In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-16 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >
Share
Shulou(Shulou.com)06/03 Report--
Solemnly declare: this article comes from the leading test network, not my original.
Summary of functional test points based on actual testing
1. Page link check: each link has a corresponding page, and the switch between pages is correct. Some tools are available, such as LinkBotPro, File-AIDCS, HTML Link Validater, Xenu, and so on. LinkBotPro does not support Chinese, Chinese characters are displayed as garbled; HTML Link Validater can only test links to web pages ending in Html or htm; Xenu does not need to be installed and supports web pages ending with asp, do, jsp, etc. Xenu test links include internal and external links, which should be noted when used and can generate test reports in html format at the same time. If the system uses QTP for automated testing, you can also use QTP's page checkpoint to check the link.
two。 Correlation check:
Functional relevance: whether deleting / adding an item will have an impact on other items, and if so, whether these effects are correct? it is common that after adding a data record, if the content of a field in the data record is long, it may distort the data list when querying.
Data correlation: the following list defaults check, the next list value check, if the data item of a list depends on the data in other modules, it also needs to be checked, for example, if some data is disabled, it may not be visible in the list that references the data item.
3. Check whether the function of the button is correct: such as new, edit, delete, close, return, save, import, previous page, next page, page jump, reset and so on. A common error occurs on the reset button, showing a failure of function.
4. String length check: enter something that exceeds the string length specified by the requirement to see if the system checks the string length. Also check whether the string length specified by the requirement is correct, and sometimes it occurs that the string length specified by the requirement is too short to enter business data.
5. Character type check: enter other types of content where the specified type should be entered (for example, enter other character types where the integer should be entered) to see if the system checks for character types.
6. Punctuation check: the input includes a variety of punctuation marks, especially spaces, various quotation marks, and enter keys. See if the system handles it correctly. A common error is the system's handling of spaces, which may be added as a character, while the spaces are blocked during the query, resulting in the inability to query the added content.
7. Special character check: enter special symbols, such as @, #, $,%,! Wait, see if the system handles it correctly. Common errors appear in the special characters of%'\.
8. Chinese character processing: enter Chinese in a system that can enter Chinese and English to see if there are any garbled codes or errors.
9. Check the integrity of the information: when viewing and updating the information, check to see if all the information filled in is updated and whether the updated information is consistent with the added information. Note that when checking, each field should be checked. Sometimes, some fields are updated and individual fields are not updated.
10. Duplicate information: in some information that needs to be named and the name should be unique, enter a duplicate name or ID to see if it has been processed by the system, whether it will report an error, whether the duplicate name is case-sensitive, and whether the system handles it correctly by entering spaces before and after the input.
11. Check deletion function: in some places where multiple messages can be deleted at a time, do not select any information, press "delete" to see how the system handles it and whether it will make mistakes; then select one or more messages to delete to see if they are handled correctly. If there are multiple pages, turn the page and select to see if the system is deleted correctly, and pay attention to whether there is a prompt when deleting, so that the user can correct the error and delete it without mistake.
twelve。 Check whether additions and modifications are consistent: check that the requirements for adding and modifying information are consistent, for example, adding items that are required, modifications should also be required; for items specified as integers, modifications must also be integers.
13. Check to modify the duplicate name: change the item that cannot be renamed to the existing content to see if it will be dealt with and report an error. At the same time, we should also pay attention to whether you will report the mistake of repeating your name.
14. Repeat submission form: a record that has been successfully submitted, return and then submit to see if the system has processed it. For Web systems, you can use the browser return key or the return function provided by the system.
15. Check for multiple use of the return key: where there is a return key, return to the original page and repeat it many times to see if there will be an error.
16. Search check: where there is a search function, enter the content that the system exists and does not exist to see if the search results are correct. If you can enter multiple search conditions, you can add reasonable and unreasonable conditions at the same time to see whether the system handles it correctly. You should also pay attention to special characters when searching. Some systems will search all the information in the system when entering special characters.
