Premium Essay

Db Testing

In:

Submitted By hareen
Words 5030
Pages 21
8/26/2004

Beyond the GUI: What You Need to Know about Database Testing
Presented by: Mary R.Sweeney Exceed Technical Training & Consultation
Copyright Sammamish Software Services 2003. All rights reserved.

1

Today’s complex software systems access heterogeneous data from a variety of backend databases. The intricate mix of client-server and Web-enabled database applications are extremely difficult to test productively. Testing at the data access layer is the point at which your application communicates with the database. Tests at this level are vital to improve not only your overall test strategy, but also your product’s quality. In this presentation you’ll find out what you need to know to test the SQL database engine, stored procedures, and data views. Find out how to design effective automated tests that exercise the complete database layer of your applications. You’ll learn about the most common and vexing defects related to SQL databases and the best tools available to support your testing efforts.

Copyright Sammamish Software Services 2003. All rights Reserved

1

8/26/2004

The Data Access Layer
Testing at the data access layer is the point at which your application communicates with the database. ! In this presentation we’ll discuss why tests at this level are vital to improve not only your overall test strategy, but also your product’s quality
!

Copyright Sammamish Software Services 2003. All rights reserved.

2

How to design effective automated tests that exercise the complete database layer of your applications. Donation Street demo The most common and vexing defects related to SQL database The best tools available to support your testing efforts. A strong foundation in Structured Query Language is becoming increasingly necessary and even required by some companies in today’s data environments. Many test professionals are

Similar Documents

Premium Essay

Winsnort and Apache Installation Instructions

...setup c drive, 8000, set d drive for rest in windows setup Mandatory prerequisites Only use the support programs included our 'AIO Software Pak'! Fresh install of Windows 2000/XP/2003 All Service Packs and Patches applied Hard Drive Partition 'C:/' (System) - Min 5 Gigabytes Hard Drive Partition 'D:/' (System) - Min 60 Gigabytes Make SURE the sensor has a Static TCP/IP settings and can get to the Internet Deactivate any Firewall application on the Windows Intrusion Detection System (WinIDS)! The new WinIDS sensor MUST be allowed to see ALL the network traffic. We would strongly suggest that the Microsoft Baseline Security Analyzer (MBSA) is used to identify and correct common security miss configurations and resolve each issue prior to starting this install. Pre-installation Tasks -Make SURE that 'Internet Information Services' has been removed prior to starting this guide. If your unsure, go into the add/remove programs, select 'add/remove windows components', make SURE the 'Internet Information Services' radio box is unselected, if selected, unselect 'Internet Information Services', and remove the application, and all associated components. -Edit hosts file 127.0.0.1 winids Download the 'WinIDS - All In One Software Pak' and extract the contents into the d:\temp folder. Installing the Basic Windows Intrusion Detection System (WinIDS) Install WinPcap Navigate to the d:\temp folder, double left-click on the 'WinPcap...' file, left-click...

Words: 4494 - Pages: 18

Free Essay

Hotel System

...Software project management Phase 2 Bottom-up Estimation Work Breakdown Structure Deliverable | Tasks | Cost | Source Code | Develop Client’s functions | 8 days | | Develop manager’s functions | 7 days | | Produce Unit Testing modules | 7 days | Unit Testing | Produce Load Testing modules | 7 days | Load Testing | Analyze the performance of the Hotel reservation system | 3 days | Analyze Performance | Document Effort | 1 day | Component Design | Document User Manual | 7 days | User Manual | Document Usefulness of Methodologies | 2 days | Project Evaluation | Document of Estimates | 1 days | | Document | 1 days | Cost Estimate: 1- Function point methods Albrecht: Complexity of Components | Type of components | Low | Average | High | Total | EI: external input: “Input code” | X 3= | 10X4=40 | X6= | 40 | EO: external output: “Reports“ | X4= | 8X5= 40 | X7= | 40 | EQ: external inquiry: “DB Query” | X7= | X10= | 9X15= 135 | 135 | ILF: Internal logical file: “DB files” | 4X5= 20 | X7= | X10= | 20 | EIF: external interface file: “UI” | 2X3=6 | X4= | X6= | 6 | | System size | 241 | There are 10 input type, 8 output,4 internal logical file, 9 external inquiry, and 2 external interface. Both the internal file and interface is low , the output is average and also intput is average. •N.B: 60 lines of Java code are needed on average to implement an FP FP= 241, SLOC = 60 FP x SLOC= 241x 60 =14460 Function point methods...

