Generate an infinite number of tests from grammar

Assignment Help Software Engineering
Reference no: EM13989911

Section 1 #1. Just as with graphs, it is possible to generate an infinite number of tests from a grammar. How and what makes this possible?

We know that code generators translate graphical source language into textual language that implies a natural approach in representing the generator with the help of graphs set. Testing all input models that triggers any possible application sequence is impossible because of the large amount of combinatorial possibilities. Just like graphs it is possible to generate infinite numbers of tests from grammar by triggering any possible application sequence for testing. Even though, it would be impractical because ofunnecessary and large number of combinatorial possibilities. However, it would be vital to include as many tests a possible to reveal any errors in the code.

Section 2 #1. Consider the stream BNF in Section 1 and the ground string \B 10 06.27.94."Give three valid and three invalid mutants of the string. Stream BNF from section 5.1.1: G 17 08.01.90

B 13 06.27.94

G 13 11.21.94

B 04 01.09.03

Section 2 #2. Provide reachability conditions, infection conditions, propagation conditions, and testcase values to kill mutants 2, 4, 5, and 6 in table 1.

Original Method

 

With Embedded Mutants

int Min (int A, int B)

 

int Min (int A, int B)

{

 

{

int minVal;

 

int minVal;

minVal = A;

 

minVal = A;

if (B < A)

Δ1

minVal = B;

{

 

if (B < A)

minVal = B;

Δ2

if (B      > A)

}

Δ3

if (B < minVal)

return (minVal);

 

{

} // end Min

 

minVal = B;

 

Δ4

Bombo:

 

Δ5

minVal - A:

 

Δ6

minVal = failOnZero (B):

 

 

}

return (minVal);

 

 

1 // end Min

Table 1.

Section 2 #3. Answer questions (a) through (d) for the mutant in the two methods, findVal() andsum().

(a) If possible, find a test input that does not reach the mutant.

(b) If possible, find a test input that satisfies reachability but not infection for the mutant.

(c) If possible, find a test input that satisfies infection, but not propagation for the mutant.

(d) If possible, find a test input that strongly kills mutant m.

//Effects: If numbers null throw NullPointerException                //Effects: If x null throw NullPointerException

// else return LAST occurrence of val in numbers[]                      // else return the sum of the values in x

// If val not in numbers[] return -1

1. public static intfindVal (int numbers[], intval)                           1. public static int sum (int[] x)

2. {                                                                                          2{

3. intfindVal = -1;                                                                                3. int s = 0;

4.                                                                                             4. for (inti=0; i<x.length; i++) }

5. for (inti=0; i<numbers.length; i++)                                               5. {

5'.// for (inti=(0+1); i<numbers.length; i++)                                      6.            s = s + x[i];

6. if (numbers [i] == val)                                                              6'.            // s = s - x[i]; //AOR

7. findVal = i;                                                                            7. }

8. return (findVal);                                                                     8. return s;

9. }                                                                                         9. }

Section 3 #1 Generate tests to satisfy PDC for the bank example grammar.

899_Finite state machine.png

bank ::= action*
action ::= dep | deb
dep ::= "deposit" account amount
deb ::= "debit" account amount
account ::= digit3
amount "$"digit + "."digit2
digit ::= "0" I "1" I "2" I "3" I "4" I "5" I "6" I "7" I "8" I "9"

1535_Finite state machine1.png

Section 3 #2 Consider the following BNF with start symbol A:

A::= B"@"C"."B

B::= BL | L

C::= B | B"."B

L::= "a" | "b" | "c" | ... | "y" | "z" and the following six possible test cases:

t1 = [email protected]

t2 = [email protected]

t3 = mm@pp

t4 = [email protected]

t5 = bill

t6 = @x.y

For each of the six tests, (1) identify the test sequence as either \in" the BNF, and give a derivation, or (2) identify the test sequence as \out" of the BNF, and give a mutant derivation that results in that test. (Use only one mutation per test, and use it only one time per test).

Section 3 #3. Java provides a package, java.util.regex, to manipulate regular expressions. Write aregular expression for URLs and then evaluate a set of URLs against your regular expression.

This assignment involves programming, since input structure testing withoutautomation is pointless.

