手机测试相关英语
巡山小妖精
527次浏览
2021年01月17日 01:31
最佳经验
本文由作者推荐
qq头像黑白伤感-云水禅心
Mobile Black Box Testing Introduction
Black box testing (black-box testing), also known as functional testing, data-driven testing
or specification-based testing. When tested in this way, the program under test is treated
as
invisible
inside
the
black
box.
Without
any
consideration
the
internal
structure
and
internal
features
of
the
case,
the
test
procedures
were
based
only
on
functional
requirements specification into account to determine the test cases and test results are
correct inference. Thus black box testing is testing from the user point of view, the idea is
intuitive since the black box program is required to do certain things, then we see if it is not
in any case to do right. Complete
generated test cases for this approach to a limited test cases and more than enough to
cover
high-level
tests
such
as
the
validation
testing,
system
testing,
acceptance
testing
are
using black box testing.
The first is the usual black-box functional testing program. Requirements:
Each software features must be a test case or a recognized exception covered.
Data types and data values with the minimum set of tests.
With a series of real data types and data values to run the test overload, saturation, and
other
Using hypothetical data types and data values, testing the ability to exclude irregular input;
Affect the performance of key modules, such as the basic algorithm, test unit performance
(including accuracy, time, capacity, etc.).
Not only to assess
program should not do not do the 2
are normal. These include data types and data values of the exception, and so on. The
following are several ways: (a) equivalence class partition, (b) cause and effect diagram
method, (c) boundary value analysis, (d) mistaken method, (e) random number method,
that
is,
from
a
broader
perspective
for
black
box
testing.
Each
method
seeks
to
cover
more of
methods will get a good set of test cases.
1 equivalence class partition
Equivalence class partition is a typical black-box testing methods. Equivalence class is
a collection of input fields. It said the process of exposing the errors, the collection of each
input conditions are equivalent. So long as we select a set of data to a test. Equivalence
class
partition
method
is
to
process
the
input
domain
is
divided
into
a
number
of
equivalence classes, and then select a few from each part of the representation of data as
test cases. This test program can use a small number of test cases in a large class of
reflection.
In
considering
the
equivalence
class,
you
should
pay
attention
to
distinguish
two
different situations:
Effective
equivalence
class:
the
effective
equivalence
class
refers
to
the
process
specification is meaningful, constitute a reasonable set of input data. On specific issues,
the effective equivalence class can be one, it can be more.
Invalid equivalence class: invalid equivalence class refers to the process specification is
unreasonable or meaningless set of input data posed. For specific questions, at least one
invalid equivalence class, there may be multiple.
Determine the equivalence class has the following principles:
If
the
input
condition
to
the
range
or
the
number
of
values,
you
can
identify
a
valid
equivalence
class
and
two
invalid
equivalence
classes.
For
example,
the
program's
specification, including reference to the input of
999 ...
equivalence class as the
及
项数
> 999.
Input condition specifies the set of input values, or provides a
determine
a
valid
and
an
invalid
equivalence
class
equivalence
class.
If
a
procedure
involves an identifier, the input condition is that the
you
valid equivalence class.
If
we
do
know,
has
been
divided
into
the
equivalence
class
of
each
element
in
the
program's
approach
is
different,
this
equivalence
should
be
further
divided
into
smaller
equivalence classes.
Invalid input conditions effective equivalence class equivalence class
. . . . . .
. . . . . . . . . . . .
. . . . . . . . . . . .
. . . . . .
Equivalence classes have been listed under the table, the following steps to determine
the test cases:
Provided for each equivalence class a unique number;
Design a test case to cover as much as possible the effective equivalence class are not
yet covered. Repeat this step, and finally makes the equivalence classes are all valid test
cases covered;
Design
a
new
test
case
to
cover
only
a
valid
equivalence
class.
Repeat
this
step,
all
invalid equivalence class are covered. Emphasize here that each cover only one invalid
equivalence class. This is because if a test case with multiple defects, there may be only
found
in
the
test
one,
others
are
ignored.
Equivalence
class
partition
method
to
comprehensively and systematically consider the black-box test case design, but did not
pay
attention
to
use
some
of
the
and
test
cases.
