, (2015), pp. 144-150. [2] T. Remencius, A. Sillitti and G. Succi, “Assessment of Software Developed by a Third-Party: A Case Study and Comparison”, Information Sciences, vol. 328, (2016), pp. 237-249. [3] I. D. Coman and A. Sillitti, “An Empirical Exploratory Study on Inferring Developers Activities from Low-Level Data”, In: Proceedings of the 19th International Conference on Software Engineering and Knowledge Engineering (SEKE), Boston, MA, USA, (2007). [4] G. L. Kovács, S. Drozdik, P. Zuliani and G. Succi, “Open Source Software for the Public Administration”, In: Proceedings of the Sixth International Workshop on Computer Science and Information Technologies, Budapest, Hungary, (2004). [5] K. Mordal, N. Anquetil, J. Laval, A. Serebrenik, B. Vasilescu and S. Ducasse, “Software Quality Metrics Aggregation in Industry”, Journal of Software Evolution Process, vol. 25, no. 10, (2013), pp. 1117–1135. [6] G. Garousi, V. Garousi, G. Ruhe, J. Zhi, M. Moussavi and B. Smith, “Usage and Usefulness of Technical Software Documentation: An Industrial Case Study”, Information and Software Technology, vol. 57, (2015), pp. 664-682. [7] G. Garousi, V. Garousi, M. Moussavi, G. Ruhe and B. Smith, “Evaluating Usage and Quality of Technical Software Documentation: An Empirical Study”, In: Proceedings of the 17th International Conference on Evaluation and Assessment in Software Engineering, New York, (2013), pp. 24-35. [8] J. M. Memon, A. Khan, A. Baig and A. Shah, “A Study of Software Protection Techniques”, Innovations Advanced Techniques in Computer and Information Sciences and Engineering, Springer Netherlands, (2007), pp. 249-253. [9] A. Shah, A. Raza, B. Hassan and A. S. Shah, “A Review Of Slicing Techniques In Software Engineering”, In: International Conference on Engineering and Technology, Srilanka, (2015) March 17-18, pp. 1-15. [10] Spring Framework, http://spring.io/. Retrieved 2016-06-09. [11] E. Petrinja, A. Sillitti and G. Succi, “Comparing OpenBRR, QSOS, and OMM Assessment Models”, In: Proceedings of the Sixth International Conference on Open Source Systems (OSS 2010), Notre Dame, IN,USA, (2010), pp. 224-238. [12] http://jmeter.apache.org/ Retrieved 2016-02-07. [13] L. Sarigiannidis, and P.D. Chatzoglou, “Quality VS Risk: An Investigation of Their Relationship in Software Development Projects”, International Journal of Project Management, vol. 32, no. 6, (2014), pp. 1073-1082.
  • 17. International Journal of Software Engineering and Its Applications Vol. 10, No. 7 (2016) Copyright ⓒ 2016 SERSC 117 [14] L. Sarigiannidis and P. Chatzoglou, “Software Development Project Risk Management: A New Conceptual Framework”, Journal of Software Engineering and Applications, vol. 4, no. 5, (2011), pp. 293-305. [15] J. Zhi, V. Garousi-Yusifo-glu, B. Sun, G. Garousi, S. Shahnewaz and G. Ruhe, “Cost, Benefits and Quality of Software Development Documentation: A Systematic Mapping”, Journal of Systems and Software, vol. 99, (2015), pp. 175-198. [16] http://www.ranorex.com/blog/how-to-automate-your-tests-without-programming-skills-preparation/ Retrieved 2016-06-09. [17] https://www.linkedin.com/pulse/180-sample-test-cases-testing-web-desktop-tushar-singhal Retrieved 07/02/2016. [18] http://www.softwaretestinghelp.com/sample-test-cases-testing-web-desktop-applications/ Retrieved 07/02/2016. [19] http://www.ranorex.com/Documentation/Ranorex-Tutorial.pdf. [20] https://en.wikipedia.org/wiki/Ranorex. Retrieved 2016-02-06. [21] "Ranorex – UI Test Automation Tool for Professionals Award". QA Testing Tools. Retrieved 2016-02- 06. [22] http://www.ranorex.com/support/user-guide-20/code-examples.html. Authors Abdul Salam Shah, has completed MS degree in Computer Science from SZABIST, Islamabad, Pakistan in 2016. He did his BS degree in Computer Science from Isra University Hyderabad, Sindh Pakistan in 2012. In addition to his degree, he has completed short courses and diploma certificates in Databases, Machine Learning, Artificial Intelligence, Cybercrime, Cybersecurity, Networking, and Software Engineering. He has published articles in various journals of high repute. He is a young professional and he started his career in the Ministry of Planning, Development and Reforms, Islamabad Pakistan. His research area includes Machine Learning, Artificial Intelligence, Digital Image Processing and Data Mining. Mr. Shah has contributed in a book titled "Research Methodologies; an Islamic perspectives," International Islamic University Malaysia, November, 2015. Muhammad Fayaz, is currently perusing Ph.D. in Computer Science from, JEJU National University, South Korea. Before joining the JEJU National University, he has also completed the course work of Ph.D from University of Malakand, Chakdara, KPK, Pakistan. He received MS in Computer Science from SZABIST, Islamabad, Pakistan in 2014. He did MSC from the University of Malakand, KPK, Pakistan in 2011. Asadullah Shah is working as Professor and Head of department of Information Systems (HOD) at the Kulliyyah of ICT, International Islamic University Malaysia (IIUM) before joining IIUM, he worked as Head of Telecommunication Engineering & Management department, IoBM Karachi Sindh, Dean Faculty of Computer and Management Sciences, Isra University Hyderabad Sindh and Head of Telecommunication Engineering and IT, Sukkur IBA, Sindh-Pakistan. He did his Ph.D. from the university of Surrey UK, in 1998, with the specialization in Multimedia Communication. He started his academic carrier from University of Sindh Jamshoro, Pakistan in 1986 as a lecturer.
  • 18. International Journal of Software Engineering and Its Applications Vol. 10, No. 7 (2016) 118 Copyright ⓒ 2016 SERSC He has published 200 research articles in highly reputable international and national journal in the field of computers, communication and IT. Also, he has published 12 books in his 30 years of the academic carrier. Currently he is supervising great number of postgraduate students, working in multiple disciplines, specially, animation, social media and image processing in the Department of Information Systems, Kulliyyah of Information and Communication Technology, International Islamic University Malaysia. Shahnawaz Shah is working as Lecturer at the Institute of Information and Communication Technology, University of Sindh, Jamshoro, Pakistan. He is also pursuing M.Phil. Degree in Telecommunication from the University of Sindh, Jamshoro, Pakistan. He did his BS degree in Telecommunication from University of Sindh, Jamshoro, Pakistan, in 2007.