手机测试相关英语
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Mobile Black Box Testing Introduction
Black box testing (black-box testing), also known as functional testing, data-driven testing or specification-based testing. When tested in this way, the program under test is treated as invisible inside the black box. Without any consideration the internal structure and internal features of the case, the test procedures were based only on functional requirements specification into account to determine the test cases and test results are correct inference. Thus black box testing is testing from the user point of view, the idea is intuitive since the black box program is required to do certain things, then we see if it is not in any case to do right. Complete "any" can not be verified, but also a set of black-box generated test cases for this approach to a limited test cases and more than enough to cover "any." As the black box do not need to understand the internal structure, so many high-level tests such as the validation testing, system testing, acceptance testing are using black box testing.
The first is the usual black-box functional testing program. Requirements:
Each software features must be a test case or a recognized exception covered.
Data types and data values with the minimum set of tests.
With a series of real data types and data values to run the test overload, saturation, and other "worst case" results;
Using hypothetical data types and data values, testing the ability to exclude irregular input; Affect the performance of key modules, such as the basic algorithm, test unit performance (including accuracy, time, capacity, etc.).
Not only to assess "whether the program made to do?" But also examine "whether the program should not do not do the 2" but also to examine the program in some other cases are normal. These include data types and data values of the exception, and so on. The following are several ways: (a) equivalence class partition, (b) cause and effect diagram method, (c) boundary value analysis, (d) mistaken method, (e) random number method, that is, from a broader perspective for black box testing. Each method seeks to cover more of "any circumstances", but have their own strengths, the integrated use of these methods will get a good set of test cases.
1 equivalence class partition
Equivalence class partition is a typical black-box testing methods. Equivalence class is a collection of input fields. It said the process of exposing the errors, the collection of each input conditions are equivalent. So long as we select a set of data to a test. Equivalence class partition method is to process the input domain is divided into a number of equivalence classes, and then select a few from each part of the representation of data as test cases. This test program can use a small number of test cases in a large class of reflection.
In considering the equivalence class, you should pay attention to distinguish two different situations:
Effective equivalence class: the effective equivalence class refers to the process specification is meaningful, constitute a reasonable set of input data. On specific issues, the effective equivalence class can be one, it can be more.
Invalid equivalence class: invalid equivalence class refers to the process specification is unreasonable or meaningless set of input data posed. For specific questions, at least one
invalid equivalence class, there may be multiple.
Determine the equivalence class has the following principles:
If the input condition to the range or the number of values, you can identify a valid equivalence class and two invalid equivalence classes. For example, the program's specification, including reference to the input of "... the number of items can be from 1 to 999 ..." is desirable for the effective equivalence class "l test item number <999," invalid equivalence class as the "number of items <l,,及"项数> 999. "
Input condition specifies the set of input values, or provides a "how to" conditions, can determine a valid and an invalid equivalence class equivalence class. If a procedure involves an identifier, the input condition is that the "identifier should start with a letter ..." you "to those who begin with the letter" as a valid equivalence class, "a non-letter" as a valid equivalence class.
If we do know, has been divided into the equivalence class of each element in the program's approach is different, this equivalence should be further divided into smaller equivalence classes.
Invalid input conditions effective equivalence class equivalence class
. . . . . .
. . . . . . . . . . . .
. . . . . . . . . . . .
. . . . . .
Equivalence classes have been listed under the table, the following steps to determine the test cases:
Provided for each equivalence class a unique number;
Design a test case to cover as much as possible the effective equivalence class are not yet covered. Repeat this step, and finally makes the equivalence classes are all valid test cases covered;
Design a new test case to cover only a valid equivalence class. Repeat this step, all invalid equivalence class are covered. Emphasize here that each cover only one invalid equivalence class. This is because if a test case with multiple defects, there may be only found in the test one, others are ignored. Equivalence class partition method to comprehensively and systematically consider the black-box test case design, but did not pay attention to use some of the "efficient" and "targeted" test cases. Behind the introduction of boundary value analysis can compensate for this shortcoming.
2 Cause and effect diagram
Equivalence class partition method does not take into account the various combinations of input conditions. Although all input conditions that could go wrong alone have seen, but combined multiple input case the situation may be wrong but was ignored. Using a causal diagram approach can help us select a set of steps according to a certain and efficient test cases at the same time, but also pointed out to us the description of procedural norms there is any problem.
Export test cases using causal map to go through the following steps:
Analysis procedure described in the specification which is the cause, which is the result. Because often the condition or input conditions of input equivalence classes. The result is
the output condition.
Analysis procedure described in the specification of semantic content, and expressed various reasons connected with the various results of the "causal map."
