SlideShare a Scribd company logo
IMPORTANCE OF SOFTWARE TESTING
SOFTWARE TESTING METHODOLOGIES
SOFTWARE TESTING TECHNIQUES
➢ BLACK-BOX TECHNIQUES
➢ WHITE-BOX TECHNIQUES
➢ EXPERIENCED-BASED TECHNIQUES
www.edureka.co
www.edureka.co
www.edureka.co
Disasters Due to Software Flaws
Power Blackout
Launch Error
Satellite Failure
Plane Crashes
Radioactive
Overexposure
Register
Malfunction
ETCS bugs
Smart Ship
Drowning
Best Quality Product
www.edureka.co
Save Time & Resources Used
Customer Satisfaction Brings More ProfitUser Experience
Business Optimization
www.edureka.co
www.edureka.co
Software testing methodologies are the different strategies, approaches and ways of ensuring that a software application in
particular is fully tested.
04
Leverages current technology
investments
01
Single integrated testing
environment
02
Complete testing solution
from day one
03 Provides complete picture of
software health
www.edureka.cowww.edureka.co
Types of Software Testing Methodologies
Agile
Model
Spiral
Model
V – Model
Extreme Programming
Scrum Model
Testing
Methodologies
RAD
Model
Waterfall
Model
Incremental
Model
www.edureka.cowww.edureka.co
Requirements1
Design2
Implementation3
Verification4
Maintenance5
Waterfall Model is the basic life cycle model which was developed by Winston Royce in 1970. This
model represents multiple stages or processes in a sequential manner that flows progressively
downward.
www.edureka.co
Easy to understand & functional
Simple enough to manage
Saves significant amount of time
Allows for easy testing & analysis
Allows for departmentalization
Risky and uncertain
Very short of flexibility
Lack of visibility of current progress
Can’t edit in testing phase
Not suitable for large projects
Advantages Disadvantages
www.edureka.co
Verification &
Validation Model
V - Model is an extension of Waterfall Model where the process execution takes place in a
sequential style in V-Shape. There exists a directly associated testing phase in every single
phase of the development cycle.
Coding2
Detailed Specifications
High Level Design
Requirements Analysis
Integration Testing
Operational Testing
Unit Testing
Review/Test
www.edureka.co
Advantages
✓ Simple & easy to understand
✓ Easy to manage
✓ Suitable for small projects
✓ Beneficial
✓ Cost-effective when
compared to Waterfall
✓ Overlapping is not present
Disadvantages
✓ Absence of clear solutions
that help eliminate the
software defects
✓ No inherent ability to
respond to changes
✓ Leads to testing being
squeezed at the end
Incremental model is multi-waterfall-model of software testing. The whole incremental process
is divided into the various number of cycles. An increment includes three cycles: software
designing and realization, testing, and implementation.
Requirements
Design &
Development
Testing Implementation
Design &
Development
Testing Implementation
Design &
Development
Testing Implementation
Build 1
Build 2
Build 3
Advantage: More flexible & highly
effective
Disadvantage: Costlier than
waterfall model
www.edureka.cowww.edureka.co
Agile Model, form of iterative & incremental approach involves development of software in
incremental, rapid cycles. So, you have small incremental releases of the software, each one
building on previous functionalities.
Increment 1 Increment 2 Increment 3
Iterative – Incremental Agile Model
Reqts
Test
Code
Design Reqts
Test
Code
Design
Reqts
Test
Code
Design
www.edureka.co
Advantages Disadvantages
Agile Testing Model offers
following advantages:
➢ Adaptive approach that
responds to changes favourable
➢ Improves the product quality
➢ Allows for direct communication
➢ Suitable for large & long-term
projects
➢ Promotes teamwork
➢ Rapid methodology
➢ Minimum resource requirements
➢ Easy to manage
Disadvantages of Agile Model
include:
➢ Dependent on clear customer
requirements upfront
➢ Increased maintainability risk
➢ Not suitable for complex
projects
➢ Lacks documentation efficiency
➢ Chances of getting off-track as
outcome are not clear
➢ Not suitable for complex
projects
www.edureka.cowww.edureka.co
The spiral model incorporates iterative development approach along with the systematic
approach of the waterfall model. It is similar to the incremental model and emphasis on Risk
Analysis.
www.edureka.co
Advantages Disadvantages
Can be costly model to use
Requires lot of technical expertise
Large number of intermediate stages
Highly dependent on risk analysis phase
Doesn’t work properly for smaller projects
Low risk due to huge amount of risk analysis
Requirement changes can be added easily
Strong approval & documentation control
Good fit for large, mission critical projects
Offers rapid development of project
RAD, Rapid Application Development Testing Model, is also an incremental model of software
development. But with RAD, the focus is on building a prototype that looks and acts like the final
product — in order to test its usefulness.
www.edureka.co
Process
Modeling
Modeling data flow among
functions
Business
Modeling
Modeling data flow in terms
of data & obejcts
Data
Modeling
Defining functional process by
mapping 2 previous results
Using automated tools to
convert model to actual code
Application
Generation
Testing new components &
performing integration tests
