Quality Systems in IT - Assignment - Frontsheet
Quality Systems in IT - Assignment - Frontsheet
Quality Systems in IT - Assignment - Frontsheet
Edexcel
Qualification
Unit
BTEC
Level
HND
Diploma
in
Computing
and
Systems
Development
number
and
title
Assignment due
Assignment submitted
Learners name
Assessor name
Learner declaration:
I certify that the work submitted for this assignment is my own and research sources are fully acknowledged.
Learner signature
Date
Grading grid
P1.
P1.
P1.
P2.
P3.
P3.
M1 M2 M3
D1
D2
D3
Assignment title
In this assignment, you will have opportunities to provide evidence against the following criteria.
Indicate the page numbers where the evidence can be found.
Assessment criteria
Expected evidence
Task
Assessors Feedback
no.
LO1. Understand the need for quality assurance in IT systems
Written
1.1 discuss appropriate A
standards
for
the which:
document 1
development of an IT 1. Explains
why
a
system
systematic approach to
quality assurance, and
quality
control
is
needed.
2. Discusses various SQA
standards.
A
1.2
assess
associated
the
risks
with
the
development of an IT
system
Written
discusses
system
quality
assurance practices at
stages
lifecycle
of
which
the
an
IT
has
discuss
systems
risks
with
development
Written
describes
all
the
associated
1.3
document
of
the
development
document
the
development
systems
life-cycle
(SDLC) as it applies to
database
development,
is
quality
assured
LO2. Be able to employ standard quality control documentation
2.1
produce
control
quality
software
test
plan
(STP)
documentation -
software
test
development
lifecycle
apply
planning
management
project 1. A Written
explains
and
tools
to
document 3
the
importance of project
management
to
the
production
3.2
evaluate
of
high
quality IT systems.
the
manage
the
development of an IT
system.
- a Work Breakdown
Structure
- a GANTT chart
Assessment criteria
Expected Evidence
Feedback
(note on Merit/Distinction if applicable)
5
to
find
appropriate solutions
judgements
M2
apply
appropriate
methods/techniques
design
of
methods/techniques
M3
Present
communicate
appropriate findings
has
been
used
and
has
D1
Use
reflection to evaluate
arrived
at
through
valid conclusions
been
evaluated
managing
and
organising activities
have
been
D3
planned,
have
managed
Demonstrate 1. Self-evaluation
convergent/lateral/
creative thinking
been
has
taken place
2. Problems
have
been
solved
Summative feedback
Assessors
Date
Signature
IV Grading Check:
Comments if any:
Agree
Disagree
Modify grade to
IV Signature
Date
Amazon.com overview
The invention of the internet has changed the way we live our lives. Everything
people do in their day to day lives is in some form related to the internet. Days start
out by checking emails, posting on Facebook and Twitter, surfing the web, and then
shopping online. People use computer for just about everything in their lives and
over the past few years we have seen the growth of online sales increase
dramatically.
In 1994 Jeffrey Bezos began Amazon.com from his home is Seattle Washington. He
pioneered the idea of online sales and in 1995 officially launched the website and
made it available in English, Chinese, German and Japanese. It began selling strictly
books as a online book store. His ability to sell books online allowed his to carry
more books and titles in his inventory than an average book and mortar store. By
1997 he had gained 615 million visitors and sparked the interest of investors. After
he gained investors Benzos began to sell other item such as DVDs, VHS tapes,
software, videos and toys. He learned that people wanted to have the ability to buy
anything over the internet so he catered to their needs. By 1999 Bezon was named
man of the year by Time magazine and now Amazon expanded to food, jewelry,
baby products, beauty, sports goods, electronics and much, much more.
When Amazon was launched its intended market was readers and music lovers.
They offered varieties of books and music from every possible author and artist. Now
the websites audience is more than reader it expands to every person in the world.
Today, it is the world largest online retailer.
LO1. Understand the need for quality assurance in IT systems
1.1
management
and
control
tools
include
various
diagrammatic
techniques which help you find ideas, help you make decisions, and prioritize
issues.
Amazon has been successful in implementing QA:
Amazon has changed its design time by time in order to get more customers
satisfaction
10
o In 1998, the site had two top-level categories: books and music. As additional
categories were added (such as video and gifts), the horizontal tab system
scaled quite well and created a nice opportunity for differentiating product
categories through color.
o In 1999 and 2000, the site continued to expand- adding more categories and
stretching the tab system to its limit. When Z-shops, Toys & Games,
Electronics, and e-Cards were added, there was no longer any room for the
amazon logo in the header (it was placed in the center of the home page) and
the font size had to be reduced. (The site at this time was still designed to
work well for 800 by 600 screen resolutions.) It was not until the navigation
tabs spread out into two rows that the logo again had a place on top. Clearly
the tab system was being stretched to its limit and was poised to grow out of
control.