As the syntax or environmental constraints, some of the causes and results of the combination is not the case. To show that these specific circumstances, the causal map marked with the symbol hold special constraints. The causal map into a decision table. The decision table for each column written a test case.
3 boundary value analysis
Boundary value analysis is listed unit features input, status and control legal and illegal border value of the boundary value, design test cases, including all of the boundary value method. Typically include the IF statement in the discriminant value, domain, range boundary, empty or malformed input, the end of the controlled status. Boundary value analysis is not to find an example of a class method, but the handling of the situation along the border as the main objective of specially designed test methods. In addition, boundary value analysis not only to examine the value of the input side, but also consider the value of the output side. This is derived from people's experience is an effective way. It found that many software errors is the next standard, data structures and scalar boundary value and its upper and lower there, run the test cases found in this region the probability of error is high.
Design using boundary value analysis test cases, the following principles:
If the provisions of a range of input conditions, or provides a number of values should be within the boundaries of that range and just beyond the range of values outside the boundaries, or were on the maximum, minimum, and slightly less than the minimum, slightly greater than the maximum number as a test case. If norms "of a file can contain l to 255" records ... ", then the optional test cases 0 and 1 and 255 and 256 and so on. Conditions for each output using the standard principles of [a].
If the procedural norms mentioned in the input or output field is an ordered collection (such as order documents, forms, etc.) should pay attention to select the ordered set of the first and last element as a test case.
Analysis specifications, possible to identify a possible boundary conditions. A typical example is the boundary value analysis of the triangle classification program. Select a, b, c form sides of a triangle, "any two sides is greater than the third side" as the boundary conditions. Boundary value analysis of the same price class into different emphasis on the equivalence class partition is a supplement. If the triangle problem, select a = 3, b = 4, c = 5, a = 2, b = 4, c = 7 overwrite valid and invalid equivalence classes. If the equivalence class is divided into the boundary value analysis in the idea. In each equivalence class in the use cases not only select a cover, but then select the equivalence class of boundary value equivalence class partition method will be more effective, the final boundary value analysis can be used to add some test cases.
4. Mistaken method
Mistaken rule of thumb method is largely carried out, is made in the past with people's analysis of the results of testing for defects in the regularity revealed for intuitive guesses to discover the defect.
A dichotomy search using the program, typically a few test cases can be listed below:
Be retrieved only one table or empty table;
Table is exactly the number of items a power of 2;
Table of the number of items more than a power of 2 1 and so on.
Mistaken method full human experience, in a test group brainstorming, convenient and practical, especially in poor foundation in software testing in the case, well organized test group (you can also have external personnel) Error guessing, is effective test methods.
5 random method
The test case parameter is random number. It can automatically generate, so the high degree of automation. A large number of random test cases using test procedures will improve user confidence in the process. But the key is whether the law of random numbers use the actual.
Mobile black box covers Content:
1, the basic call
1.1 calls the action detection, such as Caller ID, number, name of the show ring mode (usually by ringing, vibrating, ring + vibration, no, etc.)
1.1.1 The call rings on operation
1.1.2 Bell calls the end of operation
1.1.3 Function calls ring the process of effective key operations (except turn, end)
1.1.4 Invalid call rings key operation
1.2 phone calls
1.2.1 phone calls in the basic menu operations, in addition to on-hook (generally operate SMS, such as editing, sending, etc., phone book editing, save).
1.2.2 call the function keys.
1.2.3 end the call.
1.3 Call function
1.3.1 Dial-up breath ..
1.3.2 the end of the call bell.
1.3.3 Call the invalid operation.
1.3.4 Calling call functions.
1.3.5 Calling the end of the call
1.4 Multi-party call (SIM must support the business)
1.4.1 Calling the conference call.
1.4.2 called multi-party call.
2 Call
2.1 flip response
2.2 Speed Dial
2.3 Automatic redial.
2.4 Any key answer
2.5 Call waiting
3, SMS
See specific test message /bbs/vie ... & extra = page% 3D1
4, MMS
4.1 MMS connection settings and test the basic settings
4.1.1 connection settings, such as homepage, IP, Port, connection time, connection (GPRS & CSD), etc.
4.1.2 Basic settings such as priority, download mode (Auto, delay, reject), is set to receive read reports of some
4.2 editing
4.2.1 normal editing: insert all the support, such as pictures, sounds, text, numbers, symbols, video, accessories
4.2.2 Bad Edit: If all does not support inserting pictures, sounds, text, numbers, symbols, video, accessories, DRM objects (certainly could not get into), etc.
