Planning: Testing Making your program ‘crash proof’

Slides:



Advertisements
Similar presentations
Testing and Inspecting to Ensure High Quality
Advertisements

PHP Form and File Handling
Chapter 3: Editing and Debugging SAS Programs. Some useful tips of using Program Editor Add line number: In the Command Box, type num, enter. Save SAS.
Commercial Data Processing Lesson 3: Data Validation.
CMSC 345, Version 11/07 SD Vick from S. Mitchell Software Testing.
Stack-Based Buffer Overflows Attacker – Can take over a system remotely across a network. local malicious users – To elevate their privileges and gain.
Integration testing Satish Mishra
1 CODE TESTING Principles and Alternatives. 2 Testing - Basics goal - find errors –focus is the source code (executable system) –test team wants to achieve.
Database Integrity, Security and Recovery Database integrity Database integrity Database security Database security Database recovery Database recovery.
Importance of testing Difference between Errors and Faults The purpose of test data Importance of: – Testing – Test Plans.
Testing an individual module
1 Assuring the Quality of your COSF Data. 2 What factors work to improve the quality of your data? What factors work to lessen the quality of your data?
Validation and Verification Today will look at: The difference between accuracy and validity Explaining sources of errors and how they could be overcome.
Functional Testing.
[ §4 : 1 ] 4. Requirements Processes II Overview 4.1Fundamentals 4.2Elicitation 4.3Specification 4.4Verification 4.5Validation Software Requirements Specification.
Lesson 32: Designing a Relational Database. 2 Lesson Objectives After studying this lesson, you will be able to:  Identify and apply principles for good.
28/08/2015SJF L31 F21SF Software Engineering Foundations ASSUMPTIONS AND TESTING Monica Farrow EM G30 Material available on Vision.
Input Design Objectives
Exceptions COMPSCI 105 S Principles of Computer Science.
©Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 20 Slide 1 Integration testing l Tests complete systems or subsystems composed of integrated.
Ensure that the Field Day Call Sign is correct.
CS4311 Spring 2011 Unit Testing Dr. Guoqiang Hu Department of Computer Science UTEP.
Pointers CS362. Pointers A Pointer is a variable that can hold a memory address Pointers can be used to: Indirectly reference existing variables (sometimes.
1 Phase Testing. \ 2 Overview of Implementation phase Create Class Skeletons Define Implementation Plan (+ determine subphases) Define Coding Standards.
Input, Output, and Processing
Functions and Procedures. Function or Procedure u A separate piece of code u Possibly separately compiled u Located at some address in the memory used.
Dynamic memory allocation and Pointers Lecture 4.
Sadegh Aliakbary Sharif University of Technology Fall 2010.
DATA ERRORS. Introduction The processing of incorrect data can produce ridiculous and embarrassing output. Errors can take time to sort out and can be.
Today’s Agenda  Reminder: HW #1 Due next class  Quick Review  Input Space Partitioning Software Testing and Maintenance 1.
1 Original Source : and Problem and Problem Solving.ppt.
AS Level ICT Data entry: Problems with errors. Garbage in; Garbage out If incorrect data is entered into a data management system, the results of any.
Practical Programming COMP153-08S Week 5 Lecture 1: Screen Design Subroutines and Functions.
Software testing techniques Software testing techniques Interface Testing Presentation on the seminar Kaunas University of Technology.
Introduction to Loops Iteration Repetition Counting Loops Also known as.
Data Validation.
AS Level ICT Data entry: Creating validation checks.
Office of Housing Choice Voucher Program Voucher Management System – VMS Version Released October 2011.
Chapter 3 Data Control Ensure the Accurate and Complete data is entering into the data processing system.
EGR 115 Introduction to Computing for Engineers Branching & Program Design – Part 3 Friday 03 Oct 2014 EGR 115 Introduction to Computing for Engineers.
1 The Software Development Process ► Systems analysis ► Systems design ► Implementation ► Testing ► Documentation ► Evaluation ► Maintenance.
Module Four: Entering NT Data Into SIS. Introduction – Entering NT Data The Enter NT Data screen will enable you to enter NT data into SIS. From this.
Think First, Code Second Understand the problem Work out step by step procedure for solving the problem (algorithm) top down design and stepwise refinement.
Testing.
IT323 - Software Engineering 2 1 Tutorial 6.  Using your java, C# or other programming language skill, derive a checklist of common errors (NOT syntax.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 23 Slide 1 Software testing.
Chapter 3 Part II. 3.8 Placing a Class in a Separate File for Reusability.cpp file is known as a source-code file. Header files ◦ Separate files in which.
Struts2 Validation using XML Approach. May 12, 2011 Need For Validation Validation can be defined as the assessment of an action so as to ensure that.
Defensive Programming. Good programming practices that protect you from your own programming mistakes, as well as those of others – Assertions – Parameter.
CS 115 Lecture 5 Math library; building a project Taken from notes by Dr. Neil Moore.
Programming Logic and Design Fourth Edition, Comprehensive Chapter 10 Using Menus and Validating Input.
Test Plans Test Driven Development – Unit test plan first Code coverage Automated Regression built as you go Debug is easier Serves as system doc – Still.
Dynamic Black-Box Testing Part 1 What is dynamic black-box testing? How to reduce the number of test cases using: Equivalence partitioning Boundary value.
Web Development Web Servers.
Chapter 6: Modular Programming
Chapter 8 – Software Testing
Chapter 18 Software Testing Strategies
Systems Life Cycle: Testing
Functions and Procedures
Lecture 09:Software Testing
How can errors in data occur when using an ICT system?
Part B – Structured Exception Handling
Business and IT Architecture for ESS validation
POWERPOINT PRESENTATION
Data Types Every variable has a given data type. The most common data types are: String - Text made up of numbers, letters and characters. Integer - Whole.
Unit 5 – Testing The mark scheme
Well Come To Our Presentation Accounting Information System Topic: Report on Revenue Cycle.
Defensive Programming
Presentation transcript:

Planning: Testing Making your program ‘crash proof’

Purpose Ensures that each separate part of a program works as expected. – Functions() and Procedures() Ensures that when combined all parts work as expected: – They receive the correct parameters and return the correct data Makes the development cycle more efficient

What to test Expected inputs: – If used as intended are ‘normal inputs’ processed as expected Boundary inputs: – Inputs at the top and bottom limits of ‘normal inputs’ Invalid inputs: – Those which are unacceptable and may crash the program

Eg “Enter your age” ExampleInput TypeResult 12Valid (if Int data type)Program continues 12.5Valid (if Float data type)Program continues 1Boundary (minimum)Program continues 120Invalid (Too high)Error msg displayed. AbcInvalid (wrong data type)Error msg displayed NULL (no entry)Invalid (Cannot be “ “)Error msg displayed TwelveInvalid (wrong data type)Error msg displayed Each entry MUST be tested and the appropriate response confirmed. Errors MUST be trapped (identified) and addressed. Failure to do so will crash your program!!

Good Testing Does identify errors.. These are normal Usually need more time and more code than the program itself Must be structured and documented – What you tested – Where in the program – What was the outcome