Testing &
Turnover
Term # i
60-90 Days
www.edureka.co
www.edureka.cowww.edureka.co
Advantages
Disadvantages
Reduced development/testing cycle time
Less cost and schedule risk due to time-box approach
Enhances customer feedback, due to customer
involvement throughout the cycle
Requires high skilled resources
Requires a system that can be modularized
High cost estimation & hard to use with legacy systems
www.edureka.co
www.edureka.co
SOFTWARE
TESTING
TECHNIQUES
Exploratory Testing
Error Guessing
White-BoxTesting
Statement Coverage
Decision Coverage
Condition Coverage
Multiple Condition
Black-BoxTesting
TypesofSoftwareTesting
Boundary Value Analysis
Equivalence Partition
Decision Tables
State Transition Diagram
Use Case Testing
ExperienceBases
Testing
www.edureka.co
EquivalencePartitioning
www.edureka.co
It’s a black-box testing technique, where you
group the inputs with same attributes into
partitions. Your task is to pick one condition out
of each partition, which covers all possible
scenarios, to execute test cases
This way you can easily identify valid as well as
invalid equivalence classes
Ex. Testing input conditions accepting numbers
from ‘01 to 10 and 20 to 30’
--- to 0 (invalid)
01 to 10 (valid)
11 to 19 (invalid)
20 to 30 (valid)
31 to --- (invalid)
-2, 3, 15, 25, 45
BoundaryValueAnalysis
www.edureka.co
Boundary value analysis is the next part of
Equivalence partitioning for designing test cases
where test cases are selected at the edges of the
equivalence classes. It is used to identify errors
at boundaries rather than finding those exist in
centre of input domain.
It includes maximum, minimum, inside or
outside edge, typical values or error values
Ex. Testing input conditions accepting numbers
form ‘1 to 10’
• Input Boundary values: 1, 10
• Values just below extreme
edges: 0, 9
• Values just above extreme
edges: 2, 11
Boundary values 0,1,2 and 9, 10, 11
DecisionTableBasedTechnique
www.edureka.co
Decision table-based testing aka Cause-effect table, is used for functions that respond to a combination of events or inputs. A Decision Table
is a tabular representation of conditions versus test actions. Conditions are considered as inputs, while actions are considered as outputs.
Rule 1 Rule 2 Rule 3 Rule 4 Rule 5 Rule 6 Rule 7 Rule 8
INPUT
Name
Email
Message
Output
Submit
F
F
F F
F
F
F F
F
F
F
FT
T T
T T
TT
T
T T
T
T
F F F F F F F T
State Transition Diagram: Using this approach, the tester analyses the behaviour of an application under test (AUT) for
different input conditions in a sequence. We can apply this when an application gives a different output for the same input, depending on
what has happened in the earlier state.
www.edureka.cowww.edureka.co
On waiting list
Confirmed
Archived
Null
Requested
Confirmed
Room
Requested
Not Available
Put on list
User gives up
Remove from list
Room Available
Decrement room count
User Moves In
User Vacates
Increment room count
Confirmed
Room Available
Decrement room count
Customer Cancels
Increment room count
UseCaseTesting
www.edureka.co
Use case testing is a functional testing technique,
meaning programming skill is not required.
➢ Identify all scenarios from Use Case
➢ For each scenario, define at least one test case and
condition
➢ For each scenario, determine the test data for the
test
System
Start
System
Shutdown
Session Invalid
PIN
Transaction
Withdrawal Deposit Transfer Inquiry
Operator
Customer << include >>
<< extend >>
ATM System
Bank
www.edureka.co
www.edureka.co
StatementCoverageor
LineCoverage
In this technique, every statement in the source code is executed
at least once. Thereby, we can check what the source code is and
is not expected to do. Doesn’t cover negative cases.
DecisionCoverageor
BranchCoverage
This techniques covers all the branches of the code to make
sure that no branches leads to abnormal behaviour. Each and
every branch from each decision point is executed.
INPUT A & B
C = A + B
IF C>100
PRINT “ITS DONE”
INPUT A & B
C = A + B
IF C>100
PRINT “ITS DONE”
ELSE
PRINT “ITS PENDING”
ConditionCoverage or
PredicateCoverage
Condition coverage ensures whether all the individual Boolean
expressions have been covered and evaluated to both TRUE
and FALSE. Stronger criteria compared to line coverage.
READ X, Y
IF(X == 0 || Y == 0)
PRINT ‘0’
MultipleCondition
Coverage
In this technique, all the possible combinations of the possible
outcomes of conditions are tested at least once.
#Test Case 1 – X = 0, Y = 55
#Test Case 2 – X = 5, Y = 0
READ X, Y
IF(X == 0 || Y == 0)
PRINT ‘0’
#Test Case 1 – X = 0, Y = 0
#Test Case 2 – X = 0, Y = 5
#Test Case 3 – X = 55, Y = 0
#Test Case 4 – X = 55, Y = 5
www.edureka.co
www.edureka.co
www.edureka.cowww.edureka.co
Exploratory Testing
Error Guessing
Here, domain experts perform testing just by exploring the functionalities of the application
without having the knowledge of the requirements. High severity bugs are found very quickly
in this type of testing.
Error guessing is one of the testing techniques used to find bugs in a software application
based on the tester’s prior experience. In Error guessing, no specific rules are applied
Copyright © 2017, edureka and/or its affiliates. All rights reserved.
www.edureka.co
www.edureka.co