11
o In 2007 Amazon began testing a design that brought back a prominent listing
of their most popular categories. However, access to these links was now in
the form of a left-side navigation menu instead of tabs at the top of the page.
The new header featured a prominently displayed search box and access to
your shopping cart and lists. While I dont know the full context behind the
redesign, Im assuming the company needed a better way to expose the
breadth of their inventory as the dynamic all product categories tab
(described above) required an explicit action to activate. It also feels like
Amazon is hoping to capitalize on their investments in search (namely A9) by
emphasizing searching as a primary navigation mode. No doubt, people are
searching more on the site now than they were a few years ago. Yet when
people are motivated to shop, prompts like product categories and current
deals are almost equally important. This may be why Googles single search
box shopping experience (formerly known as Froogle) never registered with
consumers: they werent ever told what they could/should shop for.
12
13
14
When choosing a shipping method, the user is given the option, with a fairly
prominent button, to Change quantities or delete. Upon seeing the shipping
methods, the user could very well need these options, so having the button
available now is helpful and reassuring.
15
After the user has added a product to their cart and selected a shipping method,
they review a summary of their order and click a button to Continue with their
purchase. That button takes them not to a confirmation of their order but rather to
one final page where they actually make their purchase.
To ensure that the user knows this is not the final step, a helpful reminder is put
directly below the Continue button, informing them that the final order will be
confirmed after one last summary.
E-commerce developers could learn from the example set by Amazons empathetic
user experience by understanding the various concerns and apprehensions that a
user might have at each stage of the shopping experience.
16
17
Amazon has been successful in controlling its quality, after each stage, there would
be a test report for every function to make sure it works correctly on the website. For
example:
Search:
Search algorithms are very important for the success of Amazon
Search based on Product name, brand name or something more broadly, the
category. For example Camera, Canon EOS 700D, electronics, etc.
Also search happens in many places. Please take the search drilling down into
multiple levels into consideration when validating this functionality. For
example: When I search on the home page, I might see something like this:
18
Product specifications
Reviews
Delivery options
Shipping information
In stock/Out of stock
Shopping Cart:
19
This is the penultimate stage before the user commits to the purchase.
If the user adds the same item to the cart while continuing to shop, the item
count in the shopping cart should get incremented
A user can add more items to the cart- total should reflect the same
Update the contents added to the cart- total should reflect that too
Proceed to checkout
Apply coupons
Dont check out, close the site and come back later. The site should retain the
items in the cart
Payments:
20
If allowing check out as Guest, simply finish the purchase and provide an
option to register at the end
User sign up
If the user is signed up for a long time, make sure the session is timed out or
not. Every site has a different threshold. For some, it is 10 minutes. For some,
it might be different.
21
Response
Time:
22
Quality assurance and quality control are closely related and their objective is
also the same, i.e. to deliver a defect-free product. Both processes are an
integral part of a quality management plan and complement each other.
Failing to apply either of them will result in a failure of quality management on
the project.
Discusses various SQA standards:
Software quality assurance (SQA) consists of a means of monitoring the software
engineering processes and methods used to ensure quality. SQA encompasses the
entire software
requirements
development process,
definition, software
which
includes
processes
code
such
as
control, code
ISO 9000
The ISO 9000 of quality management systems standards is designed
to help organizations ensure that they meet the needs of customers
and other stakeholders while meeting statutory and regulatory
requirements related to a product. ISO 9000 deals with the
fundamentals of quality management systems, including the eight
management principles upon of standards is based. ISO 9001 deals
with the requirements that organizations wishing to meet the
standard must fulfill.
23
today.
The ISO 9000 series are based on eight quality management
principles.
- Customer focus
- Leadership
- Involvement of people
- Process approach
- System approach to management
- Continual improvement
- Factual approach to decision making
- Mutually supportive supplier relationships
Capability Maturity Model Integration (CMMI)
Capability Maturity Model Integration (CMMI)
improvement
training
and
appraisal
program
is
process
and
service
CMMI
defines
the
following
maturity
levels
for
Office by CMU.
CMMI currently addresses three areas of interest:
- Product and service development CMMI for Development
-
(CMMI-DEV),
Service establishment, management, CMMI for Services
(CMMI-SVC), and
Product and service acquisition CMMI for Acquisition (CMMIACQ).
24
required
by
individuals
to
successfully
complete
repeatable.
Level 2 software project tracking, requirements management,
realistic planning, and configuration management processes
are
integrated
throughout
an
organization;
consistently high.
