当前位置:网站首页>Risks in software testing phase
Risks in software testing phase
2022-07-25 11:49:00 【Youcan.】
8. Communicate and coordinate risks

Common risks of software testing , There are mainly the following points :
1. Demand risk
Yes The understanding of software requirements is not accurate , Lead to Test range There is an error , Some requirements are omitted perhaps The wrong test method was executed ;
in addition Requirements change Lead to Test case change , Error in synchronization .
2. Test case risk
test Use case design is incomplete , Ignoring the boundary conditions 、 Exception handling, etc , Use cases do not completely cover requirements ;
test Use cases are not fully implemented , Some use cases are intentionally or unintentionally missing .
3. Defect risk
some Defects happen occasionally , Difficult to reproduce , Easy to Missing .
4. Code quality risk
Software Poor code quality , Lead to More defects , Prone to testing missing .
5. Test environment risk
In some cases , Test environment And The production environment cannot be completely consistent , Result in test results error .
6. Testing technology risks
Some projects exist Technical difficulties , test Ability and level Lead to test Progress is slow , project delay .
7. Regression test risk
regression testing commonly Do not run all test cases , Possible The test is not complete .
8. Communicate and coordinate risks
Designed during the test There are many roles , There is Different people 、 Communication between roles 、 Collaboration , Unavoidable misunderstand 、 Poor communication The situation of , Lead to Project extension .
9. Other unpredictable risks
Some emergencies , Irresistible factors Etc. also constitute risk factors , And difficult to predict and avoid .

边栏推荐
- Miidock Brief
- [MySQL learning 09]
- 教你如何通过MCU配置S2E为TCP Server的工作模式
- Layout management ==pyqt5
- Chapter 4 linear equations
- W5500 multi node connection
- 2022 年中回顾|一文看懂预训练模型最新进展
- Onenet platform control w5500 development board LED light
- Leetcode sword finger offer 28. symmetric binary tree
- Detailed explanation of zero basis from macro to micro Bert
猜你喜欢

How does the whole network display IP ownership?

阿里云技术专家秦隆:可靠性保障必备——云上如何进行混沌工程

模型部署简述

JVM性能调优方法

W5500上传温湿度到oneNET平台

Learn NLP with Transformer (Chapter 1)

Job interviews are always a second kill? After reading the seckill system notes secretly stored by JD T8, I have given my knees

JS data types and mutual conversion

The principle analysis of filter to solve the request parameter garbled code

Reptile foundation I
随机推荐
【MySQL 17】安装异常:Could not open file ‘/var/log/mysql/mysqld.log‘ for error logging: Permission denied
JS数据类型以及相互转换
常见WEB攻击与防御
布局管理==PYQT5
leetcode 剑指 Offer 28. 对称的二叉树
如何解决“W5500芯片在TCP_Client模式下,断电重启之后无法立即连接到服务器”的问题
ArcMap cannot start the solution
Dataframe print ellipsis problem
论文解读(MaskGAE)《MaskGAE: Masked Graph Modeling Meets Graph Autoencoders》
Definition of information entropy
Greedy problem 01_ Activity arrangement problem
贪心问题01_活动安排问题
工作面试总遇秒杀?看了京东T8大咖私藏的秒杀系统笔记,已献出膝盖
SQL injection less17 (error injection + subquery)
JVM performance tuning methods
SQL注入 Less23(过滤注释符)
Txt to CSV file, blank lines appear every other line
Detailed explanation of zero basis from macro to micro Bert
油猴脚本链接
ESP8266 使用 DRV8833驱动板驱动N20电机