Cheng sequence test regulations (from Ge Hongbin)

xiaoxiao2021-03-06  66

Program test specification

Cheng sequence test regulations

The first part of the application test The first chapter interface test interface is the most direct layer interacting with the user. The quality of the interface determines the user's first impression of the software. Moreover, the design of a good interface can guide the user to complete the corresponding operation, and play a guide. At the same time, the interface is like a person's face, has a direct advantage of attracting users. The design reasonable interface can bring easy feelings and success. On the contrary, due to the failure of interface design, it is possible to make the user's fear and abandonment in the user's fear. 1.1 Easy to use the test button name should be easy to understand, accurately use the word, and discard the two-visible words, and to easily distinguish between other buttons on the same interface, the energy is ideally intended. Ideally, the user can know the functionality of the interface without consulting the help and performs the correct operation. 1) The commonly used button must have a keyboard shortcut. 2) The interface should be divided into the area according to the function, and there must be functional description or title. 3) The style of the interface and button should be unified as possible. 4) The interface must support the keyboard automatic browsing button function, which is the automatic switching function of the Tab key. 5) The interface should first be input and important information on the interface should be pre-tab sequential, and the position should also be placed on the window. 6) The focus should stay on the first EDIT when entering the interface. 7) Whether the number of controls on the interface is too much. Generally, it is best not to exceed 10, more than 10 should be recommended to use the paging interface. 8) Whether the function of the same interface is too much. Generally, it is best not to 10, excessive causes inconvenience. 9) Page Interface To support shortcut switching between pages, common combination shortcuts Ctrl Tab10) The default button To support ENTER and select operation, that is, press Enter to automate the default button to correspond to the corresponding operation. 11) The writable control is detected after illegal input, and the description should be given and the focus can be automatically obtained. 12) The order in which the Tab key is consistent with the sequence of controls. At present, the popular overall is from top to bottom, while the line is from left to right. 13) The content in the check box and option box should be ascended as much as possible in the selection chance. 14) The check box and option box usually have to have default options. 15) Options The same time Multi-use option box without the drop-down list box. 16) The interface space is used to use the drop-down box without the option box. 17) Use the option box when the option is small, and the drop-down list box is used. 18) Professional Strong Software To use the relevant professional terms, the versatile interface will advocate usage of genericity. 1.2 Normative usual interface design is designed according to the specification of the Windows interface, which contains the standard format of the "menu bar, toolbar, toolbox, status bar, scroll bar, right-click", which can be said: Interface Follow the level of standardization High, the better it is easy to use. Small software generally does not provide a toolbox. 1) The common menu must have a shortcut to a command. 2) The menu that completes the same or similar functions is open to the same position with the horizontal line. 3) The icon can be intuitive representative before the menu. 4) Menu depth general requires up to three levels. 5) Description of the menu is consistent with the pop-up form. 6) Large software General toolbar requirements can be customized according to user requirements. 7) Tools buttons of the same or similar functions are put together. 8) Every button in the toolbar has timely prompt information. 9) One toolbar has the longest length to exceed the screen width. 10) Toolbars can consider using toolboxs too much. 11) The toolbox has an increased reduction, and the user is customized according to the requirements. 12) The default total width of the toolbox does not exceed the screen width 1 / 5.13) Status bar to display the user's practical information, commonly used: Current operation, system status, user location, user information, prompt information, Error message, etc. If there is a longer time for a certain operation, the progress bar and process tips should be displayed. 14) The height of the state strip is appropriate to place the word five words, and the width of the scroll bar is slightly narrow than the status bar. 15) The menu and toolbar have a clear boundary; the menu requires convex display so that there is still a three-dimensional sense when the tool strip is removed. 16) Right-click the shortcut menu with the same criteria as the menu, and right-click the shortcut menu should not appear in the dialog. 1.3 Helping facility systems should provide detailed and reliable help documents, you can seek a solution when you use it when you use it. 1) Provide the function of timely calling the system to the system. Commonly used F1.

