62 TEST ENVIRONMENT The web application is tested at Google Chrome browser with

62 test environment the web application is tested at

This preview shows page 76 - 79 out of 94 pages.

6.2 TEST ENVIRONMENT The web application is tested at Google Chrome browser with the required hardware and software requirements and Dell/Sony Laptop is used as well as in mobile devices. 6.3 TESTING IDENTIFICATION A specific test should be planned for every test level to test all application components. The test procedure should be detailed so that the system meets all user requirements. The system can be divided into following modules: Database SQL Server User login Filling the form User selection of universities Search Display of required result 6.4 TEST PROCEDURE A testing strategy is decided for testing the application so that all modules are tested to fulfill all user requirements. A test strategy is methodology that describes the various steps that need to be performed during testing and the time and effort required for performing them. The following strategies are used for project.
Image of page 76
77 6.4.1 UNIT TESTING Unit testing is a white-box testing technique. The main consideration in this test is verification of all modules of the web application. Each module is unit tested, as follows: Unit testing the module to Test User Management module: This module is provided its required input. The numbers of selection used are working accurately or not and output is recorded. The unit test results are recorded in reports. 6.4.2 INTEGRATION TESTING Integration testing is the technique for testing the interfaces of application components. Each application components are unit tested, and all the components are integrated to perform together. The tests are conducted to ensure that the components are working properly after interfacing. All modules are integrated by an incremental approach, and integration testing of the application is performed as follows Integrate login module and test: Integrate login module with home page first through database. When user successfully login then application GUI (dashboard) is open for user. Integrate all modules and test. All other modules are integrated through Database through home user go to other modules with full access of web application. 6.4.3 APPLICATION TESTING When all the units are working properly and unit testing is performed then time for system testing where we checked all the integrated components as a whole and looked for possible inconsistencies which could have arisen after the integration. 6.4.4 RECOVERY TESTING The Exception handling is done so that system will guide user in case of any misuse instead of crashing. So, our application is fault tolerant to possible extent.
Image of page 77
78 6.4.5 SECURITY TESTING Security testing is protection testing that test security methods in the application to avoid invalid intrusions. The application stores secret private and sensitive information that is susceptible to invalid intrusions. An intrusion to obtain secret information may cause severe economic damage to the organization. Several security checks for allowing only
Image of page 78
Image of page 79

You've reached the end of your free preview.

Want to read all 94 pages?

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

Stuck? We have tutors online 24/7 who can help you get unstuck.
A+ icon
Ask Expert Tutors You can ask You can ask You can ask (will expire )
Answers in as fast as 15 minutes