17. Input information location: pay attention to whether the cursor and the entered information will jump to another place when you enter information where the cursor stops.
18. Upload and download files check: whether the function of uploading and downloading files is realized, and whether the uploaded files can be opened. What are the regulations on the format of uploaded files, whether the system has explanatory information, and check whether the system can do so. Whether the downloaded file can be opened or saved, whether the downloaded file has format requirements, such as the need for special tools to open, and so on. The file upload test should also be tested, if the suffix name of the file that cannot be uploaded is changed to the suffix name of the file that can be uploaded, to see if the file can be uploaded successfully, and after uploading the file, modify it again to see if the uploaded file exists.
19. Required check: whether the system has processed all the required items when they are not filled in, and whether there is a prompt for the required items, such as adding "*" before the required items; whether the focus will be automatically located to the required items after the prompt for the required items is returned.
20. Shortcut key check: whether commonly used shortcut keys are supported, such as Ctrl+C, Ctrl+V, Backspace, etc., and whether there are restrictions on shortcuts for some fields that are not allowed to enter information, such as selecting people, and choosing dates.
21. Enter key check: press enter key directly at the end of input to see how the system handles it and whether it will report an error. There is a good chance that something will go wrong in this place.
twenty-two。 Refresh key check: in the Web system, use the browser's refresh button to see how the system handles it and whether it will report an error.
23. Back key check: in the Web system, use the browser's back key to see how the system handles it and whether it will report an error. For systems that require user authentication, after logging out, use the fallback key to see how the system handles; use the fallback key many times, use the forward key many times, and see how the system handles it.
24. Direct URL link check: in the Web system, enter the URL address of each functional page directly to see how the system handles it, which is more important for the system that needs user verification. If the system security design is not good, directly enter the URL address of each functional page, it is likely to open the page normally.
25. Space check: in the input information item, enter one or a series of spaces to see how the system handles it. For example, for items that require the input of integer and symbol variables, the input space is neither null nor standard input.
twenty-six。 Input method half-width full-width check: in the input information item, enter half-width or full-width information to see how the system handles it. For items that require symbolic point data, enter the full-width decimal point ("." Or ".", such as 4.5); enter a full-width space, etc.
twenty-seven。 Password check: the encryption method of some systems adopts the way of shifting the character Ascii code, which is relatively simple to deal with password encryption and has high security. for the local area network system, this method can completely play the role of encryption, but at the same time, it will cause some problems, that is, the characters corresponding to Ascii larger than 128cannot be parsed during decryption, try to use some characters with larger code values such as "uvwxyz" as passwords, and at the same time Passwords are as long as possible, such as 17-bit passwords, resulting in unparsable characters in encrypted passwords.
twenty-eight。 User check: any system, there are all kinds of different users, also have one or more administrator users, check whether each administrator can manage each other, edit and delete administrator users. At the same time, for the general user, try to delete and reconstruct the user with the same name, and check whether other information of the user reappears. Similarly, the system that provides the logout function, whether this user registers again as a new user. But also check the user's effective date, after the effective date of the user can not log in to the system. An error-prone situation is that a non-Super Admin with user administrative privileges may be able to modify the permissions of the Super Admin.
twenty-nine。 System data check: this is the most important part of the functional test. If the system data is calculated incorrectly, then the functional test must not pass. Data checking varies according to different systems. For the business management platform, the data can be kept correct with the changes of the business process and state, and the data can not be lost because of a certain process.
thirty。 System recoverability check: paralyze the system in various ways to test whether the system can recover normally and quickly.
thirty-one。 Confirmation prompt check: whether the update or delete operation in the system prompts the user to confirm the update or deletion, whether the operation can be reversed (that is, whether you can choose to cancel the operation), and whether the prompt information is accurate. Advance or ex post hint. For Update or Delete operations, a prior hint is required.
