3.2.6 - Testing and Running a Solution

Mind Map by , created over 5 years ago

A Level Computing (F452) Mind Map on 3.2.6 - Testing and Running a Solution, created by AndrewZV on 04/02/2014.

Created by AndrewZV over 5 years ago
Computing Hardware - CPU and Memory
computer systems and programming quiz
Molly Batch
CPU and Memory
med chem 2 final exam
A level Computing Quiz
Zacchaeus Snape
Computer Systems
Computer science quiz
Ryan Barton
OCR gcse computer science
Jodie Awthinre
Ben Leader
3.2.6 - Testing and Running a Solution
1 Errors
1.1 Syntax
1.1.1 Occurs when a statement has been written that breaks the rules of that programming language.
1.1.2 Common Syntax Errors: Missing or extra punctuation. Not enough arguments. Missing part of a multi-line statement. Using unrecognised identifiers. Type mismatch.
1.2 Logical
1.2.1 Occurs because of a mistake in the algorithm that results in the program doing something other than what's expected to do.
1.2.2 Don't usually produce error messages. Discovered because the computer is producing unexpected results.
1.2.3 Other common causes are: Instructions in the wrong order. Incorrect conditions for IF statements or Loops.
1.3 Run-time
1.3.1 Occurs due to an unexpected situation with the data being processed. The program would otherwise work normally. Generally occur when the computer attempts impossible arithmetic operations.
1.3.2 Other common causes are: Overflow error Uses a variable to store a value to large for it. Stack overflow error Program runs out of stack space to store operations. Library error Referring to an external library that does not exist.
1.3.3 Exception Handling Handles errors that are unavoidable. Reading from a file that has been deleted. Dividing by zero.
2 Types of Testing
2.1 White Box
2.1.1 Tests the algorithm to make sure it functions as intended.
2.1.2 Focused on testing every path of execution through a program.
2.1.3 Path of execution is noted, so it can be compared with other runs.
2.2 Black Box
2.2.1 Inputs and Outputs Not how the program works. Test every possible input. Are the results expected?
2.2.2 Three types of input data to consider: Valid Data Data you would expect to be input. Invalid Data Data which would generate an error message. Borderline Data Testing data at the boundaries between both cases.
2.3 Alpha and Beta
2.3.1 Carried out when the software is nearly complete.
2.3.2 Applies to commercial software being developed for external users.
2.3.3 Difference resides in the stages and the tester. Alpha Limited to be tested by internal employees and friends/family of the company. Very early version of the software. Normally full of bugs. Beta Opened up to a wider audience. Almost in a finished state. Normally test things such as load balancing.
2.4 Acceptance
2.4.1 Demonstrates to the end user that the software works correctly. All desired features have been implemented.
2.4.2 Takes place after all development and testing is complete. The software is ready to be handed to the end user.
2.4.3 Software is tested against all requirements. Until the user accepts the software is what is originally requested.
3 Running Solutions
3.1 Dry Runs
3.1.1 Used to locate the cause and location of an error. You go through the code manually executing and recording each line of code.
3.1.2 Use a trace table to keep track of all the variables.
3.2 Debugging Tools
3.2.1 Translator Diagnostics Messages generated by the translator, while it's translating the source code into object code. Often includes warnings where there might be a logic error.
3.2.2 Break Points and Stepping Breakpoints mark lines of code, requesting the program stops running when it gets to that line.
3.2.3 Variable Checks Programmer can request variables to be checked at any time in the program. This allows the programmer to compare the value to what it should be at that time.
3.3 Installation Routine
3.3.1 Installing the program.
3.3.2 The routine does the following: 1. Checks if there is enough space. 2. Program copied to destination folder. Data files are copied with it. 3. Library files are copied and registered. 4. Executable file will create shortcut. 5. Allow user to configure and customise installation. 6. Configuration saved in system registry.

Media attachments