Level 5 the focus is on continuous process improvement. The
impact of new processes and technologies can be predicted and
Institute
Standards
Association (IEEE-SA)
The Institute of Electrical and Electronics Engineers Standards
Association (IEEE-SA) is an organization within IEEE that develops
global standards in a broad range of industries, including: power and
energy, biomedical and health care, information technology and
robotics, telecommunication and home automation, transportation,
that
offers
balance,
25
openness,
fair
procedures,
and
consensus. Technical experts from all over the world participate in the
1.2
26
27
29
Monitoring and Blocking protect databases from attacks, unauthorized access, and
theft of data.
Auditing helps demonstrate compliance with industry regulations.Data Protection
ensures data integrity and confidentiality.
Non-Technical Security instills and reinforces a culture of security awareness and
preparedness.
a) Discovery and Assessment
Scan for Vulnerabilities: Understanding vulnerabilities that expose databases to
input injection is essential. Malware may be looking to exploit known database
vulnerabilities, making un-patched databases an easy target. Weak authentication
rules can enable an application-layer DoS attack by granting access to a database
without needing a password. Use vulnerability assessment tools to detect security
vulnerabilities, misconfigurations, and missing vendor patches. Risk scores help
prioritize risk, manage, and research vulnerabilities. In this case, higher risk scores
would relate to input injection.
Mitigate Vulnerabilities: If vulnerability is discovered and the database vendor
hasnt released a patch, a virtual patching solution should be used. Applying virtual
patches will block attempts to exploit vulnerabilities without requiring actual patches
or changes to the current configuration of the server. Virtual patching will protect
the database from exploit attempts until the patch is deployed. Again, focus on
patching high-risk vulnerabilities that can facilitate a DoS or input injection attack.
Analyze Risk and Prioritize Remediation Efforts: Use reports and analytical tools to
understand risks and help prioritize remediation efforts.
30
determine
which
databases
that
store
sensitive
data
need
to
be
analysis and helps zero-in on the abuse of privileges. Collect and append contextual
details to user rights information including the user name, department, database
object sensitivity, and last time accessed. This allows you to focus your analysis on
the access rights that represent the highest business risk.
Review and Approve/Reject Individual User Rights: Perform an organized
review of user rights to determine if they are appropriate. Reviewers should approve
or reject rights, or assign them to another for review, and administrators can report
on the review process. Conducting organized user rights reviews meets regulatory
requirements and reduces risk by ensuring that user privileges are granted on a
need-to-know basis.
and
protocol
and
system
attacks.
When attempts
to
access
unauthorized data occur, generate alerts or terminate the user session. Use a
solution that leverages policies both pre-defined and custom that inspect
database traffic to identify patterns that correspond to known attacks, such as DoS
attacks, and unauthorized activities.
32
or block the user. Creating activity-based user profiles increases the likelihood of
detecting inappropriate access to sensitive data.
Block Malicious Web Requests: Because web applications are the most common
vector for initiating an input injection attack, another important line of defense will
be your Web Application Firewall (WAF). A WAF will recognize and block input
injection attack patterns that originate from web applications.To protect against
Input Injection attacks, a WAF should:
Inspect HTTP parameter values for special characters like apostrophes and
brackets and know whether these characters are expected or indicative of an attack.
Use application signatures and policies of known input injection patterns to alert
and block.
Monitor Local Database Activity: DAP solutions can audit and monitor the
activities of your most highly privileged users database and system administrators.
These users have been granted the highest levels of access to your databases and,
therefore, require close attention. Should they abuse their privileges or become
compromised by malware, the risk of data theft and damage to your organization
increases.
Validate Database Protocols: Leverage database activity monitoring solutions
that can analyze the protocol and isolate anomalous communications. When atypical
communication events are detected, the solution should trigger an alert or block the
transaction.
Response Timing: Database DoS attacks designed to overload server resources lead
to delayed database responses. This includes delays in both individual query
responses and the overall system. Use solutions that monitor response timing and
generate alerts when response delays or system sluggishness is observed.
33
d) Auditing
Automate Auditing with a DAP Platform: Implement a DAP solution that delivers
the performance, scalability, and flexibility to meet the needs of the most
demanding environments. A DAP solution can address most of the weaknesses
associated with native audit tools:
Separation
of
Duties: DAP
solutions
operate
independently
of
database
34
1.3
development lifecycle
35
SDLC.
Planning for the quality assurance requirements and identification of the risks
associated with the project is also done in the planning stage. The outcome of the
technical feasibility study is to define the various technical approaches that can be
followed to implement the project successfully with minimum risks.
Stage 2: Defining Requirements
Once the requirement analysis is done the next step is to clearly define and
document the product requirements and get them approved from the customer or
the market analysts. This is done through .SRS. . Software Requirement
Specification document which consists of all the product requirements to be
designed and developed during the project life cycle.
Stage 3: Designing the product architecture
SRS is the reference for product architects to come out with the best architecture
for the product to be developed. Based on the requirements specified in SRS,
usually more than one design approach for the product architecture is proposed and
documented in a DDS - Design Document Specification.
