Tuesday, October 22, 2013
Bug Life Cycle
1) Tester ----new----Test Lead----open----Development Lead ----Developer-----Fixed----Tester
Tester----re-open----Developer
When a tester finds a defect he assigns a new status for the defect and passes it to the test lead.
The test lead verifies the defect and assigns a open status and passes it to the development lead.
The development lead then verifies the bug and assigns it the developer.
After that the developer works on the defect fixes it and assigns it back to the tester with a fixed status.
After the tester test to see if the defect still exist. If it doesn't exist the status has been changed to closed.
However, if it still exist then tester reopens the case and sends it back to the developer.
Restesting VS Regression Testing
Regression Testing
check whether the bug or defect has not impacted the existing application
Retesting
Verify the bug or defect itself.
Monday, October 21, 2013
When does the QA come into the Project
QA needs to work from the beginning of project. This will make sure that the customers expectations are met for the quality standards.The QA also communicates between the major teams to ensure a good test environment is set up.
Difference Between Builds, Release & Version
Build - Application is still in testing phase.
Release- Application is ready for the client.
Updates are done in the same module with o some change in requirements.
Version- Its a whole new module
Saturday, October 19, 2013
Different Types of Application
1) Desktop Application
Microsoft word, any desktop application
2) Client Server Application
client request service from the server
OS on the client gathers information from the Server.
3) Web Server Application
Web Browser relies on the Web Server for information
4) Web Application
Cibc.com
5) Mobile Application
6) Cloud Virtual Server Application
On a Cloud server, always online.
Labels:
Applications,
Client Server,
Cloud,
mobile,
Web
Different Types of Software Testing
Different Types of Testing
Functional Testing
To test if commands are functioning the way they are supposed to function
ie. Valid Data & Invalid Data
GUI Testing
Graphical User Interface Testing
To test if the GUI meets the requirements in areas such as font, color, size, alignment and other properties
Smoke Testing
Set of test cases executed confirm if an application is ready for further testing
Database Testing - To test the quality of data in which the following are checked
a) Completeness
b) Accuracy
c) Duplication
d) Stored in proper location
AD-HOC Testing
To test the application without any formal documentation.
Regression Testing
Set of test cases executed to confirm if the new changes has not impacted the existing application.
Integrity TestingTesting of two or more module to ensure they are working together.
Browser Testing
To test the compatibility of different browsers with applications
Functional Testing
To test if commands are functioning the way they are supposed to function
ie. Valid Data & Invalid Data
GUI Testing
Graphical User Interface Testing
To test if the GUI meets the requirements in areas such as font, color, size, alignment and other properties
Smoke Testing
Set of test cases executed confirm if an application is ready for further testing
Database Testing - To test the quality of data in which the following are checked
a) Completeness
b) Accuracy
c) Duplication
d) Stored in proper location
AD-HOC Testing
To test the application without any formal documentation.
Regression Testing
Set of test cases executed to confirm if the new changes has not impacted the existing application.
Integrity TestingTesting of two or more module to ensure they are working together.
Browser Testing
To test the compatibility of different browsers with applications
What is SDLC ?
It stands for software development life cycle. Its the different stages of development of a software development life cycle.
1) Planning
The project manager understand the business requirements and identifies the problems
2) Analyst
Gathers the requirement for the projects
These include the business analysis, and system analysis
3) Design
Develop specifications requirements input/ output
4) Development
Writing programs and creating database
5) Testing
Testing the software
6) Implementation
Install the product, ready for deployment
7) Maintenance
Help desk for support
Where changes and corrections are made
1) Planning
The project manager understand the business requirements and identifies the problems
2) Analyst
Gathers the requirement for the projects
These include the business analysis, and system analysis
3) Design
Develop specifications requirements input/ output
4) Development
Writing programs and creating database
5) Testing
Testing the software
6) Implementation
Install the product, ready for deployment
7) Maintenance
Help desk for support
Where changes and corrections are made
Saturday, April 20, 2013
OSI Model: Open Systems Interconnection Reference Model
Lesson One: OSI Model: open Systems Interconnection Reference Model
7 Layers: All People Seem To need data processing
7. Applications
It sets up communication between Applications and lower layer network services.