Words: 393 - Pages: 2

Premium Essay

Analytics

...Analytics Concepts and Definitions Types of Analytics Descriptive Analytics: * Post Event Analytics * Add features to website and measure its effectiveness in form of clicks, link sharing, page views * Descriptive Analytics Tools -> Google Analytics, Optimizely Diagnostic Analytics: * Post Event Analytics * Analytics used to diagnose why something/phenomenon happened the way it did * It basically provides a very good understanding of a limited piece of the problem you want to solve. * Usually less than 10% of companies surveyed do this on occasion and less than 5% do so consistently. Predictive Analytics: * Used for Prediction of Phenomenon using past and current data statistics * Essentially, you can predict what will happen if you keep things as they are. * However, less than 1% of companies surveyed have tried this yet. The ones who have, found incredible results that have already made a big difference in their business. * Eg:- SAS, RapidMiner, Statistica Prescriptive Analytics:  * Prescriptive analytics automatically synthesizes big data, multiple disciplines of mathematical sciences and computational sciences, and business rules, to make predictions and then suggests decision options to take advantage of the predictions. * It is considered final phase of Analytics Some Analytics Techniques used Linear Regression In statistics, linear regression is an approach for modeling the relationship between a scalar...

Words: 1288 - Pages: 6

Premium Essay

Comparision of Tools

...MANAGEMENT ASSIGNMENT III SOFTWARE TESTING TOOL COMPARISION QTP, SELENIUM AND TESTINGWHIZ BY, S.Shahida Banu. 120071601087. COMPARING QTP, SELENIUM AND TESTINGWHIZ INTRODUCTION: When it comes to test automation tools for web application testing it is hard to choose between the available options in the market and the right alternative that offers best of the latest technologies from the market place at the right budget. Open source tools provide the benefit of low initial investment but, they’re not always the best alternative in the long run due to lack of official support & training. Commercial tools on the other hand are highly expensive to implement resulting in higher cost of failure should the right tool not be selected.  Automation is a continuous process and it’s very important to have the basics right:- * Setting up the test environment  * Screening the available tool options  * Creating a Proof of Concept with a few sample test scenarios for the application  * Preparing (automation) frameworks  * Building libraries of functions & methods  * Defining configuration parameters To help test managers and automation engineers choose the right alternative, we have prepared a comparison matrix between the three closest contenders that are highly rated by Test Managers and Automation Engineers alike. Here is a comparison between HP QTP with Selenium and TestingWhiz. QTP vs SELENIUM vs TESTINGWHIZ: Testing automation tools enable developers...

Words: 1194 - Pages: 5

Premium Essay

Animal Testing

...Humans have used animals for different uses. They have been used for food, clothing farm work and a variety of other uses. So using them to test new medical advances is different. Animal testing for medical purpose help saves lives and future generations. Animal testing should be continued for the use within the medical field. The ancient Greeks believed that animals were created by the gods to be used however people wish. The Bible says God gave man dominions “over the fish of the sea, over the birds of the air, and over the cattle, over all the earth and over every creeping things that creeps on the earth” (Genesis 9:1-3). The ancient Greeks and Romans influenced the laws of western civilization. The western civilization had no laws saying what you could not do to an animal no matter how cruel or unnecessary the act was (Thorburn). To some people animals have no rights at all while to others animals have rights and should not fell unnecessary pain and suffering. The people who believe animals have no rights; and use them just for their benefits but there is a line that should not be crossed animals do have feelings and some rights. The new movement of animal right groups has some good points like human like primates should not be used in testing like chimpanzees. The first law put in place by western civilizations was in the Massachusetts Bay colony. The law states that it is illegal to exercise any tyranny or cruelty towards any animal which are kept for use by humans...

Words: 1491 - Pages: 6

Premium Essay

Waterfall

...READ FOR DB THREE : READ FOR INTERVAL b-LOW LEVEL(PROCEDURE): List and make the algorithms of all the functions. Algorithm(ACTIVITY) 3- VERIFICATION: (PROCESS) PROCEDURE: Reviewed by internal project team. 4- Validation(PROCESS) PROCEDURE: External team which means another team of a different project.. DESIGN SPECIFICATION DOCMENT: The Design Specification addresses different aspects of the design model and is completed as the designer refines his representation of the software. First, the overall scope of the design effort is described. Much of the information presented here is derived from the System Specification and the analysis model (Software Requirements Specification). Next, the data design is specified. Database structure, any external file structures, internal data structures, and a cross reference that connects data objects to specific files are all defined. The architectural design indicates how the program architecture has been derived from the analysis model. In addition, structure charts are used to represent the module hierarchy (if applicable). DSD IS PRODUCED AT THE END OF THE DESIGN PHASE. IMPLEMENTATION(PHASE) PROTOTYPE (PROCESS) PROCEDURE: TO CREATE THE GUI FOR EACH FUNCTION ON SCREEN. ACTIVITY: CHOOSING THE CORRECT SOFTWARE LIKE ADOBE FLASH. CODING (PROCESS) PROCEDURE: TO CODE ALL THE FUNCTIONS AND DESIGN A COMPLETE SOFTWARE. ACTIVITY: USING THE APPROPRIATE IDE FOR THE SOFTWARE TESTING: PHASE ...

Words: 1028 - Pages: 5

Free Essay

Nadda

...Review Guide Table of Contents OOPS ................................................................................................................................................................................................. 2 JAVA .................................................................................................................................................................................................. 3 C#....................................................................................................................................................................................................... 4 Database/SQL ................................................................................................................................................................................... 6 Web Development............................................................................................................................................................................ 7 SDLC................................................................................................................................................................................................... 9 UML ................................................................................................................................................................................................. 11 1 Review Guide OOPS Resources:  http://en.wikipedia...

Words: 2407 - Pages: 10

Premium Essay

Medical

...MEDICAL SHOP MANAGEMENT SYSTEM A mini project submitted to the Bharathidasan University in partial fulfillment of the requirements for the award of the degree of MASTER OF COMPUTER APPLICATIONS Submitted by N.RAJA RAHINAM Register Number: 4CA104236 Under the guidance of Miss.A.Sathya, M.C.A., M.PHIL., Assistant Professor DEPARTMENT OF COMPUTER APPLICATIONS BISHOP HEBER COLLEGE (AUTONOMOUS) (Nationally Reaccredited at the A+ Level by NAAC) (Recognized by UGC as “College with Potential for Excellence”) TIRUCHIRAPPALLI-620 017 NOVEMBER – 2012 DECLARATION I hereby declare that the mini project work presented is originally done by me under the guidance of Miss.A.Sathya MCA., M.phil., Assistant Professor, Department of Computer Applications, Bishop Heber College (Autonomous), Tiruchirappalli-17 and has not been included in any other thesis/project submitted for any other degree. Name of the Candidate : N.RAJARATHINAM Register Number : 4CA104236 Batch : 2010-2013 Signature of the Candidate Miss.A.SATHYA MCA., M.PHIL.,, Assistant Professor Department of Computer Applications Bishop Heber College (Autonomous) Tiruchirappalli – 620017. Date: CERTIFICATE This is to certify that the mini project work entitled “MEDICAL SHOP MANAGEMENT SYSTEM” is a bonafide record work done by N.RAJARATHINAM, Register Number: 4CA104236 in partial fulfillment of the requirements for the award of the degree of MASTER OF COMPUTER APPLICATIONS...