This DDS is reviewed by all the important stakeholders and based on various
parameters as risk assessment, product robustness, design modularity , budget and
time constraints , the best design approach is selected for the product.
A design approach clearly defines all the architectural modules of the product along
with its communication and data flow representation with the external and third
party modules (if any). The internal design of all the modules of the proposed
architecture should be clearly defined with the minutest of the details in DDS.
37
38
Then based on the feedback, the product may be released as it is or with suggested
enhancements in the targeting market segment. After the product is released in the
market, its maintenance is done for the existing customer base.
SDLC Models
There are various software development life cycle models defined and designed
which are followed during software development process. These models are also
referred as "Software Development Process Models". Each process model follows a
Series of steps unique to its type, in order to ensure success in process of software
development.
Following are the most important and popular SDLC models followed in the industry:
Waterfall Model
Iterative Model
Spiral Model
V-Model
The other related methodologies are Agile Model, RAD Model, Rapid Application
Development and Prototyping Models.
DATABASE SDLC
A database is usually a fundamental component of the information system,
especially in business oriented systems. Thus database design is part of system
development. The following picture shows how database design is involved in the
system development lifecycle.
39
The
phases
in
the
middle
of
the
picture
(Database
Design,
Database
Implementation) are the phases that you concentrate on in the Database Design
course. The other phases are briefly described. They are part of the contents of the
Systems Analysis and Design courses, for example. There are various methods of
how the different phases of information system design, analysis and implementation
can be done. Here the main tasks or goals are described but no method is
introduced.
a) Database Planning
40
The database planning includes the activities that allow the stages of the database
system development lifecycle to be realized as efficiently and effectively as possible.
This phase must be integrated with the overall Information System strategy of the
organization. The very first step in database planning is to define the mission
statement and objectives for the database system. That is the definition of:
o
o
o
o
b)
In the systems definition phase, the scope and boundaries of the database
application are described. This description includes:
o Links with the other information systems of the organization
o What the planned system is going to do now and in the future
o Who the users are now and in the future.
The major user views are also described. i.e. What is required of a database system
from the perspectives of particular job roles or enterprise application areas.
c) Requirements Collection and Analysis
During the requirements collection and analysis phase, the collection and analysis of
the information about the part of the enterprise to be served by the database are
completed. The results may include eg:
o
o
o
d)
the
requirements
specification
of
the
system.
In the logical database design phase, the model of the data to be used is based on a
specific data model, but independent of a particular database management system
is constructed. This is based on the target data model for the database e.g.
relational data model.
In the physical database design phase, the description of the implementation of the
database on secondary storage is created. The base relations, indexes, integrity
constraints, security, etc. are defined using the SQL language.
e) Database Management System Selection
This in an optional phase. When there is a need for a new database management
system (DBMS), this phase is done. DBMS means a database system like Access,
SQL
Server,
MySQL,
Oracle,
MongoDB,
NoSQL
In this phase the criteria for the new DBMS are defined. Then several products are
evaluated according to the criteria. Finally the recommendation for the selection is
decided.
f) Application Design
In the application design phase, the design of the user interface and the application
programs that use and process the database are defined and designed.
g) Protyping
The purpose of a prototype is to allow the users to use the prototype to identify the
features of the system using the computer. There are horizontal and vertical
42
prototypes. A horizontal prototype has many features (e.g. user interfaces) but they
are not working. A vertical prototype has very few features but they are working.
See the following picture.
h) Implementation
During the implementation phase, the physical realization of the database and
application designs are to be done. This is the programming phase of the systems
development.
i) Data Conversion and Loading
This phase is needed when a new database is replacing an old system. During this
phase the existing data will be transferred into the new database.
j) Testing
Before the new system is going to live, it should be thoroughly tested. The goal of
testing is to find errors! The goal is not to prove the software is working well.
k) Operational Maintenance
The operational maintenance is the process of monitoring and maintaining the
database system. Monitoring means that the performance of the system is
43
observed. If the performance of the system falls below an acceptable level, tuning or
reorganization of the database may be required. Maintaining and upgrading the
database system means that, when new requirements arise, the new development
lifecycle will be done.
Nowadays, Amazon has applied competitive database including big data and
cloud-based e-commerce applications which are web-browser accessible and
database-centred.
te chniq ues ,
and
tools
us e d
to
a na lyze
it.
It
ca n
be
it
a llows
s igni fi c a ntly
Ama zon
to
de te ct
a ga ins t
e rrors
loss e s .
a nd
Se cond,
fra ud
it
quick ly.
prov ide s
This
ma j or
a dva nta ge s from a compe tit ive s ta ndpo int. Re a l- time a na lys is a llows
Am a z on to de ve lop mo re e ff e ctive stra te gie s towa rds compe t itors in
le ss tim e , o ff e ring dee p ins ight into cons ume r tre nds a nd s a les . In
44
is
tha t
it
ma y
be
use d
to
p rovi de
cutting -e dge
he a lthc a re .
