当前位置:网站首页>Software testing and quality learning notes 1 --- black box testing
Software testing and quality learning notes 1 --- black box testing
2022-07-28 11:35:00 【Pingguo stuffed with rice cakes】
1. Black box testing -- Division of equivalence class
2. What is the equivalence class division method
Equivalence class It refers to a subset of an input field . Equivalence classes are divided into Effective equivalence class ( reasonable 、 meaningful , Function and performance )、 nothing Efficient equivalence class ( Unjustified 、 Meaningless , exception handling ).
Effective equivalence classes and invalid equivalence classes need to be considered when testing cases .
Division of equivalence class : Divide all possible input data into several parts ( A subset of ), Then from each subset Select a few representative data as test cases .
3. How to divide ?
3.1---- Types of equivalent classes
(1) Divided by bilateral interval ( Specifies the Value range or number of values , This can determine a valid equivalence class and two invalid equivalence classes )
(2) According to different values ( Specifies the A set of values ( Assume n individual ), And the program should process each input value separately , Determinable n Valid equivalence class and invalid equivalence class )
(3) Divided by unilateral interval ( The input condition specifies the set of input values , In this case, an effective equivalence class and an invalid equivalence class can be established )
(4) According to the restrictions / Rule Division ( It specifies the rules or restrictions that must be observed by the input data , A valid equivalence class can be determined ( Conform to the rules ) And several invalid equivalent classes ( From different angles
--------- Degrees violate the rules ).
)------------------------------------------------------------------------------------------------------------------------
1. Boundary value analysis - Black box testing
A black box test method for testing input or output boundary values . As a supplement to the equivalence class division method .
2. Boundary point
Boundary points are relative to input equivalence classes and output equivalence classes , Slightly higher than 、 Slightly below Some specific cases of its boundary value
3. The difference between boundary value analysis method and equivalence classification method
Division of equivalence class : From an equivalent class Optional In one as test data
Boundary value analysis : Every The boundary is targeted Select test data , For input data and output data
Be careful : How to select test data by boundary value analysis ( See the picture for details )

example : The specification of the procedure stipulates :“ The weight is 10 Kg to 50 kg Messages in range , The test data should take 10 And 50, You should also take 10.01, 49.99, 9.99 And 50.01 etc. .
Analysis specifications , Find out other possible boundary conditions
for example , Special boundary values : The default value is 、 Null value 、 Space 、 zero 、 Invalid data, etc .
4. Boundary condition test case design method
The boundary based method is implemented according to the definition domain , Four technologies .
General boundary value condition test : For one n Variable function , The number of test cases generated by this method is 4n+1 individual
Robustness boundary condition test : For one n Variable function , The number of test cases generated by this method is 6n+1 individual
Worst case test : For one n Variable function , The number of test cases generated by this method is 5^n individual .
Robust worst case testing : For one n Variable function , The number of test cases generated by this method is 7^n individual .
------------------------------------------------------------------------------------------------------------------------------.
1、 Decision table method - Black box testing
Premise : The equivalence division method and boundary value analysis method are more suitable for the case where the input variables or input conditions are independent of each other , But when input variables or input conditions are interdependent 、 When they restrict each other , It is difficult to describe using the equivalent class division method and boundary value analysis method , The test effect is also difficult to guarantee .
2. Determine the composition of the table The rules —Rule
Condition stake — List all the conditions of the problem .Condition Stub
Condition item A condition given for the condition pile , List all possible values Condition Entity
Action post — List possible actions specified in the problem .Action Stub
Action items — It points out the actions to be taken when each group of condition items takes value .Action Entity
3. The simplification of the decision table mainly includes : Rule merge and rule include
4. The establishment steps of decision table
List all condition piles and action piles -- Determine the number of rules -- Fill in the conditions -- Fill in the action items -- Simplify the decision table
边栏推荐
- 数字孪生轨道交通:“智慧化”监控疏通城市运行痛点
- 【Gradle】This version of the JMH Gradle plugin requires Gradle 6+, you are using 6.6.
- 我想请教下各位大佬,cdc采集mysql时,如果发生了主从切换,有什么方案可以处理吗
- Microsoft security team found an Austrian company that used windows Zero Day vulnerability to sell spyware
- No swagger, what do I use?
- Display line number under VIM command [easy to understand]
- Xiaoshuidi 2.0 website navigation network template
- 微软安全团队发现一家利用Windows零日漏洞销售间谍软件的奥地利公司
- 【MySQL】Got an error reading communication packets
- 什么样的知识付费系统功能,更有利于平台与讲师发展?
猜你喜欢

字节一面:如何用 UDP 实现可靠传输?

zotero文献管理器及其使用姿势(不定时更新)

Machine learning strong foundation plan 0-5: why is the essence of learning generalization ability?
微软安全团队发现一家利用Windows零日漏洞销售间谍软件的奥地利公司

目标检测领域必看的6篇论文

Learning notes tree array

技术分享| 快对讲综合调度系统

Blackboard cleaning effect shows H5 source code + very romantic / BGM attached

Three methods of using unity mouse to drive objects

LiteSpeed Web服务器中安装SSL证书
随机推荐
STM32 drives st7701s chip (V ⅰ V0 mobile phone screen change price)
web安全入门-Radius协议应用
Two point, three point, 01 point plan [bullet III]
Refresh your understanding of redis cluster
Introduction to web security RADIUS protocol application
【一知半解】零值拷贝
【cesium】entity属性和时许绑定:SampledProperty方法简单使用
Learn to use MySQL explain to execute the plan, and SQL performance tuning is no longer difficult
Ten thousand words detailed Google play online application standard package format AAB
DHCP experiment demonstration (Huawei switch device configuration)
[half understood] zero value copy
Rongyun IM & RTC capabilities on new sites
目标检测领域必看的6篇论文
Tiktok programmer confession special code tutorial (how to play Tiktok)
【MySQL从入门到精通】【高级篇】(十)MyISAM的索引方案&&索引的优缺点
大佬们,问下,这个不能checkpoint,因为有个jdbc的task任务状态是FINISHED,
JWT login authentication + token automatic renewal scheme, well written!
WPF依赖属性(wpf 依赖属性)
postgres概述
JWT 登录认证 + Token 自动续期方案,写得太好了!