11. TESTING
PURPOSES
4 Optimizing algorithm and
performance
3 Correctness of output data
(return values)
2 Error handling
Checking input values (parameter)
1 Functional correctness and
completeness
11
12. TESTING STRATEGIES
12
• Each part tested individually
• All components tested at least once
• Internal structure/ design/
implementation
13. Unit Test Cases
13
Database Creation
Login Page
Header & Footer
User Input Validation
Payment Process
User Registration
Upload/Download Material
Search Box
User Authentication
14. Unit Test Cases
14
Database Creation
Data Mapping
Data Integrity
Database Schema
Login page
Features of Login Page
Functional Verification
15. Unit Test Cases
15
Header & Footer
Display
Menu bar
Connection server to users
User Input Validation
Validating file fields
Return Values
Error alert
16. Unit Test Cases
16
Payment Process
Link and Connection
buy option redirection
User Registration
Basic Field Validations
Record to database system
17. Unit Test Cases
17
Upload and Download items
File data properties
File open Dialogs File
Filters(Supported File Types)
File storage
18. Unit Test Cases
18
Search Box
Correct Result
Key word testing
User Authentication
User account created
Account Testing
Password Testing
20. Client Functional Requirement
• User can create a profile
• User can upload books and study material into website
• User can download the books and study materials
• User can buy or sell the item
• Payment Process
20
49. Made with by Tommy, Harsh and Sajal.
THANK YOU !
Hope you like our project :)
50. References
Allen, E. S. (2009). Making TextBooks Affordable. Retrieved from Student Government Resource Center:
www.StudentGovResources.org.
AtefehTajpour, M. M. (2010). SQL injection detection and prevention tools assessment. 3rd IEEE International Conference on
Computer Science and Information Technology (pp. 518-522). Chengdu: IEEE.
Agile method and Extreme Programming: Differences and Similarities. (2008, July). Retrieved May 2017, from IT Passion:
https://mauriziostorani.wordpress.com/2008/07/04/agile-method-and-extreme-programming-differences-and-similarities/
Arbaugh and Benbunan-Fich, 2006J. Arbaugh, R. Benbunan-Fich
An investigation of epistemological and social dimensions of teaching in online learning environments The Academy of
Management Learning and Education, 5 (4) (2006), pp. 435–447
Arbaugh and Benbunan-Fich, 2006J. Arbaugh, R. Benbunan-Fich
An investigation of epistemological and social dimensions of teaching in online learning environments The Academy of
Management Learning and Education, 5 (4) (2006), pp. 435–447
Bachman, C. W. (2009). The Origin of Integrated Data Store (IDS) Direct-Access DBMS. IEEE Annals of the History of Computing, 42-
54.
Brey, P. A., & E. (2012). Anticipating ethical issues in emerging IT. Ethics and Information Technology, 14(4), 305-317.
doi:http://dx.doi.org/10.1007/s10676-012-9293-y
Bajpai, R. G. (2014). A keyword-driven tool for testing Web applications. IEEE Potentials Mazagine.
Boesso, G., & Kumar, K. (2016). Examining the association between stakeholder culture, stakeholder salience and stakeholder
engagement activities. Management Decision, 54(4), 815-831. Retrieved from
https://search.proquest.com/docview/1786770188?accountid=63189
Brodie, M. L. (1980). Data Quality in Information Systems. Information & Management, 245-258.
Gong, J. (2016). Research on the computer-aided business process management based on data mining and apriori algorithm.
Revista Ibérica De Sistemas e Tecnologias De In-formação,, 332-342. Retrieved from
https://search.proquest.com/docview/1834029202?accountid=63189
50