More Related Content

What's hot

Software testing
Software testingSoftware testing
Software testing
Omar Al-Bokari
 
Basic software-testing-concepts
Basic software-testing-conceptsBasic software-testing-concepts
Basic software-testing-conceptsmedsherb
 
Testing fundamentals
Testing fundamentalsTesting fundamentals
Testing fundamentals
Raviteja Chowdary Adusumalli
 
Defects in software testing
Defects in software testingDefects in software testing
Defects in software testing
sandeepsingh2808
 
Software testing
Software testingSoftware testing
Types of testing
Types of testingTypes of testing
Types of testing
Sonam Agarwal
 
Software testing
Software testing Software testing
Software testing
Kunal Prajapati
 
Testing concepts [3] - Software Testing Techniques (CIS640)
Testing concepts [3] - Software Testing Techniques (CIS640)Testing concepts [3] - Software Testing Techniques (CIS640)
Testing concepts [3] - Software Testing Techniques (CIS640)
Venkatesh Prasad Ranganath
 
Software testing methods, levels and types
Software testing methods, levels and typesSoftware testing methods, levels and types
Software testing methods, levels and typesConfiz
 
powerpoint template for testing training
powerpoint template for testing trainingpowerpoint template for testing training
powerpoint template for testing trainingJohn Roddy
 
What is Integration Testing? | Edureka
What is Integration Testing? | EdurekaWhat is Integration Testing? | Edureka
What is Integration Testing? | Edureka
Edureka!
 
Software Testing - Part 1 (Techniques, Types, Levels, Methods, STLC, Bug Life...
Software Testing - Part 1 (Techniques, Types, Levels, Methods, STLC, Bug Life...Software Testing - Part 1 (Techniques, Types, Levels, Methods, STLC, Bug Life...
Software Testing - Part 1 (Techniques, Types, Levels, Methods, STLC, Bug Life...
Ankit Prajapati
 
Testing methodology
Testing methodologyTesting methodology
Testing methodology
Dina Hanbazazah
 
Test case techniques
Test case techniquesTest case techniques
Test case techniques
Pina Parmar
 
Software Testing Tools | Edureka
Software Testing Tools | EdurekaSoftware Testing Tools | Edureka
Software Testing Tools | Edureka
Edureka!
 
Test cases
Test casesTest cases
Test cases
Chandra Maddigapu
 
Testing concepts ppt
Testing concepts pptTesting concepts ppt
Testing concepts pptRathna Priya
 

What's hot (20)

Software testing
Software testingSoftware testing
Software testing
 
Basic software-testing-concepts
Basic software-testing-conceptsBasic software-testing-concepts
Basic software-testing-concepts
 
Testing fundamentals
Testing fundamentalsTesting fundamentals
Testing fundamentals
 
Defects in software testing
Defects in software testingDefects in software testing
Defects in software testing
 
Software testing
Software testingSoftware testing
Software testing
 
Types of testing
Types of testingTypes of testing
Types of testing
 
Software testing
Software testing Software testing
Software testing
 
Introduction & Manual Testing
Introduction & Manual TestingIntroduction & Manual Testing
Introduction & Manual Testing
 
Testing concepts [3] - Software Testing Techniques (CIS640)
Testing concepts [3] - Software Testing Techniques (CIS640)Testing concepts [3] - Software Testing Techniques (CIS640)
Testing concepts [3] - Software Testing Techniques (CIS640)
 
Software testing methods, levels and types
Software testing methods, levels and typesSoftware testing methods, levels and types
Software testing methods, levels and types
 
Manual testing ppt
Manual testing pptManual testing ppt
Manual testing ppt
 
powerpoint template for testing training
powerpoint template for testing trainingpowerpoint template for testing training
powerpoint template for testing training
 
What is Integration Testing? | Edureka
What is Integration Testing? | EdurekaWhat is Integration Testing? | Edureka
What is Integration Testing? | Edureka
 
Software Testing - Part 1 (Techniques, Types, Levels, Methods, STLC, Bug Life...
Software Testing - Part 1 (Techniques, Types, Levels, Methods, STLC, Bug Life...Software Testing - Part 1 (Techniques, Types, Levels, Methods, STLC, Bug Life...
Software Testing - Part 1 (Techniques, Types, Levels, Methods, STLC, Bug Life...
 