2) You should be able to locate the help location relative to this operation when calling your help on the interface. That is to say, help have immediate targeted. 3) It is best to provide currently popular online help format or HTML help format. 4) Users can use keywords to search for the help index, of course, should also provide help the subject. 5) When packaging a new system, a modified place to do corresponding modifications in helping documents. 6) In Help, we should provide our technical support, once the user is difficult to solve the new help method. 1.4 The position of the rational screen diagonal intersection is where the user's direct view is, and one quarter is easy to attract the user's attention. When placing the form, you should pay attention to the use of these two locations. 1) The center position of the parent form or the main form should be near the diagonal focus. Take the screen to cure. 2) The position of the subform should be in the upper left corner or in the main form. 3) The multiple subforms should be shifted to the lower right to display the top right below, to show that the form header is appropriate. 4) Important command buttons are placed on the interface with a more frequent button. 5) The button that is not related to the ongoing operation should be shielded (the button is displayed in Windows, which cannot be used). 6) The action that may cause data cannot be recovered must provide confirmation information to give the user to abandon the choice. And place the default focus of the button on the Cancel button. 7) The illegal input or operation should have sufficient prompts. 8) If there is a problem in the operation, there must be a prompt to let the user understand the error and avoid the formation of indefinitely. 9) Tips, warnings, or wrong description should be clear, clear, appropriate. 10) For operations that need to perform long-term operations, the status strip must be used, allowing users to understand progress, avoiding user misunderstanding as a crash. 11) Most drop-down frames, should not allow user input, if you need to enter, you should point out in the design document. 12) When the next pull box (ComboBox) allows the user to do not select any option, you should not display an empty option, you should use text description, such as "Please select ...". 13) For text boxes, the user allows the user to allow input characters and lengths, and pay attention to the maximum number and minimum number of values ​​in the input box, as well as the maximum number of values ​​in the input box, and the default value, and the default value, and the default value, depending on the type and length of its corresponding database field. Whitening values ​​or spaces. 14) Display data in the REPORT form (ViewStyle property = vSreport), generally requires implementation column sorting, and if the column sort can be unable to implement due to special reasons, users should be disabled. 15) Do not accept the correct date input for the date input box; whether the error is denied; the date input box is displayed after the date is entered, and the date is displayed in the established date format. 16) Whether there is a single-selection group and only one radical button can be selected; if there is no box button in the radio group, this situation is allowed to exist. 17) The check box group allows multiple check boxes (including all optional) optional; if there is no check box in the check box group, this situation is allowed to exist; text boxes and some controls refuse The display area is gathered or processed in terms of setting and selection. 18) The password input box is displayed in a mask. 19) For pages with change operations such as increase, modify or delete, refresh it in time. 20) For data entry interface, focus on how to improve users' entry speed. For example, there is "ID" and "Birth Date" in the interface. When the user enters a legitimate ID number, the system should automatically extract the date of birth and fill in the "Birth Date" control according to the ID number. 21) The system's prompt box pattern should be unified, and the standard Windows prompt box includes title, icon, probably, and function buttons. The icon uses to specification, select different icons according to the nature of the prompt information, and unless a serious error, generally does not use the "X" icon to avoid fear of fear.

