当前位置:网站首页>Boundary value analysis method for learning basic content of software testing (2)
Boundary value analysis method for learning basic content of software testing (2)
2022-06-28 09:01:00 【A pig without a bit of luck】
Design test points for boundary rules
* Boundary value analysis
explain :1、 Boundary range node 2、 Apply design steps 3、 Case study 4、 Applicable scenario
- Boundary range node : Selection is exactly equal to ( Upper point ), Just bigger than , Just less than ( Departure point ) The value of the boundary as the test data .( Inside point : Generally, the middle point is taken , Points in range )
- Apply design steps : Clear requirements Determine valid and invalid equivalence classes
Determine the boundary range value Extract data and write test cases
- Case study 1 demand : Title length is greater than 0, Less than or equal to 30 Characters

Table two sheet1
Case study 2 demand :QQ Account No 6-10 Bit natural number

Optimize :7 The first optimization is 5 individual
Upper point : Mandatory ( Section opening and closing are not considered )
Inside point : Mandatory ( It is recommended to choose the middle )
Departure point : Open the inside and close the outside
Use scenarios : Common words describe : size , Size , weight , Maximum , Minimum , At most equal
Typical representative : Input box class test with boundary range
边栏推荐
- SQL injection file read / write
- High rise building fire prevention
- Is it safe for Huatai Securities to open an account online? What is the handling process
- 批量修改表和表中字段排序规则
- Deployment of MySQL database in Linux Environment
- 学习阿里如何进行数据指标体系的治理
- containerd1.5.5的安装
- "Jianzhi offer" -- Interview Question 4: finding two-dimensional arrays
- temple
- 状态机程序框架
猜你喜欢

Characteristics and prevention of electrical fire

Data modeling based on wide table

学习阿里如何进行数据指标体系的治理

Postman interface test

Apiccloud, together with 360 Tianyu, helps enterprises keep the "first pass" of APP security

隐私计算FATE-----离线预测

Application of energy management system in iron and steel enterprises

rman备份报ORA-19809 ORA-19804

TCP

如何抑制SiC MOSFET Crosstalk(串扰)?
随机推荐
Which securities company is better and safer to choose when opening an account for the inter-bank certificate of deposit fund with mobile phone
网上炒股开户安不安全?
中金财富开户安全吗?怎么收费?
Superimposed ladder diagram and line diagram and merged line diagram and needle diagram
[go ~ 0 to 1] the third day June 27 slice, map and function
Installation of containerd1.5.5
A - deep sea exploration
Apache Doris 成为 Apache 顶级项目
【.NET6】gRPC服务端和客户端开发案例,以及minimal API服务、gRPC服务和传统webapi服务的访问效率大对决
Apache Doris becomes the top project of Apache
批量修改表和表中字段排序规则
DEJA_ Vu3d - 051 of cesium function set - perfect realization of terrain excavation
Fire fighting work and measures in Higher Vocational Colleges
SQL 优化经历:从 30248秒到 0.001秒的经历
Fire safety hazards
Discussion on the improvement and application of the prepayment system in the management of electricity charge and price
Why does select * lead to low query efficiency?
Implementation of single sign on
Zhejiang energy online monitoring and management system
SQL注入之文件读写