Testing methodology
Testing methodologyTesting methodology
Testing methodology
 
Test case techniques
Test case techniquesTest case techniques
Test case techniques
 
Software Testing Tools | Edureka
Software Testing Tools | EdurekaSoftware Testing Tools | Edureka
Software Testing Tools | Edureka
 
Testing
TestingTesting
Testing
 
Test cases
Test casesTest cases
Test cases
 
Testing concepts ppt
Testing concepts pptTesting concepts ppt
Testing concepts ppt
 

Similar to What are Software Testing Methodologies | Software Testing Techniques | Edureka

Automating The Process For Building Reliable Software
Automating The Process For Building Reliable SoftwareAutomating The Process For Building Reliable Software
Automating The Process For Building Reliable Software
guest8861ff
 
Role+Of+Testing+In+Sdlc
Role+Of+Testing+In+SdlcRole+Of+Testing+In+Sdlc
Role+Of+Testing+In+Sdlc
mahendra singh
 
Testing Interview Questions.pdf
Testing Interview Questions.pdfTesting Interview Questions.pdf
Testing Interview Questions.pdf
PradeepaKannan6
 
How To Write A Test Case In Software Testing | Edureka
How To Write A Test Case In Software Testing | EdurekaHow To Write A Test Case In Software Testing | Edureka
How To Write A Test Case In Software Testing | Edureka
Edureka!
 
Software quality assurance
Software quality assuranceSoftware quality assurance
Software quality assuranceRajeev Sharan
 
Software Testing Concepts
Software Testing  ConceptsSoftware Testing  Concepts
Software Testing Concepts
Shahram Foroozan
 
Testing ppt
Testing pptTesting ppt
Testing ppt
kiran theja
 
CV_SyedShoeb_2015
CV_SyedShoeb_2015CV_SyedShoeb_2015
CV_SyedShoeb_2015Syed Shoeb
 
1st module.....
1st module.....1st module.....
1st module.....
Bollapalli Vasundhara
 
Testing Software Solutions
Testing Software SolutionsTesting Software Solutions
Testing Software Solutionsgavhays
 
Enhancing Software Quality
Enhancing Software QualityEnhancing Software Quality
Enhancing Software Quality
Anand Prabhala
 
Softwar tetesting basic
Softwar tetesting basicSoftwar tetesting basic
Softwar tetesting basic
parekhjigarh
 
Some Commonly Asked Question For Software Testing
Some Commonly Asked Question For Software TestingSome Commonly Asked Question For Software Testing
Some Commonly Asked Question For Software Testing
Kumari Warsha Goel
 
Quality Assurance with Manual Testing
Quality Assurance with Manual TestingQuality Assurance with Manual Testing
Quality Assurance with Manual Testing
Edureka!
 
testing
testingtesting
testing
Rashmi Deoli
 
Zero-bug Software, Mathematically Guaranteed
Zero-bug Software, Mathematically GuaranteedZero-bug Software, Mathematically Guaranteed
Zero-bug Software, Mathematically Guaranteed
Ashley Zupkus
 

Similar to What are Software Testing Methodologies | Software Testing Techniques | Edureka (20)

Automating The Process For Building Reliable Software
Automating The Process For Building Reliable SoftwareAutomating The Process For Building Reliable Software
Automating The Process For Building Reliable Software
 
Role+Of+Testing+In+Sdlc
Role+Of+Testing+In+SdlcRole+Of+Testing+In+Sdlc
Role+Of+Testing+In+Sdlc
 
Testing Interview Questions.pdf
Testing Interview Questions.pdfTesting Interview Questions.pdf
Testing Interview Questions.pdf
 
How To Write A Test Case In Software Testing | Edureka
How To Write A Test Case In Software Testing | EdurekaHow To Write A Test Case In Software Testing | Edureka
How To Write A Test Case In Software Testing | Edureka
 
Software quality assurance
Software quality assuranceSoftware quality assurance
Software quality assurance
 
Software Testing Concepts
Software Testing  ConceptsSoftware Testing  Concepts
Software Testing Concepts
 
Testing ppt
Testing pptTesting ppt
Testing ppt
 
CV_SyedShoeb_2015
CV_SyedShoeb_2015CV_SyedShoeb_2015
CV_SyedShoeb_2015
 
Manualtestingppt
ManualtestingpptManualtestingppt
Manualtestingppt
 
1st module.....
1st module.....1st module.....
1st module.....
 
