{"id":38481,"date":"2024-04-26T23:03:35","date_gmt":"2024-04-26T23:03:35","guid":{"rendered":"http:\/\/localhost\/branding\/software-testing-techniques-test-environment-description\/"},"modified":"2024-04-26T23:03:35","modified_gmt":"2024-04-26T23:03:35","slug":"software-testing-techniques-test-environment-description","status":"publish","type":"post","link":"https:\/\/sheilathewriter.com\/blog\/software-testing-techniques-test-environment-description\/","title":{"rendered":"Software Testing Techniques, Test environment description"},"content":{"rendered":"<p>Software Testing Techniques <\/p>\n<p>Name<\/p>\n<p>Subject\/Unit<\/p>\n<p>Instructor\u2019s Name<\/p>\n<p>September 27, 2014<\/p>\n<p>Project Number 1<\/p>\n<p>Test environment description<\/p>\n<p>The test environment comprises of both the hardware and the software components of the system to be used in testing the software. The test hardware requirements of the system comprises of a personal computer with the following specifications;<\/p>\n<p>3.2 GHz Processor    <\/p>\n<p>512 MB RAM<\/p>\n<p>40 GB Hard Disk and <\/p>\n<p>Other essential Peripherals like; the keyboard, mouse and the display unit (monitor) <\/p>\n<p>The software component of the test environment comprises of; Windows XP (32-bit) Operating System. <\/p>\n<p>Black Box Test Cases<\/p>\n<p>Black box testing, also sometimes referred to as behavioural testing, is a kind of software testing technique in which it is assumed that the internal design, structure and implementation is not known during the testing exercise. Although the tests are usually functional, there are no restrictions to this as it might involve both functional and non-functional testing of the software.   <\/p>\n<p>Test Case 1: Decision Tables  <\/p>\n<p>Consider a bank debiting software with the following checks:<\/p>\n<p>A1: The signature matches<\/p>\n<p>A2: The amount of money in the account is sufficient<\/p>\n<p>A3: The given account is correct <\/p>\n<p>B1: Give money<\/p>\n<p>B2: Issue a statement displaying \u2018Insufficient funds\u2019<\/p>\n<p>B3: Check for fraud by calling the vigilance <\/p>\n<p>Test Inputs <\/p>\n<p>A1: The signature matches<\/p>\n<p>A2: The amount of money in the account is sufficient<\/p>\n<p>A3: The given account is correct <\/p>\n<p>Expected Output <\/p>\n<p>B1: Give money<\/p>\n<p>B2: Issue a statement displaying \u2018Insufficient funds\u2019 <\/p>\n<p>B3: Check for fraud by calling the vigilance<\/p>\n<p>The rules for constructing the decision table are:<\/p>\n<p>A1: when signature matches&#8230;&#8230;..<\/p>\n<p>A2: when the amount of money is sufficient&#8230;&#8230;&#8230;<\/p>\n<p>A3: when the given account number is correct&#8230;&#8230;<\/p>\n<p>Below is the decision table for the above stated rules<\/p>\n<p>Note: The question mark (?) denotes lack of rules denoting the occurrence of that possibility <\/p>\n<p>Condition Entries Account number Money Signature Actions <\/p>\n<p>1 Correct Yes Match A1<\/p>\n<p>2 Correct No Match A2<\/p>\n<p>3 Correct Yes Not match ?<\/p>\n<p>4 Correct No Not match ?<\/p>\n<p>5 Incorrect Yes Match A3<\/p>\n<p>6 Incorrect No Match ?<\/p>\n<p>7 Incorrect Yes Not match ?<\/p>\n<p>8 Incorrect No Not match ?<\/p>\n<p>Test Case 2: State Tables<\/p>\n<p>Consider the star ship modelling software. It has the following drive impulse settings: neutral (n), drive (d) and reverse (r). The actual ship has three possible states: Stopped (s), moving forward (F) and moving backwards (B). The combination of the actual movement of the ship and the impulsive thrusters creates a total of nine steps as shown in the table below<\/p>\n<p>.dF .nF .rF<\/p>\n<p>.dS .nS .rS<\/p>\n<p>.dB .nB .nS<\/p>\n<p>Possible Inputs<\/p>\n<p>r&gt;r, n&gt;n, d&gt;d, d&gt;n, n&gt;d, r&gt;n and n&gt;rPossible Outputs  <\/p>\n<p>It is required that one has to go through neutral before getting to reverse or drive<\/p>\n<p>Each and every thruster is turned off in neutral, translating to: d&lt; &gt;n&lt; &gt;r. <\/p>\n<p>State r&gt;rn&gt;nd&gt;dd&gt;n,n&gt;dr&gt;nn&gt;rr&gt;dd&gt;rRB RB NB RS RB NS RF RS NF NB NB DB RB NS NS DS RS NF NF DF RF DB DS NB DS DF NS DF DF NF White Box Test Cases  <\/p>\n<p>White testing, also known as structural testing, tests the internal function of the software as seen by the developer by focusing on the internal structure and logic of the program code. It is principally employed in detecting logical errors in software, locating random topological errors, debugging the software and discovering incorrect programming statements.  <\/p>\n<p>Test case 1: Statement Coverage Testing <\/p>\n<p>Consider insurance premium calculation software for the drivers as shown in the flow chart below<\/p>\n<p>Age&lt;25 (Male and Married)<\/p>\n<p>AC<\/p>\n<p>Premium=premium+1000<\/p>\n<p>true<\/p>\n<p>Age&lt;25 (Female or married)<\/p>\n<p>False<\/p>\n<p>Premium=premium+100<\/p>\n<p>trueD<\/p>\n<p>Return Premium <\/p>\n<p>Age&gt;=46 and Age&lt;=65<\/p>\n<p>Premium=premium+150<\/p>\n<p>B<\/p>\n<p>E<\/p>\n<p>False<\/p>\n<p>Ftrue<\/p>\n<p>G<\/p>\n<p>The requirement is; each node ought to be traversed at least once as shown in the as shown in the flow graph below<\/p>\n<p>A<\/p>\n<p>G<\/p>\n<p>E<\/p>\n<p>F<\/p>\n<p>D<\/p>\n<p>B<\/p>\n<p>C<\/p>\n<p>The table below contains the test conditions, the input and the expected output for the software. <\/p>\n<p>Test Condition  Input Output <\/p>\n<p>1 (Age&lt;=25) &amp;&amp; (gender.equals(\u2018male\u2019) &amp;&amp; (!married) Age=20<\/p>\n<p>Gender= \u2018male\u2019<\/p>\n<p>Married=false 1300<\/p>\n<p>2 Married || gendere.equal (\u2018female\u2019) (age &gt;=46 &amp;&amp; age&lt;=65) Age=60<\/p>\n<p>Gender=\u2019male\u2019<\/p>\n<p>Married=20 50<\/p>\n<p>Test case 2: Branch Coverage Testing <\/p>\n<p>The second test case uses the specifications of the first test case (insurance premium calculations software) to determine\/test branch coverage. The edge traversal is carried out at least once. The outcomes are expected to be true and false. For every decision, the decision coverage determines the decision for the percentage of the sum total of the paths traversed. The test cases condition, inputs and output for the branch coverage is shown in the table below.  <\/p>\n<p>Test Condition  Input Output <\/p>\n<p>1 (Age&lt;=25) &amp;&amp; (gender.equals(\u2018male\u2019) &amp;&amp; (!married) Age=20<\/p>\n<p>Gender= \u2018male\u2019<\/p>\n<p>Married=false 1300<\/p>\n<p>2 Married || gendere.equal (\u2018female\u2019) (age &gt;=46 &amp;&amp; age&lt;=65) Age=60<\/p>\n<p>Gender=\u2019male\u2019<\/p>\n<p>Married=20 50<\/p>\n<p>3 Married || gender.equals(\u2018female\u2019)  Age=35<\/p>\n<p>Gender=\u2019female\u2019<\/p>\n<p>Married=false 200<\/p>\n<p>4 Married || gender.equals(\u2018female\u2019) Age=35<\/p>\n<p>Gender=\u2019male\u2019<\/p>\n<p>Married=false 300<\/p>\n<p>Traceability Matrix <\/p>\n<p>The traceability matrix is represented in the above tables <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Software Testing Techniques Name Subject\/Unit Instructor\u2019s Name September 27, 2014 Project Number 1 Test environment description The test environment comprises<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-38481","post","type-post","status-publish","format-standard","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Software Testing Techniques, Test environment description - sheilathewriter<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sheilathewriter.com\/blog\/software-testing-techniques-test-environment-description\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Software Testing Techniques, Test environment description - sheilathewriter\" \/>\n<meta property=\"og:description\" content=\"Software Testing Techniques Name Subject\/Unit Instructor\u2019s Name September 27, 2014 Project Number 1 Test environment description The test environment comprises\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sheilathewriter.com\/blog\/software-testing-techniques-test-environment-description\/\" \/>\n<meta property=\"og:site_name\" content=\"sheilathewriter\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-26T23:03:35+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sheilathewriter.com\/blog\/software-testing-techniques-test-environment-description\/\",\"url\":\"https:\/\/sheilathewriter.com\/blog\/software-testing-techniques-test-environment-description\/\",\"name\":\"Software Testing Techniques, Test environment description - sheilathewriter\",\"isPartOf\":{\"@id\":\"https:\/\/sheilathewriter.com\/blog\/#website\"},\"datePublished\":\"2024-04-26T23:03:35+00:00\",\"author\":{\"@id\":\"https:\/\/sheilathewriter.com\/blog\/#\/schema\/person\/f5844d28db4a1882523a0a69560bf0ab\"},\"breadcrumb\":{\"@id\":\"https:\/\/sheilathewriter.com\/blog\/software-testing-techniques-test-environment-description\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sheilathewriter.com\/blog\/software-testing-techniques-test-environment-description\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sheilathewriter.com\/blog\/software-testing-techniques-test-environment-description\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sheilathewriter.