22) If you need to enter some repetitive data frequently in your system, you should take it to extract it, allow the user to configure it, and then the system automatically completed the information. For example: The system has the function of registering corporate information, including the province, city, district where the company is located, and the province, the province, the province, the province, the province of the registered enterprises, let Users have repeatedly selected provinces every time you register, and the city will give users a lot of inconvenience. The user should be set by the user to set the default province, city, as long as the area is located in the enterprise, so that the user's registration efficiency is improved. 23) For the input control, it is forbidden to specify the input method for it. 24) After the form is displayed, the default focus should be located in the most reasonable control, which is convenient for user operation. 25) Input controls generally do not allow only spaces that can be input or stored at both ends of the input value. 1.5 Beautiful and coordinated interface sizes should be suitable for aesthetic perspective, feel coordinated and comfortable, can attract users' attention within a valid range. 1) The length and width is close to the golden spot ratio (the aspect ratio is 4: 3), and the long-width ratio disorder is avoided. 2) The layout should be reasonable, should not be too intensive, and it is not too empty and reasonable. 3) The button is basically similar, avoiding too long names, lests to occupy too much interface position, to coordinate with the size and space of the interface. 4) Avoid placing a large button on the empty interface. 5) The rear interface of the placed control should not have a large vacancy location. 6) The size of the font should be coordinated with the size ratio of the interface, and the Song's 9-12 in the font is usually used, and the fonts exceeding 12 are rarely used. It is recommended to use the Song No. 9 word. 7) Prospects and background color matching reasonable coordination, the contrast is not too big, it is best to use brunette, such as Dahong, Green, etc. Common color considers using Windows interface hue. 8) If other colors are used, the main color is soft, with affinity and magnetic force, and resolutely put the colors of the impression. 9) The main color commonly used in large systems has "# E1e1e1", "# Efefef", "# c0c0c0", etc. 10) The interface style should be consistent, the size, color, and font must be the same, unless there is an art handling or a special requirement. 11) If the form supports minimizes and maximizes or enlarges, the controls on the form should be scaled as the form; avoid only the form of the form and ignore the zoom of the control. For controls such as listView, TreeView, DBGRID, STRINGGRID, you must support maximization, allowing users to get information as much as possible. The default form should be in the "Restore" state. 12) If you can provide a custom interface style, you can choose color, font, and so on by the user yourself. 13) In addition to the main window, most other forms must support the function of knocking the "ESC" key, unless special indication in the design document. 1.6 Menu Location Menu is the most important element on the interface, and the menu location is organized according to the feature. 1) Menu usually use the "common-primary-secondary-tool-help" position, in line with popular Windows style. 2) Commonly used "File", "Edit", "View", etc., almost every system has these options, of course, according to different systems. 3) The drop-down menu is to group according to the meaning of the menu option, and cut according to certain rules, separated by horizontal line. 4) When using a set of menus, it should be arranged in the previous order when the use of a set of menus is required or awarded. 5) The menu item without the order requires the use of frequency and importance, which is commonly placed, is not commonly placed; it is important to start, the secondary is placed behind. 6) If there are many menu options, the length of the length of the long menu should be used to reduce the principles of depth. 7) There is a shortcut command mode for a commonly used menu. 8) For menus-independent menus that are not related to the manifest, if you use a dynamic loading method - that is, only the menu needs to be displayed - the best.

9) The icon before the menu should not be too big, and the word high is consistent. 10) The width of the main menu is close, the number of words should not be more than four, and the number of words in each menu can be the same. 11) The number of main menu should not be too much, preferably arranged in single row. 1.7 Uniqueness If you follow the industry's interface standard, you will lose your own personality. In the case of the framework, it is especially important to design your own unique style. Especially in the circulation of commercial software, there is a good potential and unpredictable advertising utility. 1) There should be a unit introduction or product introduction on the installation interface, and have your own icon. 2) The main interface, it is best to have a company icon on most interfaces. 3) The login interface must have the logo of this product, and include the company icon. 4) Help menu "About" should be copyrighted and product information. 5) The company's series of products should maintain a consistent interface style, such as background color, font, menu arrangement, icon, installation process, buttons, etc. should be substantially consistent. 1.8 Shortcuts The combination of shortcuts uses shortcuts in the menu and buttons to allow users who like to use the keyboard to operate faster, mostly consistent in the use of shortcut keys in Western Windows and their applications. Menu: 1) The combination of transactions is: Combination key Ctrl-D Ctrl-f Ctrl -h Ctrl-i Ctrl-N Ctrl-S Ctrl-o Function Replacement Insert New Record Save Open 2) Edit: Combination Key Ctrl -A CTRL-C CTRL-V CTRL-X CTRL-Z CTRL-Y Function All Choice Copy Paste Shear Undection Operation Recovery Operation 3) File Operation: Combine Key Ctrl-P Ctrl-w Function Print 4) System Menu Handle ALT-F Alt-E Alt-T Alt-W Alt-h File Editing Tools Window Help 5) MS Windows Reserved Key: Combine Key Ctrl-Esc Ctrl-F4 Alt-F4 Alt-Tab Enter Esc Shift-F1 Function Task List Close window end application Next application default button / confirmation operation cancel button / cancel operation context-related help 6) button: (can be adjusted according to system needs, the following is only a commonly used combination.) Competence ALT-Y Alt-C Alt --N ALT-D Alt-Q Alt-A Alt-E Alt-B Alt-R Alt-W function Determines No Delete Exit Add Edit Browse to read and write these shortcuts can also be used as a standard for developing Chinese applications, but can also Use the beginning of the English pinyin. Chapter II Function Test Before the test, we must first understand the needs of users and thoroughly understand the requirements of the Demand Analysis Report. Pay attention to the following points: A. Test the primary function when testing, that is, the primary function will be tested, and then the secondary function will be tested. To identify the function of the system, let the data flow through the functional backbone, the test function is implemented correctly. This system is failed as long as the function is problematic. B. After the function is working properly, we also consider testing its exception handling function. C. After the function of the trunk test is correct, the test of branch function is again. E. To make the program's functionality, it is not satisfactory, and it should be pointed out by system defects to the project leader or system developer. F, check whether the functionality required by the system requirements and the design specification is implemented in the system, whether the performance reaches the indicator. G, whether the logical relationship between data is correct. H, there must be preview and print function. For enterprise software, printing cannot only be tested in a variety of printers.