(a) Write (or find) a regular expression for a URL. Your regular expression does not need to be so general that it accounts for every possible URL, but give your best effort (for example "*" will not be considered a good effort). You are strongly encouraged to do some web surfing to find some candidate regular expressions.

One suggestion is to visit the Regular Expression Library.

(b) Collect a set of URLs from a small web site (such as a set of course web pages).

Your set needs to contain at least 20 (different) URLs. Use the java.util.regexpackage to validate each URL against your regular expression.

(c) Construct a valid URL that is not valid with respect to your regular expression (and show this with the appropriate java.util.regex call). If you have done an outstanding job in part 1, explain why your regular expression does not have any such URLs.

Reference no: EM13989911

Questions Cloud

Importance of occupational health and safety : Choose a company and try to do similar of the example down in file
Write an interface called exam with a method pass(int mark) : Write an Interface called Exam with a method Pass(int mark) that returns a Boolean. Write another Interface called Classify with a method Division(int average) which returns a string. Write a class called Result which implements both exam and Clas..
Explain the design of radio telescope arrays : Design a refracting telescope to meet a technical specification. Use the concept of interferometry to explain the design of radio telescope arrays
What do you believe is the definition of sustainability : What do you believe is the definition of sustainability? Why is sustainability important? After reading this week's text and the AMA report, has this affected your ideas/definition of sustainability?
Generate an infinite number of tests from grammar : Construct a valid URL that is not valid with respect to your regular expression. If you have done an outstanding job in part 1, explain why your regular expression does not have any such URLs.
How would you interpret the dart rate for springs cola : For this assignment, you are going to interpret injury rates and DART rates for soft drink manufactures. How does the Springs Cola's injury rate compare to Waterford Cola's injury rate? How would you interpret the DART rate for Springs Cola
Tell us about yourself-new managerial job : “Tell us about yourself” is the ?rst query in your introductory meeting with the four people who will be reporting to you in your new managerial job. You naturally struggle with where to start. You have been a great individual contributor for four ye..
How would you define ethics in a business environment : How would you define ethics in a business environment? Explain how management can impact ethics within an organization. Please cite your sources. What can cause Organizational ethics to decline? Provide some examples.
Managing the multicultural workforce-managing globalization : Why are the themes of managing teams, managing the multicultural workforce, managing globalization, managing ethics and CSR, and managing with metrics so important today? Which of these challenges is likely to increase in importance in the next decad..

Reviews

Write a Review

Software Engineering Questions & Answers

  How do you find and install quality application software

How do you find and install good quality applications software? Consider your own preferred approach while discussing the primary software management schemes used in Ubuntu, repositories, third-party software, etc.

  Naming conventions in programming language

Discuss and explain why naming conventions are important and why programmers should consistently follow them. Include in this discussion problems that could arise in naming variables if one convention is not followed.

  Contrast the types and role of distributed software

The specific course learning outcomes associated with this assignment are- Compare and contrast the types and role of distributed software architecture.

  1how does the heckscher-ohlin theory differ from ricardian

1.how does the heckscher-ohlin theory differ from ricardian theory in explaining international trade patterns?2.the

  Development of a small software system

Analysis, design and development of a small software system.

  Discuss key problems that occurred during erp implementation

Identify and discuss the key problems that occurred during the ERP implementation. Explain how each of these problems should have been addressed correctly.

  User interface design the user interface provides

user interface design the user interface provides interaction between the user and the application. choose one of the

  Tcp sender and receiver sequence

Think about a TCP sender and receiver. Suppose bytes 0 .. 99 have been sent, received, and acknowledged (the sender has received ack's for them). Suppose the sender sends the following segments

  Propose at least three 3 specific tasks which could be

recommend at least three 3 specific tasks that could be performed to improve the quality of datasets using the software

  Answer the following questions using apa style and citing

answer the following questions using apa style and citing at least one credible source per answer with in-text and

  Normalizing data base

Normalize to the 3NF the given collections of data attributes, Write the normalized entities in correct format and underline the attributes which form the primary key.

  Advantages associated with having a sole proprietorship

Question: What are the advantages and disadvantages associated with having a sole proprietorship?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd