当前位置:网站首页>General test point ideas are summarized and shared, which can be directly used in interview and actual software testing
General test point ideas are summarized and shared, which can be directly used in interview and actual software testing
2022-06-25 06:16:00 【Pit player】
Test point ideas
Two blocks :
1. Its own business functions .( You can test any function you have , Such as WMS Whether the warehousing task can be issued according to the warehousing order )
2. The test method : Six categories
- function : Seven ways to black box :
Equivalent class boundary value ( It's everywhere , We have to come up with a , Where there are limits , Can be equivalent to class boundary value )( For example, can we choose the one with larger stock quantity for delivery , Can we just choose the maximum inventory )
Decision table 、 Cause and effect diagram 、 Combine : In the case of multiple fields , For example, inventory has a name 、 Color 、 size 、 weight , You can add a field, such as type Field , Or change the color to color , See if the system recognizes .
Scene method ( Process approach )
Many fields , Multiple fields will have query function : There's a search function , You can use combination testing , Can you just look up by color , Can I find it based on two fields , Can I find... Based on multiple fields ( Combine multiple fields , Decision table )
- Ease of use :
Hommization , Whether it is in line with aesthetics , If it is shown in detail , Are there any details , Can I go to the next page 、 Back to previous page , Whether the search field can be reset after error , Whether the layout of the page is the same , Whether the layout of the field is beautiful .(2、3 individual ). Is the layout reasonable . Check if it's on the right , Reset if it's on the left ( It's customary )
- Compatibility :
Platform compatibility :
app Compatibility with multiple systems , Android ( Huawei 、vivo、oppo wait )、 Apple 、
win10、win7、win8
Browser compatibility :
IE、Chrome、Firefox、safari、opera
- performance
Concurrent : How many processing times per second , What happens when you exceed concurrency
Security ( If you don't want to say it, just give it to the security team for testing , As far as I know , They used fortify/webinspect These two vulnerability scanning tools are used for security testing )
Four common web Loophole
1,sql Inject : Such as :select * from t_12306_user where id=‘31’ or 0=0; // hinder 0=0 Ahead of where Statement offsets
2,xss Cross site scripting attacks : Enter the script directly in the text box , For example, where to enter the user name, enter ( Baidu JS Attack script or html Attack scripts and so on, you can find similar scripts )
3, Cross Directory Access : Change directly url Address , If you can directly access the interface of advanced users or administrators , There's a problem .
4, User rights access control : For example, add permission function in Zen background ( Check box ), Almost every backstage , As long as there are different roles ( Administrators 、 Ordinary users 、vip), There is a difference in user rights . Testing requires different permissions for users , Log in to this user again , See if these permissions are configured , Is there more or less .
There are also some encryption algorithms
1, Asymmetric encryption RSA( Developed by three people in Sweden , Asymmetric encryption algorithm ): Two keys ( Two key), A public key, a private key , Only the public key can encrypt , The private key can only be used to decrypt . Public key can circulate on the network , Decryption can only be performed by this private key , So the general private key is stored in the decryption . Even if you hijack the public key , It can't be decrypted .
The test is to see if the encryption is successful 、 Whether it can decrypt normally
2, Symmetric encryption DES、MD5( Irreversible information summarization algorithm ,32 Bit string ):DES, symmetry , Use the same key( The same key ) Encrypt and decrypt a ciphertext ( Key text )
The test is to see if the encryption is successful 、 Whether it can decrypt normally ( except md5 The disclosure of the ,md5 Can't decrypt )
When the password is stored in the interface or database table , Be sure to show it in ciphertext , Whether sensitive fields are displayed in ciphertext on the page or in the background .
3. User's objective operation ( important ):
The user repeatedly submits ( If you click many times quickly, you will get more money .)、 What if there are spaces in the input 、 Click submit or login directly ( Default value test ).
Especially when it comes to hardware , The hardware is not working properly Whether the entity product status data can be fed back to the software in time
4. Three anomalies :
- The Internet :
Broken net ( Router settings mac Address filtering or turning off routers 、 Network card service can be disabled 、 Network blocker ( Like the radiation shield 、 Radiation shielding clothing 、 Elevator )、 The network card is in arrears 、 Speed limit after using network card traffic )、 Weak net (4G turn 3G,3G turn 2G,2G turn e The signal 、 The router sets current limiting 、 Driving 、 In the high-speed train )
- DB:
DDL: rename table ( There needs to be an exception handling mechanism )、 Synchronous or asynchronous request mode . Sync : The client is waiting for the server to return data , For example, there is no exception handling mechanism , When an exception occurs, the client has to load all the time , Will not respond to error messages . Syncing is like making a phone call . asynchronous : No need to wait for the server to confirm , It's like mass texting , After sending the message, it's over , Don't wait for .