Chapter III Environment Test Configuration Test Environment is an important phase of test implementation, and whether the test environment is suitable for severely affecting the authenticity and correctness of the test results. The test environment includes a hardware environment and a software environment, hardware environment refers to the necessary servers, clients, network connecting devices, and printer / scanners such as the environment of secondary hardware devices such as printer / scanners; software environment refers to the operating system of the measured software. The environment consists of databases and other application software. In actual testing, the software environment can be divided into main test environments and secondary test environments. The main test environment is the main environment for most of the test software functions, security reliability, performance, and ease of use. In general, configuring the main test environment can follow the following principles: 1. Compliance with the minimum requirements of the software. The test environment must first ensure that the support software is operating normally. 2. Select a relatively popular operating system and software platform. It is generally tested at Win98, Win2000, 200 Server, Windows XP, unless there is special requirements on the software design documentation. 3. To ensure that the system is tested at least two or more browsers that are popular. Such as IE5, IE5.5, IE6, NS7, etc. 3. Create a relatively simple, independent test environment. In addition to the operating system, only software running and testing software is installed on the test machine to avoid unrelated software impact test implementation. 4. Non-toxic environment. Use effective genuine anti-virus software to detect software environments to ensure that there is no virus in the test environment. And testing the two anti-virus software that the software is popular with the time is not full. 5. Resolution environment. To test at different resolutions, ensure that the display of each page of the software is normal. For programs prepared under Win2000, check the fonts and controls on the interface in the Win9x environment. 6. Web environment. To see if the network connection is normal; whether a local area network and the Internet are required. The auxiliary test environment is often used to meet different test requirements or special test items: Compatibility Test: In the range of satisfying software operation requirements, some typical operating systems and common applications can be selected to install unloading and main functions. Simulated real environment test: Some software, especially commercial software for the public, often need to invest in real-world performance during testing. If the scan speed of the test anti-virus software is tested, the proportion of different types of files arranged on the hard disk should be as close to the real environment, so that the data tested has practical significance. Transverse Contrast Test: Use the secondary test environment "clone" to fully consistent testing environments, thereby ensuring equal contrast of each subject. Chapter IV Pressure Test Pressure Test Use to check the ability of the procedure to abnormally. When the information about the capacity is uncertain, it is necessary to determine if there is enough disk space, whether the capacity of the communication is sufficient, and the test system is overloaded. Pressure tests always force the system to run under an abnormal resource configuration. For example, 1 When the normal frequency of the interrupt is one to two times per second, run the test case for 10 interrupts per second; 2 Quantitatively grow the data input rate, check the reflection capabilities of the input sub-function; 3 Run require maximum storage space ( Or other resource) test case; 4 operations may result in test cases that can cause crash or disk data dramatically or disk data; 5 multi-user, exceeding the system set by the system simultaneously; 6 is more faster than expected speed and system Interaction; 7 allows the system to run for a long time, etc. Chapter 5 Recovery Test Recovery Test Main Checking System's fault tolerance. When the system is wrong, the error can be corrected in the specified time interval and restart the system. Recovery tests first use various ways to force the system failure, and then verify that the system can recover as soon as possible. For automatic recovery, the correctness of the mechanism, the checkpoint, data recovery, and restart, and the recovery system for manual intervention, and the average repair time is also required to determine if it is within an acceptable range. Chapter 6 Performance Test Performance Test is mainly for response time, transaction speed, data display speed, calculation speed, network transmission speed, database query response time, scan time, scanning identification rate, etc., and other time-related needs. Evaluation. The goal of performance evaluation is whether verification needs are met.

The purpose of implementing and executing performance evaluation is to evaluate and fine tune performance behavior of test objects as a function (eg, workload or hardware configuration). For those real-time and embedded systems, the software part does not meet the performance requirements, although the process steps contain performance tests, but only when the system is really integrated, can only be in a real environment Comprehensive, reliable test running performance system performance test is to complete this task. Performance tests are sometimes combined with intensity testing and often require supporting support for other hardware and software. In addition, you also need to pay attention to the test of system consumption resources such as CPU load, memory, memory, and hard disk resource consumption. Chapter 7 Security Test Safety Test Inspection System The Preventive Ability of Illegal Intrusion. During the safety test, the test personnel pretend to be illegally invaded, and various ways to try to break through the defense line. For example, I want to take a way to intercept or decompose the password; 2 specialize in the protection mechanism of the software destruction system; 3 deliberately lead to the failure of the system, trying to recover the machine to enter; 4 Attempt to browse non-confidential data, derive the required letter; 5 permission control Reasonable, correct, etc. In theory, as long as there is enough time and resources, there is no system that cannot be entered. Therefore, the system security design is the value of illegal intrusion exceeding the value of the protected information. At this time, illegal invasants have been unprofitable.

Chapter 8 Installing the test A. Basis of the operation of the user's operating environment, no development tools (such as BCB, Delphi, VB or VC), and on a computer without special font, based on the product "Manual" / The installation instructions in the Installation Manual is installed, and both automatic installation and manual configuration can be properly installed according to the wizard. After installing exit, the software can start, run. B, the prompt on the product installation interface is correct, and the installation is guided, the copyright instructions are consistent with the program. C, when installing, the path to the default installation path, the path specified by the user is required to be properly installed. D. When the user has a path to the path, if there is an existing path, it is possible to create the path and install it. E. After the program is installed, in the start-program menu, you want to generate Chinese shortcuts or program groups. The company's software products, to generate the "Wu Lu ** Software" program group, which to generate Chinese fast the way. F, uninstall test, if the system provides automatic uninstall tool, after the uninstall, check if all files are removed, and whether the registration information in the registration table is also deleted. G, the installation is complete after the uninstall operation is performed, see if it is successful. H, first install the client, install the server, see if there will be problems. I, check whether the system has an impact on other applications.

Chapter 9 Documentation Test Compares the document with procedures to see if there is any case. Check if the screenshot of the document is consistent with the program, check if the document has a wrong word or does not meet the syntax specifications. A. The help documentation of the program must explain the accuracy, easy to understand, do not have to speculate, and the operation steps should meet the requirements of the program. B. It is easy to understand and easy to understand. C. In the picture captured from the program, the data must represent meaning, not some combination of messy letters, numbers. Meaningful data can also play a guiding role in the operation of the user. In summary, the documentation should be checked, correctly verified, consistency, easy to understand, easy to browse, version, unified checklist.

Chapter 10 Returning Test When the program is modified, in order to ensure the correctness of the function, it is necessary to retest the part that has not changed in the application. In the case of time and conditions, you want to test the modified entire module or even the entire program.

The second part of the Web program test 1. Edit the test type classification field. Field editing checks to view formatting, boundaries, and computational errors. If the date needs to be limited to a specific time range, is the software allow input to the date outside of this time? Whether to require a digital field only contain numbers? What happens if the letters will occur? If the calculation is included correctly? Is the field input box to the requested input, is it big enough? If there is a drop box, is it correct? Stream control and status test. Will the logic reach the expected process after filling in the fields in the form and press the button? Is the value correct when the same page is displayed next time? Sometimes the page first shows the correct value, and will no longer be displayed later; or the opposite. Configure test. In a feasible case, the application will be tested with as many "supported servers" and client programs. Load test. Before you test the page or web application as a whole, you should first load and performance testing at the component level to ensure that each portion of the application can run under the appropriate indicator. This isolation test enables the test team more quickly discovered problems using specific technologies. If a small script that performs a database query function is too slow, the component level test is easier to discover it entirely on the entire page or application test. Regression Testing. After the development department fixes the error in the code, we will re-test to check if the error is fixed and ensures that the repairs do not cause other problems. Second, classify according to the form:

The left navigation pane: Is it possible to move back and forth in the navigation pane on the left, is the pane display correct? Can I scroll over the area greater than the screen? Can you choose a different news group, whether the list of article is displayed in the upper right pane? Can I adjust the left navigation pane and the size of the upper right and lower right pane? On the right pane: Does the upper right pane show the article correctly, do you maintain the trace status of each article? Can I traverse the serial article? After reading an article, is it marked as red? If the article list is greater than a page, can you traverse each page in the upper right pane? Right Pate: Can I choose an article and display it in the lower right pane of this page? Can I release new news, reply group, reply to personal or forwarding articles? When you reply to your personal or forward messages, whether the default mail client starts and displays new messages? Can I send an attachment with articles? Can you view attachments? Toolbar: Verify that the toolbar is appropriate for its page and can be adjusted according to the browser window. Verify that the local menu can run normally. Verify the links in the local menu. Verify that the global menu can run normally. Verify links in the global menu. Verify all graphics on the toolbar. The verification toolbar frame size is not adjustable. Interface Test Site Map and Navigation Strips Confirm that there is a map where you are tested. Some web masters can go directly to the place where they are going, do not have to click on a large pile. In addition, new users may lose in the website. Site maps and / or navigation bars can boot users to browse. You need to verify that the site map is correct. Confirm that the link on the map does save. The map does not include all links on the site. Whether each page has navigation bar? Is the navigation bar agree? Is the link of each page? Is the navigation bar intuitive? The content tester should ensure that the site looks more professional. It is uncomfortable to use bold characters, large fonts and underscores. When testing the user availability, it is best to ask the graphic design expert to evaluate the site. You may not want to see an article where you are black, so I believe you also want your site to be more professional. Finally, it is necessary to determine if the links of the relevant sites are listed. Many sites wish users send mail to a specific address, or download the browser from a site. But if users can't click on these addresses, they may feel confused. Color / background Since Web is increasingly popular, many people look like graphic design works. Unfortunately, some developers are more interested in new background colors, so that this background color is easy to browse. A typical site is a yellow text on a purple picture (if you have not seen such a site, browse the personal home page on Geocities or AOL, there are many such). This page looks "very noble", but it looks hard. Generally, it is a good choice to use a little or try not to use the background. If you want to use the background, it is best to use monochrome, and the navigation bar is placed on the left of the page. In addition, patterns and pictures may transfer users' attention. The picture is a picture that is better than a picture regardless of the focus of the screen or a small icon that is guided. Sometimes, the best way to tell the user is to show it to the user. However, bandwidth is very valuable to the client or server, so pay attention to save the memory. Whether all the images are valuable to the page, or they just waste bandwidth? Do you use other file formats (.gif, .jpg) whether the size can be reduced to 30K below? Usually, don't The big picture is placed on the home page, because this may give the user to give up the download home. If the user can see the home quickly, he may browse the site, otherwise it may give up. The table needs to verify that the form is set correctly.

Does the user need to scroll to the right to see the price of the product? Put the price on the left, and put the product details more effective? Is the width of each column be wide enough? Is there a fold? Is there a lot of content, and the content of the whole line is long? Welp, it is necessary to verify that the text is wrapped correctly. If you explain the image to the right, you should make sure the image appears on the right. Don't make the windows and paragraphs or alone because you use pictures. Functional Test Link link is an important means to use users from a page to another page. For each link, you need to verify two things: First, the link takes the user to the place it explained, and is existing by the link page. This sentence sounds some problems, but there are many internal links of many sites are empty. This is really unbearable. The form When the user is submitted by the form, it is desirable to work properly. If you use a form to register online, make sure that the submit button can work normally, and should return to the successful message after the registration is complete. If you use a form to collect distribution information, make sure that the program can handle this data correctly, and finally allow customers to allow customers to receive parcels. To test these programs, you need to verify that the server can properly save these data, and the program running in the background can explain and use this information correctly. Data check If you need to check the user input according to your business rules, you need to ensure that these calibration functions work. For example, the province's fields can be verified with a valid list. In this case, you need to verify the list complete and the program correctly calls the list (for example, adding a test value in the list, determining the system can accept this test value). Many users like sweets, but developers like Web cookies (cookies). If the system uses cookies, testers need to detect them. If you hold registration information in cookies, confirm that the cookie can work normally and have already been encrypted. If you use cookie to count the number of times, you need to verify that the number of validations is correct. The application-specific functional demand is that testers need to verify the application specific functional requirements. Try all the operations that the user may perform: Under orders, change orders, cancel orders, check order status, change delivery information, online payment, etc. before the goods are sent. This is the reason why users use websites must confirm that the website can be magical as advertising. Interface test In many cases, the Web site is not isolated. The Web site may communicate, request data, verify data, or submit orders with external server. The first interface that the server interface needs to be tested is the interface between the browser and the server. Test staff submit transactions, then view server records and verify that it is just what happened on the server. Test staff can also query the database and confirm that transaction data is properly saved. External interface Some web systems have external interfaces. For example, online stores may have to verify credit card data in real time to reduce fraud. When testing, you should send some transaction data using the web interface, verify the valid credit card, invalid credit card, and the stolen credit card. If the store only uses the VISA card and the MasterCard card, you can try the data of the Discover card. (Simple client scripts can identify the code before submitting the transaction, such as 3 means American Express, 4 indicating that Visa, 5 represents the MasterCard, 6 represents discover.) Normally, the tester needs to confirm that the software can handle all possible software to process all possible Message. Error handling is the most vulnerable place to be ignored by the tester is the interface error handling. Usually we try to confirm that the system can handle all errors, but cannot expect all system all possible errors. Try to interrupt the transaction during the process and see what happens? Is the order completed? Try interrupt the user to the server's network connection. Try to interrupt the web server to the credit card verification server.

In these cases, can the system handle these errors correctly? Have a credit card for charging? If the user interrupts the transaction, when the order is saved, the user does not return to the website to confirm, the customer needs to call the user to make an order confirmation. Compatibility Test Requires Verify that applications can run on the machine used by the user. If your users are worldwide, you need to test a variety of operating systems, browsers, video settings, and Modem speeds. Finally, try the combination of various settings. Operating system Your site can be browsed on Mac and IBM compatible systems? Some fonts may not exist on a system, so you need to confirm that the spare font is selected. If the user uses two operating systems, confirm that the site does not use only one in which only one of the operating systems can be run. Can a browser site use Netscape, Internet Explorer or Lynx? Some html commands or scripts can only run on some specific browsers. Please confirm that there is an alternate text of a picture, because there may be a user using a text browser. If you use SSL security features, you only need to verify 3.0 or more browsers, but for older versions, users should have relevant message tips. Video Settings page layout does not display normal? Is it too small to browse? Is it too big? If the text and the picture are aligned? Whether the text and the picture have this situation? Using 28.8 MODEM to download a page take 10 minutes, but the tester uses the T1 line when testing? When the user downloads the article or presentation, it may wait for a long time, but it will not be patiently waiting for the first page. Finally, you need to confirm that the picture is not too big. Printer users may print them down. Therefore, the net is also designed to take into account printing problems, pay attention to saving paper and ink. Many users like to read rather than staring at the screen, so you need to verify that the page print is normal. Sometimes the images and text alignment displayed on the screen may be different from those of printing. Test staff requires at least verification order confirmation page printing is normal. Combined tests finally need combination tests. The resolution of 600x800 may be good on the MAC machine, but it is ugly on the IBM compatible machine. Using Netscape on the IBM machine can be displayed normally, but it is not possible to use Lynx to browse. If it is an internal Web site, the test may be easier. If the company specifies the use of a type of browser, simply test on the browser. If all people use T1 line, it may not need to test downloads. (However, it should be noted that there may be employees to dial-entered the system from home) Some internal applications, the development department may declare that some systems do not support certain systems in system requirements. However, the ideal case is that the system can run on all machines, which will not limit the future development and change. Load / Pressure Test Test requires whether the system can respond to a large number of users at the same time, whether the system can respond when the user transmits a large amount of data, and the system can run for a long time. Accessibility is extremely important to users. If the user gets the "system busy" information, they may give up and turn to the competitors. System detection not only enables users to access the site normally, in many cases, there may be hackers attempt to attack the server by sending a large number of packets. For security reasons, testers should know which measures need to be taken when the system is overloaded, rather than simply improving system performance. Instantly Accessing Peak If your site is used to announce the lottery results of the lottery, it is best to respond to millions of requests within a period of time after the winning number announced. The load test tool can simulate X users simultaneously access the test site.