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Software Testing Techniques, Test environment description\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sheilathewriter.com\/blog\/#website\",\"url\":\"https:\/\/sheilathewriter.com\/blog\/\",\"name\":\"sheilathewriter\",\"description\":\"Custom essay writing\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sheilathewriter.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/sheilathewriter.com\/blog\/#\/schema\/person\/f5844d28db4a1882523a0a69560bf0ab\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sheilathewriter.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9cf817440d627e98709fcac9c5cc379958985e679d683af80df1879b5a471013?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9cf817440d627e98709fcac9c5cc379958985e679d683af80df1879b5a471013?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"http:\/\/opskill.com\/propapers\"],\"url\":\"https:\/\/sheilathewriter.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Software Testing Techniques, Test environment description - sheilathewriter","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sheilathewriter.com\/blog\/software-testing-techniques-test-environment-description\/","og_locale":"en_US","og_type":"article","og_title":"Software Testing Techniques, Test environment description - sheilathewriter","og_description":"Software Testing Techniques Name Subject\/Unit Instructor\u2019s Name September 27, 2014 Project Number 1 Test environment description The test environment comprises","og_url":"https:\/\/sheilathewriter.com\/blog\/software-testing-techniques-test-environment-description\/","og_site_name":"sheilathewriter","article_published_time":"2024-04-26T23:03:35+00:00","author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/sheilathewriter.com\/blog\/software-testing-techniques-test-environment-description\/","url":"https:\/\/sheilathewriter.com\/blog\/software-testing-techniques-test-environment-description\/","name":"Software Testing Techniques, Test environment description - sheilathewriter","isPartOf":{"@id":"https:\/\/sheilathewriter.com\/blog\/#website"},"datePublished":"2024-04-26T23:03:35+00:00","author":{"@id":"https:\/\/sheilathewriter.com\/blog\/#\/schema\/person\/f5844d28db4a1882523a0a69560bf0ab"},"breadcrumb":{"@id":"https:\/\/sheilathewriter.com\/blog\/software-testing-techniques-test-environment-description\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sheilathewriter.com\/blog\/software-testing-techniques-test-environment-description\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/sheilathewriter.com\/blog\/software-testing-techniques-test-environment-description\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sheilathewriter.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Software Testing Techniques, Test environment description"}]},{"@type":"WebSite","@id":"https:\/\/sheilathewriter.com\/blog\/#website","url":"https:\/\/sheilathewriter.com\/blog\/","name":"sheilathewriter","description":"Custom essay writing","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sheilathewriter.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/sheilathewriter.com\/blog\/#\/schema\/person\/f5844d28db4a1882523a0a69560bf0ab","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sheilathewriter.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9cf817440d627e98709fcac9c5cc379958985e679d683af80df1879b5a471013?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9cf817440d627e98709fcac9c5cc379958985e679d683af80df1879b5a471013?s=96&d=mm&r=g","caption":"admin"},"sameAs":["http:\/\/opskill.com\/propapers"],"url":"https:\/\/sheilathewriter.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/posts\/38481","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/comments?post=38481"}],"version-history":[{"count":0,"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/posts\/38481\/revisions"}],"wp:attachment":[{"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/media?parent=38481"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/categories?post=38481"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/tags?post=38481"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}