The memory is full when editing MMS, edit the maximum number of pages and then try to insert a page, insert the object into a single MMS and then attempt to insert objects such as full.
4.3 Send
4.3.1 normal transmission, a single recipient, multiple recipients, TO & CC & BCC recipient to the maximum, enter E-mail Address
4.3.2 Error sending: No network when sent, lost when the network sends
4.4 Receiver
4.4.1 normal reception,
4.4.2 memory full when receiving, reception, etc., when no network
4.5 Stress Test
4.5.1 for a long time, the number of viewing, sending, receiving MMS
5, WAP
5.1 Set up a WAP profile
5.1.1 Circuit Switched (CSD) parameters
5.1.2 GPRS parameters.
Log WAP 5.2
5.2.1 Circuit Switched (CSD) bearing
5.2.2 GPRS bearer.
5.3, the network state identification
5.4, a key to the Internet
5.5, GUI requirements
5.5.1-screen display area and can be
5.5.2 Navigation Menu
5.5.3 Rolling logo
5.5.4 Keyboard Mapping ...
5.6, menu browser interface
Hyperlinks 5.6.1 browser functionality
5.6.2 return to the previous page
5.7, in support of language
5.8, a graphical text support
5.9, content requirements
5.9.1 Background Music
5.9.2 supports various image formats
5.10, the default home page address ..
5.11, Bookmark function
5.12, enter the URL to log functions
5.13, the history function ..
5.14, language support
5.13.1 XHTML MP language
5.13.2 WML1.3 language ..
5.13.3 WAP CSS (WCSS) ...
5.13.4 CHTML, HTML3.2 and other languages
5.15, the basic parameter configuration
14.1 a proxy server (gateway) list ..
16, download service
15.1 Content Delivery ..
17, the wireless telephony application
16.1 voice call request processing ...
16.2 to inform the GUI so ..
18, cross-business call
17.1E-mail.
17.2 to receive a short message ...
17.3 incoming call ...
19, e-business ...
6, Phone Book
Find name 6-1
6-1-1 entry and exit
6-1-2 input Chinese characters to find
6-1-3 Enter the letters to find
Enter the numbers 6-1-4 to find
6-1-5 special characters find
6-1-6 mixed input lookup
6-1-7 is not enter characters, direct search
6-1-8 Enter the maximum character capacity to find
6-1-9 by digital examination to find
6-1-10 to operate on the number found
6-1-11 cross event
6-1-12 call the number found
6-1-13 call numbers phone book
6-1-14 English state
Increase the number 6-2
6-2-1 entry and exit
6-2-2 in Chinese, English, numbers and special symbols to store names 6-2-3 storage with +, P, #, and * the number of
6-2-4 Input of entries
6-2-5 record stores do not enter a name
6-2-6 cross event
6-2-7 implicated in other modules
6-2-8 save the number in the standby screen
6-2-9 English state
6-3 to delete the number
6-3-1 entry and exit
Delete phone book record of 6-3-2
6-3-3 record to delete a specific location
6-3-4 in order to delete the number
6-3-5 cross event
6-3-6 implicated in other modules
6-3-7 English state
6-4 Copy number
6-4-1 entry and exit
6-4-2 record copy of all mobile phone to the SIM card (SIM card phone book is no record) 6-4-3 record copy of all the SIM card to the phone (no phone book record)
6-4-4 copied one by one
6-4-5 Copy All
6-4-6 cross event
6-4-7 English state
6-5 Select the Phonebook
6-5-1 entry and exit
6-5-2 Select the Phonebook function (stored in the SIM card)
6-5-3 Select the Phonebook function (store phone)
6-5-4 cross event
6-5-5 English state
6-6 remaining space
6-6-1 entry and exit
6-6-2 is consistent with the actual
6-6-3 Adding records
6-6-4 Deleting Records
6-6-5 cell phone and SIM card phone book record reproduction among
6-6-6 cross event
6-6-7 English state
Speed dialing 6-7
6-7-1 entry and exit
6-7-2 add, store, call, clear speed dial (enter number)
6-7-3 add, store, call, clear speed dial (select a number from the phone book)
6-7-4 boot after shutdown
6-7-5 Setting the standby screen
6-7-6 add, store, call, clear speed dial (from the standby screen setting) 6-7-7 cross event
6-7-8 English state
Number of groups 6-8
6-8-1 entry and exit
6-8-2 view / delete function
6-8-3 record increase
6-8-4 caller ringtones
6-8-5 caller picture function
6-8-6 rename feature
6-8-7 cross event
6-8-9 English state
7, setting the scene
8, call forwarding
9, alarm clock
Set the alarm
Cancel the alarm
Choose a ring tone
10, Memorandum
Write memos
One type
Every type
Type per week
Monthly Model
Each type
Read today's memorandum
Test components: the memorandum read today - Scroll Key
Test components: the memorandum read today - edit memo
Test components: read all memos - see memo
Test components: the memorandum read today - delete memo
Quit
Test components: reading memo - memo is empty View
Read all memos
Delete Memorandum of Understanding
Delete all memoranda
11, voice recording
Recording
Call recording
Broadcast
Rename
Delete a
Delete all
Broadcast
Rename
Delete a
Delete all
12, camera
13, confidential setting
1 PIN code settings
1.1 PIN code start
1.2 cancel the PIN code
1.3 Change PIN
2 Phone lock
Activate the phone lock 2.1
2.2 cancel the phone lock
2.3 change the phone lock password
3 Call restrictions
3.1 All outgoing
3.2 International Outbound
3.3 All incoming
3.4 incoming international roaming
4 fixed call
14, Editor
14.1 editors 1.