Testing Software Solutions
Testing Software SolutionsTesting Software Solutions
Testing Software Solutions
 
Enhancing Software Quality
Enhancing Software QualityEnhancing Software Quality
Enhancing Software Quality
 
Softwar tetesting basic
Softwar tetesting basicSoftwar tetesting basic
Softwar tetesting basic
 
Some Commonly Asked Question For Software Testing
Some Commonly Asked Question For Software TestingSome Commonly Asked Question For Software Testing
Some Commonly Asked Question For Software Testing
 
Quality Assurance with Manual Testing
Quality Assurance with Manual TestingQuality Assurance with Manual Testing
Quality Assurance with Manual Testing
 
Future of QA
Future of QAFuture of QA
Future of QA
 
Futureofqa
FutureofqaFutureofqa
Futureofqa
 
testing
testingtesting
testing
 
Zero-bug Software, Mathematically Guaranteed
Zero-bug Software, Mathematically GuaranteedZero-bug Software, Mathematically Guaranteed
Zero-bug Software, Mathematically Guaranteed
 
Avnish
AvnishAvnish
Avnish
 

More from Edureka!

What to learn during the 21 days Lockdown | Edureka
What to learn during the 21 days Lockdown | EdurekaWhat to learn during the 21 days Lockdown | Edureka
What to learn during the 21 days Lockdown | Edureka
Edureka!
 
Top 10 Dying Programming Languages in 2020 | Edureka
Top 10 Dying Programming Languages in 2020 | EdurekaTop 10 Dying Programming Languages in 2020 | Edureka
Top 10 Dying Programming Languages in 2020 | Edureka
Edureka!
 
Top 5 Trending Business Intelligence Tools | Edureka
Top 5 Trending Business Intelligence Tools | EdurekaTop 5 Trending Business Intelligence Tools | Edureka
Top 5 Trending Business Intelligence Tools | Edureka
Edureka!
 
Tableau Tutorial for Data Science | Edureka
Tableau Tutorial for Data Science | EdurekaTableau Tutorial for Data Science | Edureka
Tableau Tutorial for Data Science | Edureka
Edureka!
 
Python Programming Tutorial | Edureka
Python Programming Tutorial | EdurekaPython Programming Tutorial | Edureka
Python Programming Tutorial | Edureka
Edureka!
 
Top 5 PMP Certifications | Edureka
Top 5 PMP Certifications | EdurekaTop 5 PMP Certifications | Edureka
Top 5 PMP Certifications | Edureka
Edureka!
 
Top Maven Interview Questions in 2020 | Edureka
Top Maven Interview Questions in 2020 | EdurekaTop Maven Interview Questions in 2020 | Edureka
Top Maven Interview Questions in 2020 | Edureka
Edureka!
 
Linux Mint Tutorial | Edureka
Linux Mint Tutorial | EdurekaLinux Mint Tutorial | Edureka
Linux Mint Tutorial | Edureka
Edureka!
 
How to Deploy Java Web App in AWS| Edureka
How to Deploy Java Web App in AWS| EdurekaHow to Deploy Java Web App in AWS| Edureka
How to Deploy Java Web App in AWS| Edureka
Edureka!
 
Importance of Digital Marketing | Edureka
Importance of Digital Marketing | EdurekaImportance of Digital Marketing | Edureka
Importance of Digital Marketing | Edureka
Edureka!
 
RPA in 2020 | Edureka
RPA in 2020 | EdurekaRPA in 2020 | Edureka
RPA in 2020 | Edureka
Edureka!
 
Email Notifications in Jenkins | Edureka
Email Notifications in Jenkins | EdurekaEmail Notifications in Jenkins | Edureka
Email Notifications in Jenkins | Edureka
Edureka!
 
EA Algorithm in Machine Learning | Edureka
EA Algorithm in Machine Learning | EdurekaEA Algorithm in Machine Learning | Edureka
EA Algorithm in Machine Learning | Edureka
Edureka!
 
Cognitive AI Tutorial | Edureka
Cognitive AI Tutorial | EdurekaCognitive AI Tutorial | Edureka
Cognitive AI Tutorial | Edureka
Edureka!
 
AWS Cloud Practitioner Tutorial | Edureka
AWS Cloud Practitioner Tutorial | EdurekaAWS Cloud Practitioner Tutorial | Edureka
AWS Cloud Practitioner Tutorial | Edureka
Edureka!
 
Blue Prism Top Interview Questions | Edureka
Blue Prism Top Interview Questions | EdurekaBlue Prism Top Interview Questions | Edureka
Blue Prism Top Interview Questions | Edureka
Edureka!
 
Big Data on AWS Tutorial | Edureka
Big Data on AWS Tutorial | Edureka Big Data on AWS Tutorial | Edureka
Big Data on AWS Tutorial | Edureka
Edureka!
 
A star algorithm | A* Algorithm in Artificial Intelligence | Edureka
A star algorithm | A* Algorithm in Artificial Intelligence | EdurekaA star algorithm | A* Algorithm in Artificial Intelligence | Edureka
A star algorithm | A* Algorithm in Artificial Intelligence | Edureka
Edureka!
 
