-IOS mobile terminal test development to test the Test Case Design Summary

 First, install / uninstall

  1, mounted on a real machine, unloading, high version cover installed to cover the lower version, the installation of high unloaded version;

  Installation concern: the version number, channel number, digital signature (see assisted with packet capture tool), after a successful start installation wizard, the installation process for handling unexpected situations (cancellation, crash, restart, power off, out of memory, off net ), the installation progress bar, the main function of the process; 

  Uninstall concern: Uninstall unforeseen circumstances during treatment (cancellation, crash, restart, power off, out of memory, off the net), uninstallation progress bar; 

  2, third-party software help to install, uninstall, high version covering installation, low version covering installation, installation of high version after unloading;

  3, online upgrade:

  Upgrade Point: upgrade prompt, cancel the update / update, background updates (ios automatic update), cross-version upgrades, handle exceptions of the upgrade process (cancel, crash, restart, power off, out of memory, disconnection), upgrade progress, upgrades under different network; 

  Third-party software support: itools, pea pods, 91 assistants, Huawei assistant, 360 , Po and other applications;

  Second, the business function test ;

  1, according to the requirements document prototype drawing draft design verification and implement various functions app;   

  2, common features:

  Registration: enter the user name and password (the same text box to edit "2-1)"), user name, password length limits, page prompts (the registered mobile phone SMS alerts), consistent with foreground and background data; 

  Login: Enter the user name and password (the same login "1-1)"), limit the number of invalid login, login multiple devices (MTOP existing principles, an application while allowing only one device log in), disable the account login, login is successful information after logout button is registered, log-out processing, the login process disconnection process, the login process switching network; 

  Logout: New account login after logout, cancel cancellation; 

  Application switching front and back: app switching front and back, lock screen solution screen, telephone interrupt back to the app, after the balloon must deal with the process returns to app, kill the process after the restart app, data exchange pages Notes before and after Taiwan Solutions screen switching, and locks the screen; 

  Free login: kill the process after logging restart app, no network, switch user login, password replacement, next time you start actively Log app, unloading heavy equipment, online updates, covering installation, cross-version installed; 

  Data Update: manual or automatic refresh, switching data updates to the foreground from the background, updated in real time, the timing of update, the data display processing logic (server acquires, local cache), the update exception handling (weak network, disconnection, the server response to an exception, data is empty); 

  Positioning, camera, voice, Bluetooth and other services: turned on, follow the prompts to open unopened, unopened and refused to open; 

  Time Test: modify the phone time zone; 

  Push the test: Push message content, links jump push message, DND or refuse to accept; 

  Cross-event test:

  Third, compatibility testing;

  1, resolution;

  Mainstream Resolution: 1080 * 1920,720 * 1280,800 * 1280,2560 * 1440, 2040x1080, etc. 

  Non-mainstream: 1080 * 1800, etc. 

  2, the mainstream system version;

  ios:ios10、ios9、ios8、ios7;android:android6.0、android5.0、android4.*等; 

  3, different manufacturers to customize;

  Brand: iphone, Huawei, millet, oppo, vivo, Meizu 

  Different size: 6 inches, 5 inches, 5.5 inch, 5.7 inch, 4.7 inch, 4 inch

  Fourth, stability testing:

  monkey combination of Friends of the Union more than 8 hours continuous use statistical crash rate; 

  Disturb events, such as the data line plug, disturb telephone, text messaging, network switches, network browsing, using a Bluetooth transmitting / receiving data, camera or the like; 

  A plurality of test switching operation app;

  Fifth, performance testing :

  monkey binding performance testing tool monitoring cpu, memory, flow rate, power consumption, performance testing tools such as anothermoniter, Tencent of GT; 

  Evaluation typical application scenarios of users, usage of system resources; 

  Large test data (such as the need to read the user's address book); 

  In response to different network speeds, the interface server stress test

  Benchmarking with competing products (baseline test);

  Sixth, the network test:

  No network testing; 

  Weak network testing; 

  Extranet test;

  Seven, interface usability testing:

  1, in line with android or ios experience specification;

  android experience Specification: Long press delete pop-up options (can not remember what other, usually still have to do more summary); 

  ios experience Specification: sliding pop-delete option left, right and left swipe to turn pages 

  2, consistent user experience specifications:

  The availability of space data interface design, lead the user to perform the operation. 

  Whether the abuse of the user guide. 

  Is there not clickable effect, such as: your button this time in an unusable state, then it must be greyed out or remove buttons, or give misleading users 

  Whether the menu hierarchy is too deep; 

  Whether the interaction flow branch too much; 

  Whether the relevant option very far away; 

  Interface button clickable area is moderate; 

  When the switch tag, followed by content switching; 

  Back of whether the definition of logic. Involving the interaction of hardware and software, Back key should be specifically defined 

  Is there a landscape mode design, applications typically require support cross-screen mode, i.e. adaptive design; 

  Is there a connection in a different page navigation, page navigation and consistent style; 

  The need to search; 

  Picture quality, image color, not too much on the same page, the same page label style uniform; 

  Copywriter: descriptive text input box, page text correctness, sensitive words, sensitive pictures (design patent, copyright, privacy, etc.);

  Eight, safety testing :

  1, the software permissions:      

  Restrict / allow the use of phone features Internet access 

  Restrictions / allowed to send information using a mobile phone to accept the function 

  Limit / allow the application to register automatically launch an application 

  Limits or using a local connection 

  Restrict / allow use of mobile phones to take pictures or recordings 

  Restrict / allow use of mobile phones to read user data 

  Restrict / allow people to use mobile phones to write user data 

  2, install / uninstall security:

  Applications can be found on the corresponding icon to install device drivers 

  You should be able to specify the installation path 

  Without the user's permission, the application can not be pre-set to start automatically 

  Is it safe to unload, if the file is installed into its full uninstall 

  Whether users uninstall files generated in the process prompted 

  Its modified configuration information is restored 

  Uninstall affect the function of other software 

  Uninstall should remove all files 

  3, data security:  

  Input password will not be displayed in clear text 

  Passwords, credit card details or other sensitive data will not be stored in their pre-input position 

  Password length different applications required in a 4 8 digits in length between at least 

  When the application process credit card details or other sensitive data, the plaintext data is not written to a separate file or other temporary file. To prevent the application terminates abnormally, but no side in addition to its temporary file, the file may be subject to attack invaders, and then read the data. 

  When the input time sensitive data to the applications, which can not be stored in the device 

  Should be encrypted backup, restore data recovery process should be considered abnormal, communications interruption, before the data recovery before use should be subject to verification 

  The application should be a system or virtual machine-generated user message or a security warning 

  Applications can not be ignored by the system user or virtual machine-generated message or a security warning, but not before the security warning is displayed, with the display misleading information to deceive the user, the application should not be simulated security warnings to mislead users 

  Before deleting data, the application shall notify the user or application provides a "cancel" command operation 

  "Cancel" command operation can fulfill its function in accordance with the design requirements 

  Applications should be able to handle the situation when the application is not allowed to connect to the personal information management 

  When a read or write operation of user information, the application will send a wrong message to the operation of the user 

  Without damaging anything to remove personal information management applications on the premise that there is no user's explicit consent 

  Applications to read and write the data correctly. 

  Applications should be an exception to protect. 

  If the database important data about to be rewritten, should promptly inform the user 

  Error can reasonably handle appears 

  Unexpected situations should prompt the user

Released nine original articles · won praise 5 · Views 543

Guess you like

Origin blog.csdn.net/weixin_37018468/article/details/104676435