Words: 2693 - Pages: 11

Free Essay

Born to Be Wild

...Steve Bishop was born in Liverpool. He moved to Birmingham to study at the university and has lived in Moseley ever since. The short story, Born to Be Wild, which is his first story, was published in Hard Shoulder (1999) This short story has a 1st person narrator called Julian. p. 78 line 1.” I'm looking through my stuff for something to war in town. “ It's very obvious who's point of view this story is seen from. Our narrator Julian is constantly making negative remarks about Martin, and pointing out how unpopular he is. p. 78 line 6 “ but it's only Martin. “ and p. 81 line 1. “ Oh fuck he's going to give the game away. He'd better not even mention it in front of my real friends. “ Julian is your average student, although we don't know his exact age, he mentions a Sony stereo he received for his fourteenth birthday. Going by that information, I'm going to assume he's about 16-17 years old. Julian is very concerned with his reputation among his friends. p. 80 line 14. “ I'm OK with this as long as you don't go around school telling everyone “ p. 90 line 22 “ Ha! You've been hanging out with fatboy. And all I can think of as a comeback is, He lives round the corner from me, what can I do? Right in front of him “ Martin is almost exact opposite of Julian in every way thinkable. Martin is pressumably overweight. p. 82 line 2 from bottom. “ with his fat arse wobbling across the shingle “ Martin is far from popular in school, which he's aware of. Julian is probably...

Words: 833 - Pages: 4

Premium Essay

A Comparative Investigation and Evaluation of Oracle9I and Sql Server2000 with Respect to Performance and Scalability

...a similar fashion in terms of throughput and response time. At high load however Oracle 9i emerged victorious in both cases. market and use of the Internet in databases. The first point has lead to competition between commercial and open source database vendors while the second has resulted in a need for high performance database systems. This whole controversy has in the past lead database vendors to employ numerous tricks in bid to improve the processing speed of their systems during benchmarking and thus falsely prove that their databases products are superior to other competitors. Some of their tricks include using high-speed CPUs and clusters, caching up data rows and storing SQL execution plans into RAM prior to testing thus bypassing disk I/O access and tremendously increasing performance (Burleson D, 2002).AS a result the author seeks to provide an independent third voice that will aid DBA in decision making. 1. Introduction This project explores and evaluates...

Words: 3061 - Pages: 13

Premium Essay

Testing Basics

...but also meets the schedule, budget and maintenance criteria. Advantages of RUP? RUP, if implemented as per the guidelines by an organization, can result in producing an application that meets the standards of QA. It contains several tools under its belt that are easy to learn and apply. Disadvantages of RUP? Although RUP has all the benefits, it has its share of drawbacks. In order to implement RUP in an organization - a major re-engineering process of the existing development system has to be performed - Tools needed to implement RUP are extremely expensive and may not always be cost-effective for mid-size to small projects. - Training the team members on RUP tools is expensive and time consuming. What is Testing? Testing is a process of verifying the operation of a system or application under controlled conditions and evaluating the results. E.g., 'if the user is in interface A of the application while using hardware B, and does C, then D should...

