Tuesday, October 22, 2013

Bug Life Cycle


1) Tester ----new----Test Lead----open----Development Lead ----Developer-----Fixed----Tester
Tester----re-open----Developer

When a tester finds a defect he assigns a new status for the defect and passes it to the test lead.

The test lead  verifies the defect and assigns a open status and passes it to the development lead.


The development lead then  verifies the bug and assigns it the developer.

After that the developer works on the defect fixes it and assigns it back to the tester with a fixed status.

After the tester test to see if the defect still exist. If it doesn't exist the status has been changed to closed.

However, if it still exist then tester reopens the case and sends it back to the developer.


Restesting VS Regression Testing


Regression Testing
check whether the bug or defect has not impacted the existing application

Retesting
Verify the bug or defect itself.

Monday, October 21, 2013

When does the QA come into the Project

QA needs to work from the beginning of project. This will make sure that the customers expectations are met for the quality standards.The  QA also communicates between the major teams to ensure a good test environment is set up.

Difference Between Builds, Release & Version



Build - Application is still in testing phase.

Release- Application is ready for the client.
Updates are done in the same module with o some change in requirements.

Version-  Its a whole new module

3 Quality Assurance Requirments

To Test
1) Completeness
2) Feasiblity
3) if its testable

Saturday, October 19, 2013

Different Types of Application


1) Desktop Application
Microsoft word, any desktop application

2) Client Server Application
client request service from the server
OS on the client gathers information from the Server.

3) Web Server Application
Web Browser relies on the Web Server for information

4) Web Application
Cibc.com


5) Mobile Application

6) Cloud Virtual Server Application
On a Cloud server, always online.

Different Types of Software Testing

Different Types of Testing

Functional Testing
To test if commands are functioning the way they are supposed to function
ie. Valid Data & Invalid Data

GUI Testing
Graphical User Interface Testing
To test if the GUI meets the requirements in areas such as font, color, size, alignment and other properties

Smoke Testing
Set of test cases executed confirm if an application is ready for further testing

Database Testing - To test the quality of data in which the following are checked
a) Completeness
b) Accuracy
c) Duplication
d) Stored in proper location

AD-HOC Testing 
To test the application without any formal documentation.

Regression Testing
Set of test cases executed to confirm if  the new changes has not impacted the existing application.

Integrity Testing
Testing of two or more module  to ensure they are working together.

Browser Testing
To test the compatibility of different browsers with applications

What is SDLC ?

It stands for software development life cycle.  Its the different stages of development of a software development life cycle.

1) Planning
The project manager understand the business requirements and identifies the problems

2) Analyst
Gathers the requirement for the projects
These include the business analysis, and system analysis

3) Design
Develop specifications requirements input/ output

4) Development
Writing programs and creating database

5) Testing
Testing the software

6)  Implementation
Install the product, ready for deployment

7) Maintenance
Help desk for support
Where changes and corrections are made

Saturday, April 20, 2013

OSI Model: Open Systems Interconnection Reference Model

Lesson One: OSI Model: open Systems Interconnection Reference Model


7 Layers: All People Seem To need data processing
7. Applications

It sets up communication between Applications and lower layer network services.

The network needs to interpret application request and the application can interpret data to be sent to the network.

 

- In this Layer we see

-HTTP, FTP, DNS, POP3

-this is where all the applications work.

-separates data into PDUs (protocol data units) or discrete amounts of data.

 

 

 

6. Presentation

-Character encoding

-Application encryption and decryption

Often combined with Application layer

-Presentation layer accepts data from the application layer and formats so that I can be readable.

 

 

5. Session

-Communication management between devices


-Half-duplex, full-duplex (way of communication)
-Controls protocols, tunneling protocols

-Session is a connection of a data exchange between two parties.

-Another purpose is that it  establishes and keeps  communication alive between networks And it determines if a connection is cut-off or not.

An example, is an ISP and your computer negotiating a connection. If your physical connections is disconnected that is a fail session.

 

4. Transport

-The Post office layer

-Parcels and letters

-Transport takes info from the session layer and it make sure it reaches its end. If data is being transferred from point A to B it assures reliability and make sure its sent without erros.


TCP(Transmission Control Protocol) and UDP (User Datagram Protocol)

-TCP is connection oriented.

-UDP is not connection oriented. Basically Connectionless.
 

 

3. Network Layer
The routing layer
Internet Protocols are in this layer
Network layer function is to translate network address into the devices and decide how they routed from the sender to the receiver.

IP Fragmentation Process
-If bytes are too big they are broken and sent through IP header. Split into 3 separate frames. The fragments will always be in multiplea of 8.
 

2. Data Link
Basic network "language"
MAC (Media Accesss Control) address on Ethernet
Every device has a MAC address
You can find the MAC address by IP address
Switch
Data links purpose is to divide data they receive from the network layer into distinct frames so it can be sent to the physical layer.

Data link is divided into 2 sub layers

-Logical Link Control (which provides common setting, reliability and flow of control) (issues requests for the data errors)

-Media Access Control (Takes the MAC address and attaches to the frame)

 

 

1. Physical
Signaling, cabling, connectors
This layer isn't about protocols
Protocols that detect signals

you have a physical layer problem

-Fix your cabling, punch-downs etc.