What is Equivalence partitioning,Boundary value
analysis,Decision table testing,State transition
testing,Use case testing. Plz explain with example and
differences if any
Answers were Sorted based on User's Feedback
Answer / markusorelius
These are different test techniques, which are applied in a
structured way to the target software. They arise from
understanding where software typically fails, and why.
These technicques are very effective and efficient in
structuring a test for a specific kind of functionality.
You need to choose the correct one to apply in every case.
You do this by understanding what the particular item's
function is and thus how to test it with the most efficient
and effective method.
Is This Answer Correct ? | 3 Yes | 0 No |
Answer / raghavendra.reddy
EQQIVQLENCE PARTITIONING:As per Pressmen if i/p is range of
number then test for 1 valided no & 2 invalided ex:100-
500,then test 100, 99, 501. if i/p is set of values then
test for 1 valided & 2 invailed Ex:{10,45,67} test for
10,80,90.
BVA:IF I/P is range of values b/w "A" to "B" then test for
A,A-1,A+1,B,B-1,B+1.
Is This Answer Correct ? | 2 Yes | 2 No |
Answer / kishan prasad
Boundary Value analysis is the testing carried out at the
boundary values. Ex: if any application is said to have some
2-3 levels of values with which it should behave
differently, the tester exclusively tests those boundary
values specifically with decimal values, characters
etc.(like <40% fail, 40% to 50% third class, etc...
Is This Answer Correct ? | 0 Yes | 2 No |
what is the difference between onshore and offshore company
Which is the best testing model?
test cases on bangles???
what is meant by defect tracking system?
Genarally what we have to tell. If anybody asks in the interview. what are challenges u faced in the Project and what are the Risks u faced in the Project, Anybody can suggest it ......Thanks in Advance....
if u performing on real tym application ,u r getting some continous data n if some invalid data occurs wat types of testing is preferrable
What is Deffered? explain it who allocate it?
Which one is not key term used in internal control and security Option 1 Threat Option 2 Risk Control Option 3 Vulnerability Option 4 Exposure
any body can explain me door lock test cases,cell phone test cases, table and chair test cases
sir actually how we connect the Ajax engine to the normal web chat application how. And how Ajax engine works??
Explain BVP
Hi can any one plz answer me how to set up the test environment does it done by tester it self? its urgent thanks in advance roli