Each user transmits a large number of data online bookstores, most users may only order 1-5 books, but the university bookstore may order the textbooks related to psychology introduction? Or a grandmother to buy Christmas gifts for her 50 children (of course each Children have their own email address) Can I handle a lot of data from a single user? For a long time, if the site is used to process flowers orders, then at least it hopes to continue to run in the week before Mother's Day. If the site provides a web-based Email service, it is best to continue to run for a few months, or even years. You may need to use the automated test tool to complete this type of test because it is difficult to complete these tests by manual. You can imagine 100 people and click on a site. But organize 100,000 people at the same time. Typically, the test tool is based on the second time, it is enough to pay the cost. Moreover, after the test tool is installed, when you use it again, just click a few times. Security testing is very important even if the site does not accept credit card payment. User information collected by the Web site can only be used inside the company. If the user information is leaked by hackers, the customer will not have a sense of security when trading. The first step in the directory setting web security is to set the directory correctly. There should be index.html or main.html pages in each directory so that all content in this directory will not be displayed. A company I serve did not perform this rule. I selected a picture, click the right mouse button, find the path "... com / objects / images". Then enter the path manually in the browser address bar and discover all the list of all images of the site. This may have no relationship. I entered the next level directory "... com / objects", click JackPOT. There are a lot of information in this directory, which causing me to pay attention to the expired page. The company has to change the product price every month and save the expiration page. I looked at these records, I can estimate their marginal profits and how much price reduction space they have in order to strive for a contract. If a customer looks at this information before the negotiation, they are definitely in the negotiation table. SSL a lot of sites use SSL for secure transmission. You know that you enter an SSL site because the browser has a warning message, and HTTP in the address bar is https. If the development department uses SSL, the tester needs to determine if there is a corresponding alternative page (for browsers for version 3.0 below, these browsers do not support SSL. When the user enters or leave the security site, please confirm that there is a corresponding prompt. Information. Is there a connection time limit? What happens after the limit time? Log in to some sites require users to log in to verify their identity. This is convenient to the user, they don't need to enter personal information every time. You need to verify The system blocks illegal username / password login, and can log in to log in. Is the user log in? Do you log in from some IP address? If you allow login failure, you can enter the third time you entered Correct username and password can pass verification? Do you choose a rule limit? The log file is in the background. Pay attention to the authentication server log work. Do you record all transaction? Do you record a registration attempt to record? Do you record theft Use of credit card? Do you save when each transaction is complete? Record the IP address? Record the username? Scripting language scripting language is a common security hazard. The details of each language are different. Some scripts allow access to the root Directory. Others only allow access to mail servers, but experienced hackers can send server usernames and passwords to themselves. Find out which scripting languages ​​have been used and study the language of the language. The best way is to subscribe to a discussion site Script language security newsgroups. Conclusion Whether you are taking Internet, intranet, web testing is more challenging relative to non-Web testing. User is very high The expectation.

In many cases, just like business functions, the page is used to maintain and develop public relations, so the first impression is very important. The third part of the database program test? If you want to save time in the SQL database, the time of time must be greater than or equal to 1753, if less than 1753, it is wrong when the database is modified. • When testing a database program, in addition to testing if each database operation is correct, we must focus on test database sharing issues, that is, multiply, the same function is implemented, so it will operate the same data table, the test program is normal. • When testing a database program, you have to test the speed of the database operation. If the database is slow, you should notify the programmer to optimize.

转载请注明原文地址:https://www.9cbs.com/read-119443.html

New Post(0)