SlideShare une entreprise Scribd logo
1  sur  11
 It is a good all-round specification-based black-box technique. It can be
applied at any level of testing and is often a good technique.
 It is better to use the technique informally than not at all, it is much
better to use the technique in a formal way to attain the full benefits
that it can deliver.
 The idea behind the technique is to divide a set of test conditions into
groups or sets that can be considered the same.
 The equivalence partitioning technique then describes that we need to
test only one condition from each partition.
 For example, a saving account in a bank earns a different rate of interest
depending on the balance in the account.
 When we say a partition is ‘invalid ‘,it doesn’t mean that it represents a
value that cannot be entered by user. It just means that it is not one of
the expected inputs for this particular field.
 The software should correctly handle values from the invalid partition,
by replying with an error message ‘Balance must me at least $0.00.
 Definition:
A boundary value is any input or output value on the
edge of an equivalence partition. It’s a black box test
design technique where test cases are designed by
using boundary values; BVA is used in range checking.
 Objective :
Boundary value analysis leads to a selection of test
cases that exercise bounding values.
 Guidelines :
If an input condition specifies a range bounded by
values a and b, test cases should be designed with
value a and b, just above and below a and b.
CONDITIONS
(Candidate)
VALID
BOUNDARY
& EDGES
TAG
(applicable)
INVALID
BOUNDARY
TAG
(not-
applicable)
Relevant
Experience
Number
should be 0
to 99
0 ,1 –
98,99
A1 -0.01 &
99.01
B1
Year of
Passing
1975 to 2008
1975,1976 –
2007,2008
A2 1974 –
2009
B2
 A black-box test design technique where the cases
are designed to execute the combinations of
inputs(causes) with their associated outputs(effects)
in a table format where each column represents a
unique combination.
 The input conditions and actions are often stated
either true/false(Boolean).
 It overcomes the defect of EP/BVP which becomes
complicated when different combinations of inputs
has to be given.
State Transition diagram represents one specific entity
at a time
It describes the states of an entity
It also describes the events that affect the entity, the
transitions of the entity from one state to another, and
actions that are initiated by the entity.
o What is a Scenario?
o Who is an Actor?
o What is a Use case?
Maintains
Database
Withdraw cash
Deposit cash
Administrator
customer
Actors
Use Cases
Main Success
Scenario
Step Action
1 A:Actor Clicks on the
Login page of the site.
2 S:System prompts the
actor to supply Username
and Password.
3 A: Actor supplies the
Username and Password
Details.
4 S:System Gets the User ID
and decrypts the
Password. System
compares User ID & the
Password provided by the
user with the stored User
ID & Password. If the
comparison is successful
actor is directed to the
Next Page.
5 Use Case ends
Extensions Step Action
3a S:If invalid Username and
Password is given then a
message should be
displayed “to reenter
Username and Password”
3b A:If User forgets the
Password then Actor should
invoke forgot password
S:System prompts for email
address
A:Actor provides the email
address
S:System Validates the user
provided email address with
stored email Address.
If System validation is
successful ,reset password is
emailed to actor.
4a S:If validation is not
successful then go to 3a
Thank You

Contenu connexe

En vedette

V Model in Software Testing
V Model in Software TestingV Model in Software Testing
V Model in Software TestingAbdul Raheem
 
V model Over View (Software Engineering)
V model Over View (Software Engineering) V model Over View (Software Engineering)
V model Over View (Software Engineering) Badar Rameez. CH.
 

En vedette (6)

V Model in Software Testing
V Model in Software TestingV Model in Software Testing
V Model in Software Testing
 
V model Over View (Software Engineering)
V model Over View (Software Engineering) V model Over View (Software Engineering)
V model Over View (Software Engineering)
 
V model final
V model finalV model final
V model final
 
V model in SDLC
V model in SDLCV model in SDLC
V model in SDLC
 
Types of testing
Types of testingTypes of testing
Types of testing
 
Types of Test
Types of Test Types of Test
Types of Test
 

Similaire à Black Box Testing

Implementing Blackbox Testing
Implementing Blackbox TestingImplementing Blackbox Testing
Implementing Blackbox TestingEdureka!
 