Words: 2172 - Pages: 9

Premium Essay

Software Quality Assurance

...Table of Content 1. Introduction………………………………………………………..…..1-2 1.1 Software Quality…………………………………………..……..2 1.2 Software Quality Assurance……………………………..……….2 1.3 Software Testing………………………………………..………2-3 2. Software Quality Assurance Tools………………………………..…….3-7 3. Selected QA Tools…………………………………………………………8 3.1 Selenium IDE…………………………………………………..9-14 3.2 FabaSoft………………………………………………………15-19 4. Future and Conclusion……………………………………………………20   1. Introduction Software Quality Assurance (SQA) Tools play a major role in common software user community and in the field of software development. SQA tools are the specially developed software tools for the purpose of assisting in the QA processes. 1.1 Software Quality The quality of software is assessed by a number of variables. These variables can be divided into external and internal quality criteria. External quality is what the user experiences when running the software in its operational mode. Internal quality refers to the aspects that are code-dependent, and are not visible to the end-user. External quality is critical to the user, while internal quality is meaningful to the developer only. When the quality comes to software quality conformance, requirement consider as software functional quality and fitness for use named as software structural quality. 1.2 Software Quality Assurance Software quality assurance (SQA) consists of a means of monitoring the software engineering process and methods used to ensure quality...

Words: 2186 - Pages: 9

Free Essay

Jms Tutorial

...Development Best Practices Contents Values Principles Practices o o o o o o o o o o Testing Naming Conventions Client and Server-Side Architectural Patterns ImsCommonsUtil Database Access Dependency Injection/Inversion of Control Business (Domain) Objects GUI Refactoring Core Java Values Simplicity Use the simplest design for the current functionality; don't try to anticipate tomorrow's needs. Code should be easy for a new developer to understand (or yourself a year later). Don't optimize for performance unless there's empirical evidence that it is needed. Be wary of building or using frameworks that make the application harder to understand. If you do need a framework (e.g. Spring for dependency injection), make sure the application's business logic isn't tied to the framework in any way. Maintainability Good naming is crucial. You should be able to read the code aloud, and a person listening to you should be able to understand what the code you are reading does Put responsibilities in the right place. Enforce a clean separation of the application's layers. For example, the UI code should not know anything about the database structure. Use well-known patterns and common idioms for the language. Maintain consistency at the module, application, and team level. There's always more than one way to do something, but doing it consistently is more important than finding the absolute best way. Information Classification: Limited Access Refactor your application code aggressively...

Words: 6069 - Pages: 25

Premium Essay

Web Application

...safeguard their systems and data. However, keeping in mind how commercial and competitive the world we live in has become and the manner in which the market for web related products has grown, it becomes imperative for a developer to ensure that his web application is not just marketable as a breakthrough user friendly concept but also as a secure one. We imagine a world where, every skilled developer is able to make phenomenal applications and is able to provide his users with a large amount of credibility and reliability in terms of security. We aim to conceptualize and subsequently generate a security tool exclusively for the developer, which will be able to scan his work for security lapses and loopholes thereby enhancing the product testing process and making it more wholesome and complete. Chapter – 2 PROBLEM DEFINITION Our project aims at designing an application that has the following features: 1. Identify a selected set of software security vulnerabilities like Cross Site...

Words: 6435 - Pages: 26

Free Essay

Animal Liberation Front: a Threat to America

...Abstract This paper will explain many things about the Animal Liberation Front, including its operational goals; why it is a threat to the United States of America; what actions led to the United States Federal Bureau of Investigation declaring it a terrorist organization; what other countries consider it a terrorist organization and why; how it acts like a terrorist organization instead of a peaceful eco-movement; and what can be done to halt or reduce this threat in the future. The Animal Liberation Front is a terrorist group for many reasons, ranging from their operational structure to their belief system. For example, they adopted the classic clandestine cell structure in order to reduce the risk of all of the cells being compromised if one person is picked up (Shorn, 2009). This allows the members of the Animal Liberation Front to continue their operations and reduce their operational risks slightly while still maintaining security. The Animal Liberation Front originally became a threat to the United States in 1976, when it claimed its’ first firebombing, and it has only grown since then. The firebombing and the hundreds of other actions that followed it plainly show that they are a terrorist organization by their targets and how they attack those targets. The Animal Liberation Front (ALF) has also claimed credit for causing millions of dollars in damage in the United States alone (Bourne, 2003). The targets of the ALF have also begun to mutate and become more...

Words: 6067 - Pages: 25