thirty-two。 Data injection check: data injection is mainly the injection of the database, by inputting some special characters, such as "'", "/", "-" or character combination, to complete the destruction of the SQL statement, causing the SQL of the system query, insert and delete operations to change the original intention because of these characters. For example, select * from table where id=''and name=' 'will cause the query statement to comment out the name condition and only query the records of the id=12 by typing "12comment -" in the id input box. Similarly, the operation of update and delete may result in erroneous deletion of data. Of course, there are other SQL injection methods, specifically refer to "SQL Application Advanced SQL injection .doc", many programs are based on the page to control the input characters, you can try to skip the interface to insert data directly into the database, such as using Jmeter, to complete the data injection check.
thirty-three。 Refresh check: the real-time refresh function of WebForm controls in the web system has both advantages and disadvantages in the system application, which has a great impact on the performance of the system. During the test, detect the impact of the refresh function on the system or application (white screen), check whether the control returns to the default initial value, and check whether it has a great impact on the performance of the system (such as connecting to the database query every refresh, etc.).
thirty-four。 Transaction check: for transactional operations, disconnect the network or close the program to interrupt the operation, and whether the transaction is rolled back.
thirty-five。 Time and date check: time and date verification is required for every system, such as 2006-2-29, 2006-6-31 and other wrong dates. At the same time, for management and financial systems, January of each year is the same as December of the previous year (similarly, the first quarter of each year and the fourth quarter of the previous year). In addition, the verification of date and time format, such as February 28,2006, 2006-2-28, 20060228 and so on. Date check also checks whether the date range is in line with the actual business, and whether there are prompts or restrictions on dates that do not meet the time business.
thirty-six。 Multi-browser verification: with the emergence of more and more kinds of browsers, users no longer rely on Microsoft Internet Explorer alone to access Web programs, but have more choices: Maxthon, Firefox, Tencent Traveler, etc., consider using multiple browsers to access the system to verify the effect.
thirty-seven。 Installation testing: installer testing is an important aspect of Cramp S architecture systems, such as installer automation, installation options and settings (verify that all options can be installed properly), installation interruption testing, installation sequence testing (distributed systems), repair installation and uninstall testing.
thirty-eight。 Document testing: mainly to test the user manual and product manual to verify whether the description is correct and complete, whether it is compared with the current system version, whether it is easy to understand, whether ambiguity and so on.
thirty-nine。 Test data check: the facts tell us that the test data is more likely to be wrong than the code, so when the test results show that there is an error, check the test data before you suspect the code error.
forty。 Please let my machine run: in some projects, there is a morbid problem: there is nothing wrong with the system, it can pass on my machine. This shows that there is an environment-related BUG. "is everything managed by version control tools?", "is the local development environment the same as the server environment?", "is there a real BUG that just happens on other machines?" All tests must be run on all machines required by the system, otherwise there may be problems with the code.
The application of 41.Ajax technology: Ajax has many advantages, but it also has many disadvantages. If we take advantage of the advantages and avoid the disadvantages, it is a challenge for us to the new Web2.0 application. The most direct problem in the application of Ajax is user experience, and the effect of user experience is directly related to whether or not to use Ajax technology. "if you can do it, it doesn't mean you should or must do it." this is a very important note to Ajax technology.
The application of 42.Ajax technology: Ajax uses the mechanism of asynchronous call to realize the partial refresh function of the page, and the asynchronous call has the possibility of abnormal interruption. Try various methods to interrupt the asynchronous data call abnormally to see if there is a problem. One of the problems encountered here is the operation of the date control, which has been refreshed if the page has more data.
forty-three。 Script error: with the development of asynchronous invocation technology such as Ajax and IFrame, developers pay more and more attention to Java crankpt technology, but Java crankpt has some problems such as debugging difficulties and incompatibility among browsers, so script errors may occur in Web system. At the same time, the consequences of script errors can be big or small and cannot be ignored.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.