Kubernetes Installation on Ubuntu | Edureka
Kubernetes Installation on Ubuntu | EdurekaKubernetes Installation on Ubuntu | Edureka
Kubernetes Installation on Ubuntu | Edureka
Edureka!
 
Introduction to DevOps | Edureka
Introduction to DevOps | EdurekaIntroduction to DevOps | Edureka
Introduction to DevOps | Edureka
Edureka!
 

More from Edureka! (20)

What to learn during the 21 days Lockdown | Edureka
What to learn during the 21 days Lockdown | EdurekaWhat to learn during the 21 days Lockdown | Edureka
What to learn during the 21 days Lockdown | Edureka
 
Top 10 Dying Programming Languages in 2020 | Edureka
Top 10 Dying Programming Languages in 2020 | EdurekaTop 10 Dying Programming Languages in 2020 | Edureka
Top 10 Dying Programming Languages in 2020 | Edureka
 
Top 5 Trending Business Intelligence Tools | Edureka
Top 5 Trending Business Intelligence Tools | EdurekaTop 5 Trending Business Intelligence Tools | Edureka
Top 5 Trending Business Intelligence Tools | Edureka
 
Tableau Tutorial for Data Science | Edureka
Tableau Tutorial for Data Science | EdurekaTableau Tutorial for Data Science | Edureka
Tableau Tutorial for Data Science | Edureka
 
Python Programming Tutorial | Edureka
Python Programming Tutorial | EdurekaPython Programming Tutorial | Edureka
Python Programming Tutorial | Edureka
 
Top 5 PMP Certifications | Edureka
Top 5 PMP Certifications | EdurekaTop 5 PMP Certifications | Edureka
Top 5 PMP Certifications | Edureka
 
Top Maven Interview Questions in 2020 | Edureka
Top Maven Interview Questions in 2020 | EdurekaTop Maven Interview Questions in 2020 | Edureka
Top Maven Interview Questions in 2020 | Edureka
 
Linux Mint Tutorial | Edureka
Linux Mint Tutorial | EdurekaLinux Mint Tutorial | Edureka
Linux Mint Tutorial | Edureka
 
How to Deploy Java Web App in AWS| Edureka
How to Deploy Java Web App in AWS| EdurekaHow to Deploy Java Web App in AWS| Edureka
How to Deploy Java Web App in AWS| Edureka
 
Importance of Digital Marketing | Edureka
Importance of Digital Marketing | EdurekaImportance of Digital Marketing | Edureka
Importance of Digital Marketing | Edureka
 
RPA in 2020 | Edureka
RPA in 2020 | EdurekaRPA in 2020 | Edureka
RPA in 2020 | Edureka
 
Email Notifications in Jenkins | Edureka
Email Notifications in Jenkins | EdurekaEmail Notifications in Jenkins | Edureka
Email Notifications in Jenkins | Edureka
 
EA Algorithm in Machine Learning | Edureka
EA Algorithm in Machine Learning | EdurekaEA Algorithm in Machine Learning | Edureka
EA Algorithm in Machine Learning | Edureka
 
Cognitive AI Tutorial | Edureka
Cognitive AI Tutorial | EdurekaCognitive AI Tutorial | Edureka
Cognitive AI Tutorial | Edureka
 
AWS Cloud Practitioner Tutorial | Edureka
AWS Cloud Practitioner Tutorial | EdurekaAWS Cloud Practitioner Tutorial | Edureka
AWS Cloud Practitioner Tutorial | Edureka
 
Blue Prism Top Interview Questions | Edureka
Blue Prism Top Interview Questions | EdurekaBlue Prism Top Interview Questions | Edureka
Blue Prism Top Interview Questions | Edureka
 
Big Data on AWS Tutorial | Edureka
Big Data on AWS Tutorial | Edureka Big Data on AWS Tutorial | Edureka
Big Data on AWS Tutorial | Edureka
 
A star algorithm | A* Algorithm in Artificial Intelligence | Edureka
A star algorithm | A* Algorithm in Artificial Intelligence | EdurekaA star algorithm | A* Algorithm in Artificial Intelligence | Edureka
A star algorithm | A* Algorithm in Artificial Intelligence | Edureka
 
Kubernetes Installation on Ubuntu | Edureka
Kubernetes Installation on Ubuntu | EdurekaKubernetes Installation on Ubuntu | Edureka
Kubernetes Installation on Ubuntu | Edureka
 
Introduction to DevOps | Edureka
Introduction to DevOps | EdurekaIntroduction to DevOps | Edureka
Introduction to DevOps | Edureka
 

Recently uploaded

Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 

Recently uploaded (20)

Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 

What are Software Testing Methodologies | Software Testing Techniques | Edureka

  • 1.
  • 2. IMPORTANCE OF SOFTWARE TESTING SOFTWARE TESTING METHODOLOGIES SOFTWARE TESTING TECHNIQUES ➢ BLACK-BOX TECHNIQUES ➢ WHITE-BOX TECHNIQUES ➢ EXPERIENCED-BASED TECHNIQUES www.edureka.co
  • 4. www.edureka.co Disasters Due to Software Flaws Power Blackout Launch Error Satellite Failure Plane Crashes Radioactive Overexposure Register Malfunction ETCS bugs Smart Ship Drowning
  • 5. Best Quality Product www.edureka.co Save Time & Resources Used Customer Satisfaction Brings More ProfitUser Experience Business Optimization
  • 7. www.edureka.co Software testing methodologies are the different strategies, approaches and ways of ensuring that a software application in particular is fully tested. 04 Leverages current technology investments 01 Single integrated testing environment 02 Complete testing solution from day one 03 Provides complete picture of software health
  • 8. www.edureka.cowww.edureka.co Types of Software Testing Methodologies Agile Model Spiral Model V – Model Extreme Programming Scrum Model Testing Methodologies RAD Model Waterfall Model Incremental Model
  • 9. www.edureka.cowww.edureka.co Requirements1 Design2 Implementation3 Verification4 Maintenance5 Waterfall Model is the basic life cycle model which was developed by Winston Royce in 1970. This model represents multiple stages or processes in a sequential manner that flows progressively downward.
  • 10. www.edureka.co Easy to understand & functional Simple enough to manage Saves significant amount of time Allows for easy testing & analysis Allows for departmentalization Risky and uncertain Very short of flexibility Lack of visibility of current progress Can’t edit in testing phase Not suitable for large projects Advantages Disadvantages
  • 11. www.edureka.co Verification & Validation Model V - Model is an extension of Waterfall Model where the process execution takes place in a sequential style in V-Shape. There exists a directly associated testing phase in every single phase of the development cycle. Coding2 Detailed Specifications High Level Design Requirements Analysis Integration Testing Operational Testing Unit Testing Review/Test
  • 12. www.edureka.co Advantages ✓ Simple & easy to understand ✓ Easy to manage ✓ Suitable for small projects ✓ Beneficial ✓ Cost-effective when compared to Waterfall ✓ Overlapping is not present Disadvantages ✓ Absence of clear solutions that help eliminate the software defects ✓ No inherent ability to respond to changes ✓ Leads to testing being squeezed at the end
  • 13. Incremental model is multi-waterfall-model of software testing. The whole incremental process is divided into the various number of cycles. An increment includes three cycles: software designing and realization, testing, and implementation. Requirements Design & Development Testing Implementation Design & Development Testing Implementation Design & Development Testing Implementation Build 1 Build 2 Build 3 Advantage: More flexible & highly effective Disadvantage: Costlier than waterfall model
  • 14. www.edureka.cowww.edureka.co Agile Model, form of iterative & incremental approach involves development of software in incremental, rapid cycles. So, you have small incremental releases of the software, each one building on previous functionalities. Increment 1 Increment 2 Increment 3 Iterative – Incremental Agile Model Reqts Test Code Design Reqts Test Code Design Reqts Test Code Design
  • 15. www.edureka.co Advantages Disadvantages Agile Testing Model offers following advantages: ➢ Adaptive approach that responds to changes favourable ➢ Improves the product quality ➢ Allows for direct communication ➢ Suitable for large & long-term projects ➢ Promotes teamwork ➢ Rapid methodology ➢ Minimum resource requirements ➢ Easy to manage Disadvantages of Agile Model include: ➢ Dependent on clear customer requirements upfront ➢ Increased maintainability risk ➢ Not suitable for complex projects ➢ Lacks documentation efficiency ➢ Chances of getting off-track as outcome are not clear ➢ Not suitable for complex projects
  • 16. www.edureka.cowww.edureka.co The spiral model incorporates iterative development approach along with the systematic approach of the waterfall model. It is similar to the incremental model and emphasis on Risk Analysis.
  • 17. www.edureka.co Advantages Disadvantages Can be costly model to use Requires lot of technical expertise Large number of intermediate stages Highly dependent on risk analysis phase Doesn’t work properly for smaller projects Low risk due to huge amount of risk analysis Requirement changes can be added easily Strong approval & documentation control Good fit for large, mission critical projects Offers rapid development of project
  • 18. RAD, Rapid Application Development Testing Model, is also an incremental model of software development. But with RAD, the focus is on building a prototype that looks and acts like the final product — in order to test its usefulness. www.edureka.co Process Modeling Modeling data flow among functions Business Modeling Modeling data flow in terms of data & obejcts Data Modeling Defining functional process by mapping 2 previous results Using automated tools to convert model to actual code Application Generation Testing new components & performing integration tests Testing & Turnover Term # i 60-90 Days www.edureka.co
