FAQ Testing
FAQ Testing
FAQ Testing
Diff stages between open and fixed status in defect bug cycle
Black box testing: Not based on any knowledge of internal design or code. Tests are
based on requirements and functionality.
White box testing: based on knowledge of the internal logic of an application’s code.
Tests are based on coverage of code statements, branches, paths, conditions.
Unit testing: the most ‘micro’ scale of testing; to test particular functions or code
modules. Typically done by the programmer and not by testers, as it requires detailed
knowledge of the internal program design and code. Not always easily done unless the
application has a well-designed architecture with tight code; may require developing test
driver modules or test harnesses.
1. What is load testing? - Load testing is to test that if the application works fine
with the loads that result from large number of simultaneous users, transactions
and to determine weather it can handle peak usage periods.
2. What is Performance testing? - Timing for both read and update transactions
should be gathered to determine whether system functions are being performed
in an acceptable timeframe. This should be done standalone and then in a multi
user environment to determine the effect of multiple transactions on the timing of
a single transaction.
Bug Life Cycle is nothing but the various phases a Bug undergoes after it is raised or
reported.
New or Opened, Assigned, Fixed, Tested, closed
Negative testing –
Testing the system using negative data is called negative testing, e.g. testing the
password where it should be minimum of 8 characters so testing it using 6 characters is
negative testing.
Where as in stress testing we will test with more users than 25 and the test will continue
to any number and we will check where the application is cracking.
Structural testing is a "white box" testing and it is based on the algorithm or code.
Functional testing is a "black box" (behavioral) testing where the tester verifies the
functional specification.
Re- test - Retesting means we testing only the certain part of an application again and
not considering how it will effect in the other part or in the whole application.
Regression Testing - Testing the application after a change in a module or part of the
application for testing that is the code change will affect rest of the application.
UAT testing - UAT stands for 'User acceptance Testing. This testing is carried out with
the user perspective and it is usually done before the release.
Unit testing – The 'micro' scale of testing; this is mostly used to test the particular
functions or code modules. This is typically done by the programmer and not by testers;
it requires detailed knowledge of the internal program design and code. It cannot be
done easily unless the application has a well-designed architecture with tight code; this
type may require developing test driver modules or test harnesses.
Sanity Testing or Smoke Testing – This type of testing is done initially to determine if a
new software version is performing well enough to accept it for a major testing effort. For
example, if the new software is crashing the systems in every 5 minutes or corrupting
databases, the software may not be in a 'sound’ condition to proceed for further testing
in its current state.
Functional Testing – This a commonly used black-box testing geared to check the
functional requirements of an application; this type of testing should be done by testers.
Regression Testing – This is testing the whole application again after the fixes or the
modifications are done on the software. This is mostly done at the end of the Software
development life cycle. Mostly Automated testing tools are used for this type of testing.
System testing – This is a type of black-box type testing that is based on overall
requirements specifications; covers all combined parts of a system.
UAT (User Acceptance Testing) – This type of testing comes on the final stage and
mostly done on the specifications of the end-user or client.
Usability testing – This testing is done to check the 'user-friendliness' of the application.
This depends on the targeted end-user or customer. User interviews, surveys, video
recording of user sessions, and other techniques can be used. Programmers and testers
are usually not appropriate as usability testers.
Comparison testing – This is nothing comparing the software strengths and weakness
with another competing product.
Mutation testing – This is another method for determining if a set of test data or test
cases is useful, by purposely introducing various code changes or bugs and retesting
with the original test data or cases to determine whether the 'bugs' are detected.
Validation is done during actual testing and it takes place after all the verifications are
being done.
Software testing is the process used to help identify the Correctness, Completeness,
Security and Quality of the developed Computer Software.
Software Testing is the process of executing a program or system with the intent of
finding errors.
Answers
A. The Primary need is to match requirements get satisfied with the functionality and
also to answer two questions
1· Whether the system is doing what it supposes to do?
2· Whether the system is not performing what it is not suppose to do?
7. What are the entry criteria for Functionality and Performance testing?
A. Entry criteria for Functionality testing is Functional Specification /BRS (CRS)/User
Manual. An integrated application, Stable for testing.
Entry criteria for Performance testing is successfully of functional testing, Once all the
requirements related to functional are covered and tested, and approved or validated.
8. What is test metrics?
A. *
9. Why do you go for White box testing, when Black box testing is available?
A. A benchmark that certifies Commercial (Business) aspects and also functional
(technical) aspects is objectives of black box testing. Here loops, structures, arrays,
conditions, files, etc are very micro level but they arc Basement for any application, So
White box takes these things in Macro level and test these things
Even though Black box testing is available, we should go for White box testing also, to
check the correctness of code and for integrating the modules.
Software Test Life Cycle (STLC) is a life cycle of the testing process.
1. Requirements Specification.
2. Planning
3. Test case Design 4.Execution
5. Bug Reporting . 6. Maintenance
22. What are the types of testing you know and you experienced?
A. I am experienced in Black Box testing.
24. After completing testing, what would you deliver to the client?
A. It is depend upon what you have specified in the test plan document. The contents
delivers to the clients is nothing but Test Deliverables.
1. Test plan document 2.Master test case document 3.Test summary Report.
4. Defect Reports.
28. What is Severity and Priority and who will decide what?
A. Severity and priority will be assigned for a particular bug to know the importance of
the bug.
Severity: How severely the bug is effecting the application.
Priority: Informing to the developer which bug to be fix first.
40. What ifs the difference between defect, error, bug, failure, fault?
A. Defect: While executing the test case if u found any mismatch, the u will report
it to the development team, that is called defect.
Bug: Once the developer accepts your defect, then it is called as a bug.
42. What is the difference between White & Black Box Testing?
A. White Box Testing: Based on the knowledge of the internal logic of an application's
code. Tests are based on coverage of code statements, branches, paths, conditions.
Black Box testing:- not based on any knowledge of internal design or code.
Tests are based on requirements and functionality.
43. What is the difference between Quality Assurance and Quality Control?
A. Refer Question no.16 & 17
Quality Assurance measures the quality of processes used to create a quality product.
Quality control measures the quality of the product.
Bug: Once the developer accepts your defect, the it is called as a bug.
Stress Testing: TO test the performance of the application and to find the server break
down or where the server crashes.
Volume Testing: To test whether it can able to send max data according to client req's.
52. What is the Diff between Two Tier & Three tier Architecture?
A. Two Tier Architecture: It is nothing but client server Architecture, where client will hit
request directly to server and client will get response directly from server.
Three tier Architecture: It is nothing but Web Based application, here in between client
and server middle ware will be there, if client hits a request it will go to the middle ware
and middle ware will send to server and vise-versa.
53. What is the diff between Client Server & Web Based Testing?
A. Refer Question no.52
System Testing: System testing will conducted on the entire system to check whether
it is meeting the customer requirements r not.
55. What is the Diff between Code Walk through & Code Review?
56. What is the diff between walk through and inspection?
A. Walk through: A 'walk through' is an informal meeting for evaluation or informational
purposes. Little or no preparation is usually required
Inspection: Inspection is an formal meeting, here every thing discussed will be
documented such as a requirements spec or a test plan, and the purpose is to find
problems and see what's missing, The result of the inspection meeting should be a
written report.
Dynamic testing: Test activities that are performed by running the software is called
dynamic Testing.
59. What is the diff between alpha testing and beta testing?
A. Alpha Testing: alpha testing will be performed by client in our environment with
dummy data, in this phase some major bugs can be allowed, later which will be solved
by our development team.
Beta testing: beta testing will be performed by client in his environment with real data, in
this phase no bugs can be allowed.
Deepak K R
back to top
Some operators have already launched and many more will launch this summer (2002).
back to top
For the subscriber MMS takes messaging out of the basic text users are used to and
allows them to enjoy a much better messaging - more like they are used to via email or
the Internet e.g. to send a greetings card or photograph of themselves.
For network operators MMS is important as it is the basis for a wide range of next
generation services that pave the way for the improved 3G bandwidth to show its use,
drive demand for data bandwidth and consequently increase operator revenues.
Some of the first phones are introducing colour so this is a substantial improvement over
black & white text. Initial devices may maintain the conventional size display but allow
colour or grey scale images. The main thing users will see is that the experience is much
more dynamic - a snapshot album of thumbnail images, a sequence of a cartoon e.g.
Dilbert, captions and sounds combined with images.
Back to top
back to top
You would need to be on a network that supports MMS; steps are being taken to allow
MMS's to be supported at various capabilities by non MMS phone users e.g. by
converting as far as possible to WAP. There are restrictions which are things like if you
only have an SMS capable phone you might have to access your MMS messages using
an internet connection.
Back to top
Yes, it is possible to do this - although your operator will need to support this capability
The experience is far superior especially with devices with colour displays, sound, text
and picture sequences.
The Ericsson T68i was the first phone available and we are starting to see more of these
in user’s hands. Nokia have also started shipping their 7650 camera enabled MMS
phone and another model is due soon. Many more models are expected.
Back to top
Not at all, we're advising GPRS is the minimum although it works over circuit switched
GSM it is costly to run. 3G will benefit capabilities such as streaming audio / video for
example downloading full MP4 video clips may take too long over GPRS.