Behind
the
introduction of boundary value analysis can compensate for this shortcoming.
2 Cause and effect diagram
Equivalence class partition method does not take into account the various combinations of
input conditions. Although all input conditions that could go wrong alone have seen, but
combined multiple input case the situation may be wrong but was ignored. Using a causal
diagram approach can help us select a set of steps according to a certain and efficient test
cases at the same time, but also pointed out to us the description of procedural norms
there is any problem.
Export test cases using causal map to go through the following steps:
Analysis procedure described in the specification which is the cause, which is the result.
Because often the condition or input conditions of input equivalence classes. The result is
the output condition.
Analysis
procedure
described
in
the
specification
of
semantic
content,
and
expressed
various reasons connected with the various results of the
As
the
syntax
or
environmental
constraints,
some
of
the
causes
and
results
of
the
combination is not the case. To show that these specific circumstances, the causal map
marked with the symbol hold special constraints. The causal map into a decision table.
The decision table for each column written a test case.
3 boundary value analysis
Boundary value analysis is listed unit features input, status and control legal and illegal
border value of the boundary value, design test cases, including all of the boundary value
method.
Typically
include
the
IF
statement
in
the
discriminant
value,
domain,
range
boundary,
empty
or
malformed
input,
the
end
of
the
controlled
status.
Boundary
value
analysis is not to find an example of a class method, but the handling of the situation along
the border as the main objective of specially designed test methods. In addition, boundary
value analysis not only to examine the value of the input side, but also consider the value
of the output side. This is derived from people's experience is an effective way. It found
that many software errors is the next standard, data structures and scalar boundary value
and its upper and lower there, run the test cases found in this region the probability of
error is high.
Design using boundary value analysis test cases, the following principles:
If the provisions of a range of input conditions, or provides a number of values should be
within
the
boundaries
of
that
range
and
just
beyond
the
range
of
values
outside
the
boundaries,
or
were
on
the
maximum,
minimum,
and
slightly
less
than
the
minimum,
slightly greater than the maximum number as a test case. If norms
to 255
Conditions for each output using the standard principles of [a].
If
the
procedural
norms
mentioned
in
the
input
or
output
field
is
an
ordered
collection
(such as order documents, forms, etc.) should pay attention to select the ordered set of
the first and last element as a test case.
Analysis
specifications,
possible
to
identify
a
possible
boundary
conditions.
A
typical
example is the boundary value analysis of the triangle classification program. Select a, b,
c form sides of a triangle,
conditions. Boundary value analysis of the same price class into different emphasis on the
equivalence class partition is a supplement. If the triangle problem, select a = 3, b = 4, c =
5, a = 2, b = 4, c = 7 overwrite valid and invalid equivalence classes. If the equivalence
class is divided into the boundary value analysis in the idea. In each equivalence class in
the use cases not only select a cover, but then select the equivalence class of boundary
value equivalence class partition method will be more effective, the final boundary value
analysis can be used to add some test cases.
4. Mistaken method
Mistaken rule of thumb method is largely carried out, is made in the past with people's
analysis of the results of testing for defects in the regularity revealed for intuitive guesses
to discover the defect.
A dichotomy search using the program, typically a few test cases can be listed below:
Be retrieved only one table or empty table;
Table is exactly the number of items a power of 2;
Table of the number of items more than a power of 2 1 and so on.
Mistaken method full human
experience, in
a test group brainstorming, convenient and
practical, especially in poor foundation in software testing in the case, well organized test
group (you can also have external personnel) Error guessing, is effective test methods.
5 random method
The
test case
parameter is random number. It can automatically generate, so
the
high
degree
of automation. A large number of random test cases
using
test procedures will
improve
user
confidence
in
the
process.
But
the
key
is
whether
the
law
of
random
numbers use the actual.
Mobile black box covers Content:
1, the basic call
1.1 calls the action detection, such as Caller ID, number, name of the show ring mode
(usually by ringing, vibrating, ring + vibration, no, etc.)
1.1.1 The call rings on operation
1.1.2 Bell calls the end of operation
1.1.3 Function calls ring the process of effective key operations (except turn, end)
1.1.4 Invalid call rings key operation
1.2 phone calls
1.2.1 phone calls in the basic menu operations, in addition to on-hook (generally operate
SMS, such as editing, sending, etc., phone book editing, save).