14.2 Editor 2.
14.3 Editor 3.
14.4 Editor 4.
14.5 Editor 5.
14.6 Editor 6.
14.7 Editor 7.
14.8 Editor 8.
14.9 editors 9.
14.10 Editor 10.
15, call records
16, Monternet
1 mobile service dream of your card package 1.1 Personal Assistant.
1.2 e-mail.
1.3 mobile chat.
1.4 LBS.
1.5 e-commerce.
1.6 entertainment services.
1.7 Information services.
1.8 Customer Service.
2 M-Zone card offer package services
2.1 Dynamic DC.
2.2 dynamic message.
2.3 dynamic passphrase.
2.4 dynamic park.
2.5 dynamic position.
2.6 Recreation.
17, the application
18, other mobile phones set
19 calendar
20, long-distance area code
21, World Time
22 Calculator
23, stopwatch
24, unit conversion
25 games
26 Folders
27, the interface map
Character input screen image and
A switching machine screen
1.1 LCD1 boot screen
1.2 LCD1 off the screen
1.3 LCD2 display during the boot process.
1.4 LCD2 shutdown display.
2 Standby Interface
2.1 LCD1 standby interface ...
2.2 LCD2 standby interface
3 Standby button interface
4 LCD2 interface display status
4.1 calls small-screen interface display
4.2 New text messages when the small-screen interface display.
4.3 alarm occurs when the small-screen interface display.
4.4 when the small self-screen interface display.
4 prompted a state ...
5 branches of the menu interface
6 state of the interface process
7 call interface.
8 no SIM card standby interface
28, the menu structure
29, the logic icon
30, no SIM card
1 no SIM card standby screen ..
2 button operation without the SIM card ..
3 emergency call
4 See parameter
31, various SIM card compatibility
32 charger
33, headphone
34, Off
34.1 normal
34.1.1 switch test - normal shutdown
34.1.2 switch test - normal boot
34.2 boot
34.2.1 switch test - normal boot - call ..
34.2.2 switch test - normal boot - to answer the phone ..
34.2.3 switch test - normal boot - immediately call ..
34.2.4 switch test - normal boot - receive regular text messages ..
34.2.5 switch test - normal boot - set to automatically display the message received ..
34.2.6 switch test - normal boot - receive MMS ..
34.2.7 switch test - normal boot - alarm expires ..
34.2.8 switch test - normal boot - alarm expires ..
34.2.9 switch test - normal boot - Memorandum of Understanding expires ..
34.3 Accessories
34.3.1 switch test - plug charger - shutdown - boot.
34.3.2 switch test - off - plug charger - Power
34.3.3 switch test - no SIM card.
34.3.4 switch test - setting pin
In addition to J2ME, BT, IrDA, WI-FI, FM and other tests
J2ME test are (probably because all the company's solutions may not be the same, which features support for the API and want to test is also somewhat different):
A simple test:
Such as new, rename, edit, delete folders, download, install, run, uninstall MIDlet;
2 interrupted test:
Function test this with other similar, such as download, install, run-time break of the test 3 boundary test:
As a single file = Limited Size (most mobile phones now no MIDlet Size limit, so some can not test this), Download MIDlet to the memory is full.
4 error test:
If no signal is time to Download Download MIDlet or take away the middle of the signal when the memory is full time and then Download MIDlet and other
5 safety test
Because the J2ME platform is very open, MIDlet is divided into trusted and untrusted, test security has become very important. I am not familiar with this part, sorry.
6 stress test: a long-running MIDlet
7 Other。