ISTQB, ISEB Lecture Notes- 4
ISTQB, ISEB Lecture Notes- 4ISTQB, ISEB Lecture Notes- 4
ISTQB, ISEB Lecture Notes- 4onsoftwaretest
 
Black_Box_testing_Decision_Table (1).ppt
Black_Box_testing_Decision_Table (1).pptBlack_Box_testing_Decision_Table (1).ppt
Black_Box_testing_Decision_Table (1).pptEnghamzaKhalailah
 
SE 09 (test design techs).pptx
SE 09 (test design techs).pptxSE 09 (test design techs).pptx
SE 09 (test design techs).pptxZohairMughal1
 
Code coverage in theory and in practice form the do178 b perspective
Code coverage in theory and in practice form the do178 b perspectiveCode coverage in theory and in practice form the do178 b perspective
Code coverage in theory and in practice form the do178 b perspectiveEngineering Software Lab
 
Code Coverage in Theory and in practice form the DO178B perspective
Code Coverage in Theory and in practice form the DO178B perspective   Code Coverage in Theory and in practice form the DO178B perspective
Code Coverage in Theory and in practice form the DO178B perspective Engineering Software Lab
 
blckboxtesting.ppt il.;io'/ ulio'[ yjko8i[0'-p/ yk
blckboxtesting.ppt il.;io'/ ulio'[ yjko8i[0'-p/ ykblckboxtesting.ppt il.;io'/ ulio'[ yjko8i[0'-p/ yk
blckboxtesting.ppt il.;io'/ ulio'[ yjko8i[0'-p/ ykSMayankSharma
 
Black box testing techniques
Black box testing techniques Black box testing techniques
Black box testing techniques Nguyen Quoc Dung
 
Testing Fundamentals
Testing FundamentalsTesting Fundamentals
Testing FundamentalsKiran Kumar
 
Testcase design techniques final
Testcase design techniques finalTestcase design techniques final
Testcase design techniques finalshraavank
 
What are Software Testing Methodologies | Software Testing Techniques | Edureka
What are Software Testing Methodologies | Software Testing Techniques | EdurekaWhat are Software Testing Methodologies | Software Testing Techniques | Edureka
What are Software Testing Methodologies | Software Testing Techniques | EdurekaEdureka!
 
Se (techniques for black box testing ppt)
Se (techniques for black box testing ppt)Se (techniques for black box testing ppt)
Se (techniques for black box testing ppt)Mani Kanth
 
Dynamic Testing
Dynamic TestingDynamic Testing
Dynamic TestingJimi Patel
 

Similaire à Black Box Testing (20)

Black Box Testing
Black Box TestingBlack Box Testing
Black Box Testing
 
CTFL Module 04
CTFL Module 04CTFL Module 04
CTFL Module 04
 
Implementing Blackbox Testing
Implementing Blackbox TestingImplementing Blackbox Testing
Implementing Blackbox Testing
 
ISTQB, ISEB Lecture Notes- 4
ISTQB, ISEB Lecture Notes- 4ISTQB, ISEB Lecture Notes- 4
ISTQB, ISEB Lecture Notes- 4
 
Black_Box_testing_Decision_Table (1).ppt
Black_Box_testing_Decision_Table (1).pptBlack_Box_testing_Decision_Table (1).ppt
Black_Box_testing_Decision_Table (1).ppt
 
SE 09 (test design techs).pptx
SE 09 (test design techs).pptxSE 09 (test design techs).pptx
SE 09 (test design techs).pptx
 
Blackbox
BlackboxBlackbox
Blackbox
 
Code coverage in theory and in practice form the do178 b perspective
Code coverage in theory and in practice form the do178 b perspectiveCode coverage in theory and in practice form the do178 b perspective
Code coverage in theory and in practice form the do178 b perspective
 
Code Coverage in Theory and in practice form the DO178B perspective
Code Coverage in Theory and in practice form the DO178B perspective   Code Coverage in Theory and in practice form the DO178B perspective
Code Coverage in Theory and in practice form the DO178B perspective
 
blckboxtesting.ppt il.;io'/ ulio'[ yjko8i[0'-p/ yk
blckboxtesting.ppt il.;io'/ ulio'[ yjko8i[0'-p/ ykblckboxtesting.ppt il.;io'/ ulio'[ yjko8i[0'-p/ yk
blckboxtesting.ppt il.;io'/ ulio'[ yjko8i[0'-p/ yk
 