There is not a network limit but initial devices are specifying minimum support for 30k -
it's really a manufacturer limit concerning the amount of memory
back to top
EMS is delivered via SMS and this means it can be very costly and is using limited
control channel capacity in a GSM network. EMS also supports picture messaging/
animation but MMS is much more capable of serving up multiple media together and
also you wouldn't enjoy the experience of more complex media e.g. photographs, sound
and video.
It has many similarities to rich email content but delivered in a mobile friendly way. In
fact MMS uses email technologies to underpin the technical capabilities. Some aspects
of MMS will exceed standard email capabilities e.g. true control over sequences which
conventional email doesn't handle.
back to top
MMS requires network operators to install MMS Server/ Relay equipment which
integrates with existing infrastructure and connects to content providers, email gateways.
SMS uses a control channel whereas MMS uses the data channel.
The principle standards body is 3GPP for MMS though they use work by other standards
bodies such as the WAP forum to assist in certain areas. The GSM association is active
in collecting operator requirements to address to 3GPP to help advance these
standards.
back to top
MMS capability uses many services of WAP to make it work - particularly the lower level
WAP transport mechanisms which are optimised for operation over the GSM radio
interface. MMS also uses WAP's push mechanism to transparently notify users of receipt
of a new message.
It requires additions of infrastructure components to handle the store & forward functions
of MMS. MMSCs have to connect into other network components like HLRs, a network
must also be WAP capable and realistically GPRS capable. And for proper service
GPRS global roaming is required.
back to top
At a technical level the vendor community and operators have created an interoperability
group to ensure maximum reliability in inter-working. Initially there may be differences
between devices which will mean that there will be situations where an MMS composed
on one device is not well rendered on another and this parallels a web page for a PC not
looking good on a PDA.
To send a WAP Push message via a menu driven interface, please see the help section
titled “Web Menu Interface”. This section describes how to send a WAP Push
programmatically via URL parameters.
WAP Push messages are specially formatted SMS messages that display an alert
message to the user, and give the user the option of connecting directly to a particular
URL via the mobile phone’s WAP browser.
For example, an e-mail application might send an alert that tells the user they have new
e-mail, with a URL link to connect directly to a WAP e-mail application.
The WAP specifications define a format for applications to create XML-based “PAP”
(Push Access Protocol) documents that can be posted to an operator’s “PPG” (Push
Proxy Gateway), in order to deliver a WAP push message to a mobile device.
Unfortunately, the complexity of this format, and the reluctance of operators to open their
“PPG” to just anyone, has made it difficult for developers to deploy “WAP Push” in their
applications.
The Now SMS/MMS Gateway makes it easy to generate and deliver “WAP Push”
messages. While the gateway does not support all of the options available via the PAP-
based PPG interface, it does implement “WAP Push” in an elegantly simple solution.
http://127.0.0.1:8800/?
PhoneNumber=xxxxxxxx&WAPURL=name.domain/path&Text=abc+def+ghi
For 127.0.0.1, please substitute the IP address or host name assigned to your gateway
PC. (Note: 127.0.0.1 is a local loopback address that can be utilized when you are
connecting to the gateway from the same computer.)
For 8800, please substitute the port number that the gateway is configured to use.
Substitute the phone number that you wish to send the SMS message to for the
“xxxxxxxx” in the “PhoneNumber” parameter. Use either the local phone number format,
or the international phone number format (your network provider may or may not allow
you to send to international phone numbers). If the international phone number format is
used, note that you must substitute “%2B” for the “+” character, because of URL
escaping restrictions. For example, to send an SMS to +447778001210, use
%2B447778001210 instead.
The alert text for the WAP Push message is contained in the “Text” parameter, and
utilizes the same format as described in “Sending Text Messages”.
Note that there are two types of “WAP Push” messages, “Service Indication (SI)” and
“Service Load (SL)”. The “SL” format can be selected by including “WAPSL=1” as a
URL parameter, and does not support a “Text” parameter, while the “SI” format does.
(By specification, the “SL” format was designed to tell the browser to connect to a URL
without user intervention. However, for security reasons, mobile phones will always
display a prompt before connecting to a URL. Therefore, the lack of a text parameter
makes the “SL” format considerably less user-friendly than the “SI” format, and in
practice, most users will exclusively use the “SI” format.)
The URL to be pushed to the mobile device is specified in the “WAPURL” parameter.
Note that the “http://” portion of the URL is not necessary and is assumed. Also note
that it may be necessary to escape some URL characters, please refer to the table in the
“Sending Text Messages” section for common characters that must be escaped.