1.2.2 call the function keys.
1.2.3 end the call.
1.3 Call function
1.3.1 Dial-up breath ..
1.3.2 the end of the call bell.
1.3.3 Call the invalid operation.
1.3.4 Calling call functions.
1.3.5 Calling the end of the call
1.4 Multi- party call (SIM must support the business)
1.4.1 Calling the conference call.
1.4.2 called multi-party call.
2 Call
2.1 flip response
2.2 Speed Dial
2.3 Automatic redial.
2.4 Any key answer
2.5 Call waiting
3, SMS
See specific test message /bbs/vie ... & extra = page% 3D1
4, MMS
4.1 MMS connection settings and test the basic settings
4.1.1
connection
settings,
such
as
homepage,
IP
,
Port,
connection
time,
connection
(GPRS & CSD), etc.
4.1.2 Basic settings such as priority, download mode (Auto, delay, reject), is set to receive
read reports of some
4.2 editing
4.2.1
normal
editing:
insert
all
the
support,
such
as
pictures,
sounds,
text,
numbers,
symbols, video, accessories
4.2.2 Bad Edit: If all does not support inserting pictures, sounds, text, numbers, symbols,
video, accessories, DRM objects (certainly could not get into), etc.
The memory is full when editing MMS, edit the maximum number of pages and
then try to insert a page, insert the object into a single MMS and then attempt to insert
objects such as full.
4.3 Send
4.3.1
normal
transmission,
a
single
recipient,
multiple
recipients,
TO
&
CC
&
BCC
recipient to the maximum, enter E-mail Address
4.3.2 Error sending: No network when sent, lost when the network sends
4.4 Receiver
4.4.1 normal reception,
4.4.2 memory full when receiving, reception, etc., when no network
4.5 Stress Test
4.5.1 for a long time, the number of viewing, sending, receiving MMS
5, WAP
5.1 Set up a WAP profile
5.1.1 Circuit Switched (CSD) parameters
5.1.2 GPRS parameters.
Log WAP 5.2
5.2.1 Circuit Switched (CSD) bearing
5.2.2 GPRS bearer.
5.3, the network state identification
5.4, a key to the Internet
5.5, GUI requirements
5.5.1-screen display area and can be
5.5.2 Navigation Menu
5.5.3 Rolling logo
5.5.4 Keyboard Mapping ...
5.6, menu browser interface
Hyperlinks 5.6.1 browser functionality
5.6.2 return to the previous page
5.7, in support of language
5.8, a graphical text support
5.9, content requirements
5.9.1 Background Music
5.9.2 supports various image formats
5.10, the default home page address ..
5.11, Bookmark function
5.12, enter the URL to log functions
5.13, the history function ..
5.14, language support
5.13.1 XHTML MP language
5.13.2 WML1.3 language ..
5.13.3 WAP CSS (WCSS) ...
5.13.4 CHTML, HTML3.2 and other languages
5.15, the basic parameter configuration
14.1 a proxy server (gateway) list ..
16, download service
15.1 Content Delivery ..
17, the wireless telephony application
16.1 voice call request processing ...
16.2 to inform the GUI so ..
18, cross-business call
17.1E-mail.
17.2 to receive a short message ...
17.3 incoming call ...
19, e-business ...
6, Phone Book
Find name 6-1
6-1-1 entry and exit
6-1-2 input Chinese characters to find
6-1-3 Enter the letters to find
Enter the numbers 6-1-4 to find
6-1-5 special characters find
6-1-6 mixed input lookup
6-1-7 is not enter characters, direct search
6-1-8 Enter the maximum character capacity to find
6-1-9 by digital examination to find
6-1-10 to operate on the number found
6-1-11 cross event
6-1-12 call the number found
6-1-13 call numbers phone book
6-1-14 English state
Increase the number 6-2
6-2-1 entry and exit
6-2-2 in Chinese, English, numbers and special symbols to store names
6-2-3 storage with +, P
, #, and * the number of
6-2-4 Input of entries
6-2-5 record stores do not enter a name
6-2-6 cross event