fbpx

Technology News

41. Endurance Testing: Type of testing which checks for memory leaks or other problems that may occur with prolonged execution. It is usually performed by performance engineers. 42. Exploratory Testing: Black box testing technique performed without planning and documentation. It is usually performed by manual testers. 43. Equivalence Partitioning...

1. Acceptance Testing: Formal testing conducted to determine whether or not a system satisfies its acceptance criteria and to enable the customer to determine whether or not to accept the system. It is usually performed by the customer. 2. Accessibility Testing: Type of testing which determines the usability...

Quality Management is used to ensure that all the activities related to product design, develop and implement are efficient and effective to the system in terms of all quality aspects. Quality management have three main components Quality Control: in other terms quality control is the process of testing...

Software testing test suites are basically collection or group or test cases which are created to test the application for specific behavior. for example after regression testing some modules needs to be tested for impacts, to verify this tester asks the list of impacted modules...

Traceability Matrix or Requirement Traceability Matrix – RTM are data represented in table or graphical representation which is used to trace the requirements during the Software development life Cycle. It can be used for forward tracing that is from Requirements to Design or Coding or...

21. Breadth Testing: A test suite that exercises the full functionality of a product but does not test features in detail. It is performed by testing teams. 22. Black box Testing: A method of software testing that verifies the functionality of an application without having specific knowledge of...

Last month OWASP has released list of top 10 vulnerabilities for 2013. This list is a release candidate, but is more through with business level security testing. OWASP top 10 2013 list is as follows (Reference: www.owasp.org) Injection: Injection flaws, such as SQL, OS, and LDAP injection...

Same as any web or desktop application mobile application needs to be tested for functional and non-functional testing, but the way we test mobile application differs from a desktop or web application. If we look at black box functional testing of mobile application it needs...

Many times we do installation without changing default values and one of them is hostname in operating system. In this post easy steps provided to change the host name of UBUNTU based operating system. Step 1: edit hostname file. Logon as root or sudo user to edit...

Following are the standards as defined by IEEE for Software Testing and can be used for Quality Assurance or Quality Control of product. IEEE 829  A standard for the format of documents used in different stages of software testing. IEEE 1061 A methodology for establishing quality requirements, identifying, implementing,...