6.2 TEST ENVIRONMENT The web application is tested at Google Chrome browser with the required hardware and software requirements and Dell/Sony Laptop is used as well as in mobile devices. 6.3 TESTING IDENTIFICATION A specific test should be planned for every test level to test all application components. The test procedure should be detailed so that the system meets all user requirements. The system can be divided into following modules: ➢ Database SQL Server ➢ User login ➢ Filling the form ➢ User selection of universities ➢ Search ➢ Display of required result 6.4 TEST PROCEDURE A testing strategy is decided for testing the application so that all modules are tested to fulfill all user requirements. A test strategy is methodology that describes the various steps that need to be performed during testing and the time and effort required for performing them. The following strategies are used for project.
77 6.4.1 UNIT TESTING Unit testing is a white-box testing technique. The main consideration in this test is verification of all modules of the web application. Each module is unit tested, as follows: Unit testing the module to Test User Management module: This module is provided its required input. The numbers of selection used are working accurately or not and output is recorded. The unit test results are recorded in reports. 6.4.2 INTEGRATION TESTING Integration testing is the technique for testing the interfaces of application components. Each application components are unit tested, and all the components are integrated to perform together. The tests are conducted to ensure that the components are working properly after interfacing. All modules are integrated by an incremental approach, and integration testing of the application is performed as follows ➢ Integrate login module and test: ➢ Integrate login module with home page first through database. When user successfully login then application GUI (dashboard) is open for user. ➢ Integrate all modules and test. ➢ All other modules are integrated through Database through home user go to other modules with full access of web application. 6.4.3 APPLICATION TESTING When all the units are working properly and unit testing is performed then time for system testing where we checked all the integrated components as a whole and looked for possible inconsistencies which could have arisen after the integration. 6.4.4 RECOVERY TESTING The Exception handling is done so that system will guide user in case of any misuse instead of crashing. So, our application is fault tolerant to possible extent.
78 6.4.5 SECURITY TESTING Security testing is protection testing that test security methods in the application to avoid invalid intrusions. The application stores secret private and sensitive information that is susceptible to invalid intrusions. An intrusion to obtain secret information may cause severe economic damage to the organization. Several security checks for allowing only
- Fall '16
- Dr. Yaser
- Computer Science, Requirements analysis