Prop one nts of big da ta poin t out tha t hea lthca re o rga niza tio ns ca n us e
e le c t ronic me dica l re c ords and da ta from wea ra ble s to pre ve nt de a dly
hos pita l infe cti ons , fo r exa mple . To thes e propone nts , priva cy c a nnot
trum p the live s bi g da ta might s ave .
cha nge s
for
ma ny
bus ine ss e s .
N ext,
re a l- time
bi g
da ta
de m a nds the abi lity to con duct s ophis tica te d ana lys e s ; compa nie s who
fa il to do this co rre ctly ope n the ms e lve s up to imp le me nting e nti re ly
inc orre c t stra te gie s o rga n iza tion- wide . Fur the rmore , ma ny c urre nt ly
us e d da ta to ols a re not a ble to ha ndle re a l- time a na lys is .
One of the big ges t conce rns ma ny la ype ople a nd pol iticia ns ha v e
a bout re a l- time ana lys is of bi g da ta is pr iva cy. C ivil libe rt ies a dv oc a tes
ha v e atta cke d the us e of big da ta f rom lice ns e pla te sca nne rs and
d rone s , for exa mple . The idea is tha t a uthorit ie s s hould not be a ble to
c i rc um v e nt cons tit utiona l prote ctio ns aga ins t unre a s ona ble s ea rc he s .
45
development lifecycle
A- SOFTWARE TEST PLAN (STP)
A test plan documents the strategy that will be used to verify and ensure that a
product or system meets its design specifications and other requirements. A test
plan is usually prepared by or with significant input from test engineers.
Depending on the product and the responsibility of the organization to which the
test plan applies, a test plan may include a strategy for one or more of the following:
Service and Repair test - to be performed as required over the service life of
the product.
46
Web Server
Design tool
JDK
DBMS
Operating System
Netbean 8.1
Glassfish Server 4.1
Photoshop CS6
JDK 1.8
Microsoft SQL Server 2012
Windows 8.1, 10, Linux
2.3 Hardware
Client
Server
8 laptops, 5 desktops
Reuse one 24/7 available desktop to
simulate the server for testing and
deployment
2.4 Resources
Worker
Test Manager
Specific Responsibilities/Comments
Provide management oversight
Responsibilities: provide technical
direction, accuquire appropriate
resources
Management reporting
47
Test Designer
System Tester
document defects
Ensures test environment and assets
are managed and maintained
Responsibilites: administer test
management system, manage
Designer
Implementer
password
Fail to login the system when providing empty username
Recover password
Admin add product with valid information
Fail to add product with name that already exists in the system
Fail to add product when one or some or all fields are empty
Fail to add product when inputting special character(s) to one or some or all
fields
j) Update a product with valid information
49
k) Fail to update a product with name that already exists in the system
l) Fail to update product when one or some or all fields are empty
m) Fail to update product when inputting special character(s) to one or some
or all fields
n) Update cancel
o) Delete product
p) Delete cancel
C. Search Product Test Case
a) Seacrh Product by Product Name : Good search
b) Seacrh Product by Product Name: Empty search
c) Search Product by Product Name : Wrong Search
D. Shopping Cart Test Case
a) Add Product to Shopping Cart
b) Remove Product from Shopping Cart
c) Change Quantity
d) Select Delivery Option
e) Payment System
f) Pay Now Process
g) Cancel Order
E. Browsers Test Case
a) Internet explorer 11
b) Microsoft edge
c) Google Chrome (lastest version)
3.7 Special requirements: Measurements of response times, Security requirements:
Fast response time and good performance, all the requirement met the standard of
security
3.8 Data to be recorded: Yes
4. Test Schedule (For Each Test or Test Group) including time estimates for
the following:
4.1 Preparation: 1 week
4.2 Testing: 3 weeks
4.3 Error correction: 6 weeks
4.4 Regression test: 1 week
50
Web Server
Design tool
JDK
DBMS
Operating System
Netbean 8.1
Glassfish Server 4.1
Photoshop CS6
JDK 1.8
Microsoft SQL Server 2012
Windows 8.1, 10, Linux
2.3 Hardware
51
Client
Server
8 laptops, 5 desktops
Reuse one 24/7 available desktop to
simulate the server for testing and
deployment
2.4 Resources
Worker
Test Manager
Specific Responsibilities/Comments
Provide management oversight
Responsibilities: provide technical
direction, accuquire appropriate
resources
Test Designer
Management reporting
Identifies, priorities and implements
test cases
Responsibilites: generate test plan,
System Tester
document defects
Ensures test environment and assets
are managed and maintained
Responsibilites: administer test
management system, manage
Designer
Implementer
Name
Requirement
and password
The user is logged in correctly after providing correct
Preconditions
Steps
Expected results
Requirement
Preconditions
Steps
username
The user is at the homepage or the login page
The user is at the homepage or the log in page
Provide invalid username in the username textbox
Provide valid password in the password textbox or let
password field empty
Expected results
c) Fail to login the system when providing valid username and invalid
password
Name
Requirement
Preconditions
Steps
Expected results
Requirement
Preconditions
Steps
username
The user is not logged in when providing empty username
The user is at the homepage or the log in page
Provide empty username in the username textbox
Provide invalid password in the password textbox or let
password field empty
Expected results
Requirement
being blocked
User can not log in the system using account is being
Preconditions
Steps
blocked
A given account is being blocked by logging in fail 3 times
Provide username of given account being blocked
Provide password of given account being blocked
54
Expected results
f) Recover password
Name
Requirement