  • 19. www.edureka.cowww.edureka.co Advantages Disadvantages Reduced development/testing cycle time Less cost and schedule risk due to time-box approach Enhances customer feedback, due to customer involvement throughout the cycle Requires high skilled resources Requires a system that can be modularized High cost estimation & hard to use with legacy systems
  • 21. www.edureka.co SOFTWARE TESTING TECHNIQUES Exploratory Testing Error Guessing White-BoxTesting Statement Coverage Decision Coverage Condition Coverage Multiple Condition Black-BoxTesting TypesofSoftwareTesting Boundary Value Analysis Equivalence Partition Decision Tables State Transition Diagram Use Case Testing ExperienceBases Testing
  • 23. EquivalencePartitioning www.edureka.co It’s a black-box testing technique, where you group the inputs with same attributes into partitions. Your task is to pick one condition out of each partition, which covers all possible scenarios, to execute test cases This way you can easily identify valid as well as invalid equivalence classes Ex. Testing input conditions accepting numbers from ‘01 to 10 and 20 to 30’ --- to 0 (invalid) 01 to 10 (valid) 11 to 19 (invalid) 20 to 30 (valid) 31 to --- (invalid) -2, 3, 15, 25, 45
  • 24. BoundaryValueAnalysis www.edureka.co Boundary value analysis is the next part of Equivalence partitioning for designing test cases where test cases are selected at the edges of the equivalence classes. It is used to identify errors at boundaries rather than finding those exist in centre of input domain. It includes maximum, minimum, inside or outside edge, typical values or error values Ex. Testing input conditions accepting numbers form ‘1 to 10’ • Input Boundary values: 1, 10 • Values just below extreme edges: 0, 9 • Values just above extreme edges: 2, 11 Boundary values 0,1,2 and 9, 10, 11
  • 25. DecisionTableBasedTechnique www.edureka.co Decision table-based testing aka Cause-effect table, is used for functions that respond to a combination of events or inputs. A Decision Table is a tabular representation of conditions versus test actions. Conditions are considered as inputs, while actions are considered as outputs. Rule 1 Rule 2 Rule 3 Rule 4 Rule 5 Rule 6 Rule 7 Rule 8 INPUT Name Email Message Output Submit F F F F F F F F F F F FT T T T T TT T T T T T F F F F F F F T
  • 26. State Transition Diagram: Using this approach, the tester analyses the behaviour of an application under test (AUT) for different input conditions in a sequence. We can apply this when an application gives a different output for the same input, depending on what has happened in the earlier state. www.edureka.cowww.edureka.co On waiting list Confirmed Archived Null Requested Confirmed Room Requested Not Available Put on list User gives up Remove from list Room Available Decrement room count User Moves In User Vacates Increment room count Confirmed Room Available Decrement room count Customer Cancels Increment room count
  • 27. UseCaseTesting www.edureka.co Use case testing is a functional testing technique, meaning programming skill is not required. ➢ Identify all scenarios from Use Case ➢ For each scenario, define at least one test case and condition ➢ For each scenario, determine the test data for the test System Start System Shutdown Session Invalid PIN Transaction Withdrawal Deposit Transfer Inquiry Operator Customer << include >> << extend >> ATM System Bank
  • 29. www.edureka.co StatementCoverageor LineCoverage In this technique, every statement in the source code is executed at least once. Thereby, we can check what the source code is and is not expected to do. Doesn’t cover negative cases. DecisionCoverageor BranchCoverage This techniques covers all the branches of the code to make sure that no branches leads to abnormal behaviour. Each and every branch from each decision point is executed. INPUT A & B C = A + B IF C>100 PRINT “ITS DONE” INPUT A & B C = A + B IF C>100 PRINT “ITS DONE” ELSE PRINT “ITS PENDING”
  • 30. ConditionCoverage or PredicateCoverage Condition coverage ensures whether all the individual Boolean expressions have been covered and evaluated to both TRUE and FALSE. Stronger criteria compared to line coverage. READ X, Y IF(X == 0 || Y == 0) PRINT ‘0’ MultipleCondition Coverage In this technique, all the possible combinations of the possible outcomes of conditions are tested at least once. #Test Case 1 – X = 0, Y = 55 #Test Case 2 – X = 5, Y = 0 READ X, Y IF(X == 0 || Y == 0) PRINT ‘0’ #Test Case 1 – X = 0, Y = 0 #Test Case 2 – X = 0, Y = 5 #Test Case 3 – X = 55, Y = 0 #Test Case 4 – X = 55, Y = 5 www.edureka.co
  • 32. www.edureka.cowww.edureka.co Exploratory Testing Error Guessing Here, domain experts perform testing just by exploring the functionalities of the application without having the knowledge of the requirements. High severity bugs are found very quickly in this type of testing. Error guessing is one of the testing techniques used to find bugs in a software application based on the tester’s prior experience. In Error guessing, no specific rules are applied
  • 33. Copyright © 2017, edureka and/or its affiliates. All rights reserved. www.edureka.co