You are on page 1of 26

Testing Strategies

Purpose of Debugging
Debugging is a way to improve the quality of the product by introducing a new
known defect. It is also used in determining the reliability of test set/test suite. It
is achieved NOT by developing more tests but by introducing new defects.
Debugging Guidelines
• The first step cannot be emphasized enough.

• Use top down development for your algorithms, and use modular programming
for your implementation.

• Document your program using comments as you write it. ...

• Trace your program flow manually. ...

• If your compiler comes with a symbolic debugger, learn to use it.


White Box Testing Vs Black Box Testing
Mobile App Tesing
METRICS FOR DESIGN
METRICS FOR MAINTENANCE
FUNCTION POINT CALCULATION- Example
CYCLOMATIC COMPLEXITY
Cyclomatic Complexity Calculation -Example
Example : 2
BASIS PATH TESTING
Software Configuration Management

Software Configuration Management(SCM) is a process to systematically


manage, organize, and control the changes in the documents, codes, and other
entities during the Software Development Life Cycle.

The primary goal is to increase productivity with minimal mistakes.


SCM is part of cross-disciplinary field of configuration management and it can
accurately determine who made which revision.
SCM Process

It uses the tools which keep that the necessary change has been implemented adequately to the

appropriate component. The SCM process defines a number of tasks:

•Identification of objects in the software configuration

•Version Control

•Change Control

•Configuration Audit

•Status Reporting
Test Cases for ATM
1. Verify the ‘ATM Card Insertion Slot’ is as per the specification
2. Verify the ATM machine accepts card and PIN details
3. Verify the error message by inserting a card incorrectly
4. Verify the error message by inserting an invalid card (Expired
Card)
5. Verify the error message by entering an incorrect PIN
6. Verify that the user is asked to enter the PIN after inserting a
valid ATM Card
7. Verify that PIN is encrypted
8. Verify that there is an action like blocking of card occurs when
the total no. of incorrect PIN attempts get surpassed
9. Verify the user is allowed to do only one cash withdrawal
transaction per PIN request
10. Verify the machine logs out of the user session immediately
after successful withdrawal

You might also like