Preconditions
Steps
Expected results
Steps
Expected results
h) User Register New Account with one or some or all fields are empty
Name
Requirement
Preconditions
Steps
Expected results
Name
Requirement
and password
The admin is logged in correctly after providing correct
Preconditions
Steps
Expected results
56
Requirement
Preconditions
Steps
username
The admin is at the admin login page
The admin is at the admin login page
Provide invalid username in the username textbox
Provide valid password in the password textbox or let
password field empty
Expected results
c) Fail to login the system when providing valid username and invalid
password
Name
Requirement
Preconditions
Steps
Expected results
Requirement
username
The admin is not logged in when providing empty
Preconditions
Steps
username
The admin is at the admin login page
Provide empty username in the username textbox
Provide invalid password in the password textbox or let
57
e) Recover password
Name
Requirement
Preconditions
Steps
Expected results
Steps
product is displayed
Provide products name in the textbox
Provide products price in the textbox
Provide products category in the selection box
Provide products image in the picture box
Provide products description in the textbox
Expected results
g) Fail to add product with name that already exists in the system
Name
Requirement
Preconditions
the system
All fields are filled with valid data
The webpage that allows admin to input information of
Steps
product is displayed
Provide products name in the textbox (which already exist
in the system)
Provide products price in the textbox
Provide products category in the selection box
Provide products image in the picture box
Provide products description in the textbox
Expected results
h) Fail to add product when one or some or all fields are empty
Name
Requirement
Preconditions
Steps
product is displayed
Provide empty products name in the textbox or/and
Provide empty products price in the textbox or/and
Provide empty products category in the selection box
or/and
Provide empty products image in the picture box or/and
Provide empty products description in the textbox and
59
Expected results
i) Fail to add product when inputting special character(s) to one or some or all
fields
Name
Requirement
Preconditions
Steps
product is displayed
Provide products name containing special character(s) in
the textbox or/and
Provide products price containing special character(s) in
the textbox or/and
Provide products category in the selection box
Provide products image in the picture
Provide products description containing special
character(s) in the textbox and
Expected results
Test
case:
Update
Requirement
successfully
All fields are filled with valid data
60
product
with
valid
information
Preconditions
Steps
product is displayed
Provide products name in the textbox or/and
Provide products price in the textbox or/and
Provide products category in the selection box or/and
Provide products image in the picture box or/and
Provide products description in the textbox and
Expected results
k) Fail to update a product with name that already exists in the system
Name
Requirement
Preconditions
in the system
All fields are filled with valid data
The webpage that allows admin to update information of
Steps
product is displayed
Provide products name in the textbox (which already exist
in the system) or/and
Provide products price in the textbox or/and
Provide products category in the selection box or/and
Provide products image in the picture box or/and
Provide products description in the textbox and
Expected results
l) Fail to update product when one or some or all fields are empty
Name
Requirement
Preconditions
Steps
product is displayed
Provide empty in the textbox or/and
Provide empty products price in the textbox or/and
Provide empty products category in the selection box
or/and
Provide empty products image in the picture box or/and
Provide empty products description in the textbox and
Expected results
Requirement
Preconditions
Steps
product is displayed
Provide products name containing special character(s) in
the textbox or/and
Provide products price containing special character(s) in
the textbox or/and
Provide products category in the selection box
Provide products image in the picture
Provide products description containing special
character(s) in the textbox and
Click on update button
62
Expected results
n) Update cancel
Name
Requirement
Preconditions
Steps
Expected results
product is displayed
Click on update button
The product is not updated to the system
The admin is redirected to him/her main page
o) Delete product
Name
Requirement
Preconditions
Steps
product is displayed
Admin choose a product to delete
Veriry that the system retrieves and display the product
information for admin and prompts message to confirm the
deletion of the product
Admin confirm to delete the selected product by clicking
Expected results
on delete button
The system deletes the selected product from the system
p) Delete cancel
Name
Requirement
Preconditions
Steps
Expected results
Steps
him/her to search
Users navigate to Search textbox
Users enter product name
Expected results
Steps
him/her to search
Users navigate to Search textbox
User does not enter product name
Expected results
Steps
him/her to search
Users navigate to Search textbox
Users enter unexisted product name
Expected results
Steps
Expected results
65
c) Change Quantity
Name
Requirement
Preconditions
Steps
Cart
Users change quantity of product in cart
There is at least one product in the shopping cart
Users navigate to their shopping cart
Users choose a product they want to change quantity in
cart
Expected results
Click on + or - button
The system should change quantity of product in cart.
Expected results
e) Payment System
Name
Requirement
Preconditions
Steps
shopping
There is at least one product in the shopping cart
Users navigate to their shopping cart
Users choose a payment method from dropdown list
Click on Choose button
66
Expected results
Expected results
g) Cancel Order
Name
Requirement
Preconditions
Steps
Expected results
67
Amazon.com
Expected results
Internal Links
External Links
Mail Links
Broken Links
Forms
o Field validation
o Error message for wrong input
o Optional and Mandatory fields
Database
o Testing will be done on the database integrity.
Cookies
o Testing will be done on the client system side, on the
temporary Internet files.
o Users should be navigated to the homepage
b) Microsoft edge
Name
Requirement
Preconditions
Steps
Expected results
Links
o
o
o
o
Internal Links
External Links
Mail Links
Broken Links
Forms
o Field validation
o Error message for wrong input
o Optional and Mandatory fields
Database
o Testing will be done on the database integrity.
Cookies
o Testing will be done on the client system side, on the
temporary Internet files.
o Users should be navigated to the homepage
c) Google Chrome (lastest version)
Name
Requirement
Preconditions
Steps
Expected results
o
o
o
o
Internal Links
External Links
Mail Links
Broken Links
Forms
o Field validation
o Error message for wrong input
o Optional and Mandatory fields
Database
o Testing will be done on the database integrity.
Cookies
o Testing will be done on the client system side, on the
temporary Internet files.
o Users should be navigated to the homepage
4.Testing Process - How the test is run - step by step
Instructions for input, detailing every step of the input process
Data to be recorded during the tests
5. Action to Be Taken in Case of Program Failure / Cessation
6. Procedures to Be Applied According to The Test Result Summary
70
Specific Responsibilities/Comments
Provide management oversight
Responsibilities: provide technical
direction, accuquire appropriate
resources
Test Designer
Management reporting
Identifies, priorities and implements
test cases
Responsibilites: generate test plan,
System Tester
document defects
Ensures test environment and assets
are managed and maintained
Responsibilites: administer test
management system, manage
Designer
Implementer
Web Server
Design tool
JDK
DBMS
Operating System
Netbean 8.1
Glassfish Server 4.1
Photoshop CS6
JDK 1.8
Microsoft SQL Server 2012
Windows 8.1, 10, Linux
2.2 Hardware
Client
Server
8 laptops, 5 desktops
Reuse one 24/7 available desktop to
simulate the server for testing and
deployment
OK: The test sheet is set to "OK" state when all steps are in "OK" state. The
real result is compliant to the expected result.
NOK: The test sheet is set to "NOK" state when all steps of the test are set to
"NOK" state or when the result of a step differs from the expected result.
NOT COMPLETED: The test sheet is set to "Not Completed" state when at
least one step of the test is set "Not Run" state.
DECISION
P
P
username
Fail to login the system when providing valid username
username
User logs in the system using an account is being
blocked
Recover password
User Register New Account With Valid Information
User Register New Account with one or some or all
P
F
F
DECISION
P
P
username
Fail to login the system when providing valid username
73
username
Recover password
Admin add product with valid information
Fail to add product with name that already exists in the
P
P
P
system
Fail to add product when one or some or all fields are
empty
Fail to add product when inputting special character(s)
F
P
in the system
Fail to update product when one or some or all fields are
empty
Fail to
update
product
when
inputting
special
F
P
F
DECISION
P
F
F
DECISION
P
F
F
F
P
F
P
TASK
Internet explorer 11
Microsoft edge
Google Chrome (lastest version)
DECISION
P
P
P
4. Summary Tables for Total Number of Error Their Distribution and Types
TYPES
INPUT
OPERATION
DATABASE
HUMAN
STATUS
OK
16
6
0
0
NOK
11
4
0
0
77
be avoided, mitigated or prepared for, the better for the team, project and
organisation as a whole.
b) Produce:
Task Name
Duration
Start
Finish
Project Initation
(1).
Hardware
(2).
Software
(3).
Database Server
(4).
Web Server
(5).
Wait Frame
20 days
3 days
7 days
3 days
10 days
7 days
Tue 1/3/17
Tue 1/3/17
Thu 1/5/17
Fri 1/13/17
Mon 1/16/17
Fri 1/20/17
Mon 1/30/17
Thu 1/5/17
Fri 1/13/17
Tue 1/17/17
Fri 1/27/17
Mon 1/30/17
Designing
(1).
(2).
(3).
(4).
Back End
Front End
Debug
Review
30 days
27 days
28 days
20 days
25 days
Thu 2/2/17
Thu 2/2/17
Fri 2/3/17
Mon 2/13/17
Thu 2/9/17
Wed 3/15/17
Fri 3/10/17
Tue 3/14/17
Fri 3/10/17
Wed 3/15/17
Developing
(1).
Home Page
(2).
Log in - Register Page
(3).
Product Page
(4).
Search Page
(5).
Shopping Cart Page
(6).
Payment Page
(7).
Help Page
45 days
26 days
27 days
26 days
28 days
28 days
30 days
12 days
Wed 2/15/17
Wed 2/15/17
Wed 2/15/17
Wed 2/15/17
Wed 2/15/17
Wed 2/22/17
Wed 3/1/17
Mon 4/3/17
Tue 4/18/17
Wed 3/22/17
Thu 3/23/17
Wed 3/22/17
Fri 3/24/17
Fri 3/31/17
Tue 4/11/17
Tue 4/18/17
Testing
(1).
(2).
(3).
45 days
25 days
30 days
28 days
Wed 3/15/17
Wed 3/15/17
Tue 3/21/17
Wed 3/22/17
Tue 5/16/17
Tue 4/18/17
Mon 5/1/17
Fri 4/28/17
45 days
7 days
7 days
30 days
Wed 3/29/17
Wed 3/29/17
Mon 4/3/17
Mon 4/3/17
Tue 5/30/17
Thu 4/6/17
Tue 4/11/17
Fri 5/12/17
78
(4).
32 days
79
Mon 4/17/17
Tue 5/30/17
2) a GANTT chart
80
Database Server
Web Server
Wait Frame
6
7
Debug
Review
12
13
Product Page
Search Page
Shopping Cart Page
Payment Page
Help Page
18
19
20
21
22
Finish
3
Training
33
30 daysMon 4/3/1
Fri
75/ 12/17
Configuration
32
Hosting
31
SystemDeployment andMa
45in
da
ta
yin
sW
eed3/2T
9u
/1
e
75/30/17
30
29
28 daysWed 3/ 22
Fri
/14
7/28/17
27
25 daysWed 3/15
T/1
ue
74/18/17
26
45daysWed3/1T
5u
/1
e
75/16/17
12 daysMon 4/3/1
Tue
7 4/18/ 17
30 daysWed 3/ 1/1
Tue
7 4/11/17
28 daysWed 2/22
Fri
/13
7/ 31/ 17
28 daysWed 2/15
Fri
/13
7/24/ 17
26 daysWed 2/ 15
Wed
/17 3/ 22/17
27 daysWed 2/ 15
T/1
hu
73/23/17
26 daysWed 2/15
Wed
/ 17 3/22/ 17
45daysWed2/1T
5u
/1
e
74/18/17
25 daysThu 2/9/1
W
7ed 3/15/17
20 daysMon 2/13
Fri
/ 17
3/10/17
28 daysFri 2/3/ 17
Tue 3/14/17
27 daysThu 2/2/1
Fri
7 3/ 10/17
30daysThu2/2/1
W
7ed3/15/17
10 daysMon 1/16
Fri
/ 17
1/27/17
28
11 19 27 4
12 20 28 8
16 24 1
17 25 3
11 19 27 4
20daysTue 1/3/1
M
7on1/30/17
Duration
Start
25
24
Testing
17
23
Home Page
16
15
Developing
Front End
11
14
Back End
9
10
Designing
Software
Hardware
Project Initation
Mode
ID
(1):
(2):
(3):
(4):
(5):
Project Initation
Designing
Developing
Testing
System Deployment and Maintaine
81
Critical Path: Start (1) (2) (3) (4) (5) (6) Finish
(1).
(2).
(3).
(4).
(5).
Hardware
Software
Database Server
Web Server
Wait Frame
(2): Designing
(1).
Back End
(2).
(3).
(4).
Front End
Debug
Review
(3): Developing
Home Page
Log in - Register Page
Product Page
Search Page
Shopping Cart Page
Payment Page
Help Page
(4): Testing
(1).
(2).
(3).
(1).
(2).
(3).
(4).
Hosting
Configuration
Training
Support and Maintaine