Black box testing techniques
Black box testing techniques Black box testing techniques
Black box testing techniques
 
Lesson 2....PPT 1
Lesson 2....PPT 1Lesson 2....PPT 1
Lesson 2....PPT 1
 
Blackbox
BlackboxBlackbox
Blackbox
 
Testing Fundamentals
Testing FundamentalsTesting Fundamentals
Testing Fundamentals
 
Testcase design techniques final
Testcase design techniques finalTestcase design techniques final
Testcase design techniques final
 
Test Effectiveness
Test EffectivenessTest Effectiveness
Test Effectiveness
 
Blackbox
BlackboxBlackbox
Blackbox
 
What are Software Testing Methodologies | Software Testing Techniques | Edureka
What are Software Testing Methodologies | Software Testing Techniques | EdurekaWhat are Software Testing Methodologies | Software Testing Techniques | Edureka
What are Software Testing Methodologies | Software Testing Techniques | Edureka
 
Se (techniques for black box testing ppt)
Se (techniques for black box testing ppt)Se (techniques for black box testing ppt)
Se (techniques for black box testing ppt)
 
Dynamic Testing
Dynamic TestingDynamic Testing
Dynamic Testing
 

Dernier

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 

Dernier (20)

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 

Black Box Testing

  • 1.
  • 2.  It is a good all-round specification-based black-box technique. It can be applied at any level of testing and is often a good technique.  It is better to use the technique informally than not at all, it is much better to use the technique in a formal way to attain the full benefits that it can deliver.  The idea behind the technique is to divide a set of test conditions into groups or sets that can be considered the same.  The equivalence partitioning technique then describes that we need to test only one condition from each partition.  For example, a saving account in a bank earns a different rate of interest depending on the balance in the account.  When we say a partition is ‘invalid ‘,it doesn’t mean that it represents a value that cannot be entered by user. It just means that it is not one of the expected inputs for this particular field.  The software should correctly handle values from the invalid partition, by replying with an error message ‘Balance must me at least $0.00.
  • 3.  Definition: A boundary value is any input or output value on the edge of an equivalence partition. It’s a black box test design technique where test cases are designed by using boundary values; BVA is used in range checking.  Objective : Boundary value analysis leads to a selection of test cases that exercise bounding values.  Guidelines : If an input condition specifies a range bounded by values a and b, test cases should be designed with value a and b, just above and below a and b.
  • 4. CONDITIONS (Candidate) VALID BOUNDARY & EDGES TAG (applicable) INVALID BOUNDARY TAG (not- applicable) Relevant Experience Number should be 0 to 99 0 ,1 – 98,99 A1 -0.01 & 99.01 B1 Year of Passing 1975 to 2008 1975,1976 – 2007,2008 A2 1974 – 2009 B2
  • 5.  A black-box test design technique where the cases are designed to execute the combinations of inputs(causes) with their associated outputs(effects) in a table format where each column represents a unique combination.  The input conditions and actions are often stated either true/false(Boolean).  It overcomes the defect of EP/BVP which becomes complicated when different combinations of inputs has to be given.
  • 6. State Transition diagram represents one specific entity at a time It describes the states of an entity It also describes the events that affect the entity, the transitions of the entity from one state to another, and actions that are initiated by the entity.
  • 7. o What is a Scenario? o Who is an Actor? o What is a Use case?
  • 9. Main Success Scenario Step Action 1 A:Actor Clicks on the Login page of the site. 2 S:System prompts the actor to supply Username and Password. 3 A: Actor supplies the Username and Password Details. 4 S:System Gets the User ID and decrypts the Password. System compares User ID & the Password provided by the user with the stored User ID & Password. If the comparison is successful actor is directed to the Next Page. 5 Use Case ends
  • 10. Extensions Step Action 3a S:If invalid Username and Password is given then a message should be displayed “to reenter Username and Password” 3b A:If User forgets the Password then Actor should invoke forgot password S:System prompts for email address A:Actor provides the email address S:System Validates the user provided email address with stored email Address. If System validation is successful ,reset password is emailed to actor. 4a S:If validation is not successful then go to 3a