DML: perform update or delete operation , Change the record of the table , So that the content of the query does not exist
Stop database , stop it mysqld
Not to users update jurisdiction ( Can only select), Or not to users select jurisdiction .grant.
Modify any connection information , Whether you can query the database information normally . For example, modify the database url( Address )、 port 、 Library name 、 user name 、 password ( On the server jdbc It's in the file )
- Server:
tomcat application server ,1. user name 、 password 、 port 、 Address (url) If not, can I access it normally ;2. You can stop the server ( It's easy to cause a timeout exception
Here's a message for you , Mutual encouragement : When our abilities are insufficient , The first thing to do is internal practice ! When we are strong enough , You can look outside !
Finally, we also prepared a supporting learning resource for you , You can scan the QR code below via wechat , Free access 216 Page software testing engineer interview guide document information . And the corresponding video learning tutorial is free to share !, The information includes basic knowledge 、Linux necessary 、Shell、 The principles of the Internet 、Mysql database 、 Special topic of bag capturing tools 、 Interface testing tool 、 Test advanced -Python Programming 、Web automated testing 、APP automated testing 、 Interface automation testing 、 Testing advanced continuous integration 、 Test architecture development test framework 、 Performance testing 、 Safety test, etc. .
Welcome to the official account 【 Programmer Yifan 】, reply : Information ( Video tutorial ,PDF file , Interview questions )
边栏推荐
- What are the reasons why most webmasters choose Hong Kong site group servers?
- ctfshow-misc
- [Suanli network] technological innovation of Suanli Network -- Key Technologies of green and security
- Lesson 9: workspace introduction
- Global and Chinese gallium nitride (GAN) market output value scale forecast and application prospect analysis report 2022
- Uni app wechat applet customer service chat function
- SAP Fiori tools and corresponding cli (command line interface)
- SAP ui5 beginner tutorial No. 27 - unit test tool quNit introduction trial version for SAP ui5 application
- Folding mobile phones are expected to explode, or help Samsung compete with apple and Chinese mobile phones
- John
猜你喜欢
Introduction to the main features of kyma when the cloud native application runs
MySQL tuning -- 02 -- slow query log
Three tier architecture experiment
3-7sql injection website instance step 3: attack type and attack strategy
RT thread i/o device model and layering
Introduction to sap ui5 tools
Distributed solar photovoltaic inverter monitoring
Laravel8 fill data
SAP ui5 date type sap ui. model. type. Analysis of date parsing format
Trial version of routing history and routing back and history of SAP ui5
随机推荐
What are the reasons why most webmasters choose Hong Kong site group servers?
Highway
[golang] leetcode intermediate - Search rotation sort array & search two-dimensional matrix II
Go uses channel to control concurrency
SAP ui5 beginner tutorial No. 28 - Introduction to the integration test tool OPA for SAP ui5 applications
MySQL uses the where condition to find strange results: solve
No one reads the series. Source code analysis of copyonwritearraylist
Part 33 of SAP ui5 application development tutorial - trial version of responsiveness of SAP ui5 applications
Go quiz: considerations for function naming return value from the go interview question (more than 80% of people answered wrong)
PHP and WMI – explore windows with PHP
The e-book "action guide for large organizations to further promote zero code application platform" was officially released!
Tutorial 35 of SAP ui5 application development - how to deploy locally developed SAP ui5 applications to ABAP server for trial reading
IQ debugging of Hisilicon platform ISP and image (1)
Global and China financial guarantee marketing strategy and channel dynamic construction report 2022
Handling skills of SQL optimization (2)
Do you know what a three-tier architecture is?
Research Report on global and Chinese vaccine market profit forecast and the 14th five year plan development strategy 2022-2028
What is hybrid web containers for SAP ui5
Click to send text messages without response is a common problem for many users in building the elegant grass Dragonfly Q system - solve the problem of clicking to send text messages without response
Mongodb basic concept learning - Documentation