Functional testing software testing Precautions

Reference article: https://blog.csdn.net/sinat_41392571/article/details/81543712

1. Correlation tests:

Functional relevance: delete / add a will have an impact on other items, often the case that, after an increase of a data record, if the contents of a field long data record, could make a list of data query time deformation.
Data Dependency: If a data is disabled, it may be in the reference list of data items that are not visible

2, the scroll bar control test

Pay attention to the following points:

 a, the length of the scroll bar in accordance with the display length or width of the information vary in time, this will help the user understand where and percentages information, e.g., when the word in the browser 100 document, the browser page 50, the slider position should be in the middle;

 b, drag the scroll bar, check the screen refresh situation and see if there is garbage;

 c, click the scroll bar;

 d, with the wheel to control a scroll bar;

 e, the vertical scroll bar buttons.

3. Check the delete function:

In some you can delete more than one place information, do not select any information, press the "delete", to see whether the error;

And selecting a plurality of information, to delete, to see if handled correctly.

If you have multiple pages whether, flip the election, see the system are properly deleted

And to pay attention, whether to delete when prompted, allow the user to correct the error, not accidentally deleted.

4. Check the additions and modifications are consistent: 

Required items such as adding requirements, modifications should be required; add items specified as integer, change also must be an integer.

5, the input information location: 

Note where the cursor is when you enter the information, and the cursor will jump to the information entered elsewhere.

6, shortcut keys, Enter, refresh key, Backspace key checks

7, the direct URL link to check:

Web System, each function directly enter the URL address of the page to see how the system processed more important for systems require user authentication.

If the system security design is not good, directly enter the URL address of each function of the page, the page is likely to open properly.

8, password check:

Some systems employ encryption method of character Ascii code shift way password encryption process is relatively simple, and high security for the local area network system, in this way can play the role of encryption, but at the same time, cause Ascii character corresponding to a number of problems, i.e., greater than 128 can not be resolved at the time of decryption, try to use "uvwxyz" and some larger character code value as the password, and the password as long as possible, such as a password 17, resulting in encrypted the character can not be resolved password appears.

9, the user checks:

Any system, there are different types of users, administrators also have one or more users, check whether you can manage each other between the various administrators, edit, delete administrator users.

For the average user, try to remove and rebuild a user of the same name, to check whether the user to reproduce other information.

10, data checking injection:

Data injection is mainly injected into the database by entering special characters, such as " '", "/", "-" etc., or combination of characters to complete the destruction of the SQL statement, causing the system query, insert, delete operations SQL because these characters and change the original intent. The select * from table where id = '' and name = '', by input box id "12'", will cause the query name Zhushidiao conditions, but only 12 records the query id =. Similarly, for update and delete operations, and may cause accidentally deleted data. Of course, there are other methods SQL injection, specifically refer to "Advanced SQL application SQL injection .doc", many programs are based on the input character page controlling, the interface may attempt to skip the data directly inserted into the database, such as using Jmeter to complete the inspection data injection.

11, transaction check:

For transactional operations, disconnect the network or close the program to interrupt the operation, whether the transaction is rolled back.

12, date and time check:

Time, date, each system must be verified, such as 2006-2-29,2006-6-31 errors such date.

In addition, verify the date and time formats, such as the 2006 February 28, 2006-2-28,20060228 and so on. Date of inspection Also check the date range meets the actual business, to date do not meet the operational time, the system will prompt whether or restricted.

Guess you like

Origin www.cnblogs.com/grace-l/p/12012451.html