The network needs to interpret application request and the application can interpret data to be sent to the network.
- In this Layer we see
-HTTP, FTP, DNS, POP3
-this is where all the applications work.
-separates data into PDUs (protocol data units) or discrete amounts of data.
6. Presentation
-Character encoding
-Application encryption and decryption
Often combined with Application layer
-Presentation layer accepts data from the application layer and formats so that I can be readable.
5. Session
-Communication management between devices
-Half-duplex, full-duplex (way of communication)
-Controls protocols, tunneling protocols
-Session is a connection of a data exchange between two parties.
-Another purpose is that it establishes and keeps communication alive between networks And it determines if a connection is cut-off or not.
An example, is an ISP and your computer negotiating a connection. If your physical connections is disconnected that is a fail session.
4. Transport
-The Post office layer
-Parcels and letters
-Transport takes info from the session layer and it make sure it reaches its end. If data is being transferred from point A to B it assures reliability and make sure its sent without erros.
TCP(Transmission Control Protocol) and UDP (User Datagram Protocol)
-TCP is connection oriented.
-UDP is not connection oriented. Basically Connectionless.
3. Network Layer
The routing layer
Internet Protocols are in this layer
Network layer function is to translate network address into the devices and decide how they routed from the sender to the receiver.
IP Fragmentation Process
-If bytes are too big they are broken and sent through IP header. Split into 3 separate frames. The fragments will always be in multiplea of 8.
2. Data Link
Basic network "language"
MAC (Media Accesss Control) address on Ethernet
Every device has a MAC address
You can find the MAC address by IP address
Switch
Data links purpose is to divide data they receive from the network layer into distinct frames so it can be sent to the physical layer.
Data link is divided into 2 sub layers
-Logical Link Control (which provides common setting, reliability and flow of control) (issues requests for the data errors)
-Media Access Control (Takes the MAC address and attaches to the frame)
1. Physical
Signaling, cabling, connectors
This layer isn't about protocols
Protocols that detect signals
you have a physical layer problem
-Fix your cabling, punch-downs etc.
7 Layers: All People Seem To need data processing
7. Applications
It sets up communication between Applications and lower layer network services.
The network needs to interpret application request and the application can interpret data to be sent to the network.
- In this Layer we see
-HTTP, FTP, DNS, POP3
-this is where all the applications work.
-separates data into PDUs (protocol data units) or discrete amounts of data.
6. Presentation
-Character encoding
-Application encryption and decryption
Often combined with Application layer
-Presentation layer accepts data from the application layer and formats so that I can be readable.
5. Session
-Communication management between devices
-Half-duplex, full-duplex (way of communication)
-Controls protocols, tunneling protocols
-Session is a connection of a data exchange between two parties.
-Another purpose is that it establishes and keeps communication alive between networks And it determines if a connection is cut-off or not.
An example, is an ISP and your computer negotiating a connection. If your physical connections is disconnected that is a fail session.
4. Transport
-The Post office layer
-Parcels and letters
-Transport takes info from the session layer and it make sure it reaches its end. If data is being transferred from point A to B it assures reliability and make sure its sent without erros.
TCP(Transmission Control Protocol) and UDP (User Datagram Protocol)
-TCP is connection oriented.
-UDP is not connection oriented. Basically Connectionless.
3. Network Layer
Internet Protocols are in this layer
Network layer function is to translate network address into the devices and decide how they routed from the sender to the receiver.
IP Fragmentation Process
2. Data Link
MAC (Media Accesss Control) address on Ethernet
Every device has a MAC address
You can find the MAC address by IP address
Switch
Data links purpose is to divide data they receive from the network layer into distinct frames so it can be sent to the physical layer.
Data link is divided into 2 sub layers
-Logical Link Control (which provides common setting, reliability and flow of control) (issues requests for the data errors)
-Media Access Control (Takes the MAC address and attaches to the frame)
1. Physical
This layer isn't about protocols
Protocols that detect signals
you have a physical layer problem
-Fix your cabling, punch-downs etc.
Subscribe to:
Posts (Atom)