Lead a software development team to build a system

Assignment Help Basic Computer Science
Reference no: EM13781070

Scenario

You have been asked to lead a software development team to build a system fulfilling the Statement of Need specified in project 1. Your team is employed by a small company. The customer wants a project that balances reasonable development cost, timely delivery, software quality, and functionality.

In this project, you will work to define, refine, and proof test case descriptions for the B&B system. Assume that the code for your B&B system has been developed based on the SDD whose requirements trace through the SRS to the SS. The next step is to develop a software test specification (STS) that describes the test cases that you will perform to verify correctness and validate compliance to customer requirements of your B&B system.

You will select components from your SDD for the B&B system and design two of each; white and black box test cases.
Completing this project will require that you produce a software test specification (STS) document for the system. The objective is to produce a "cookbook" for testers. A tester really only needs the STS, the test environment, the test tools, the test data, and of course, the software.

STS Templates

Please develop your STS using the IEEE Standard for Software Test Documentation, standard 829-1998, posted in the eReserves section on the Class Menu. Section 6 in the IEEE Std 829-1998 is most relevant to this assignment, so focus on completing this section as thoroughly as you can.

The assignment

Complete the template as best as you can. Make any reasonable assumptions based on your understanding of the problem that allow you to address as many sections of the STS template as possible. (Please read the "project descriptions" in the project description section of the syllabus for additional context and information on course projects).

Pay special attention to the following. The bulk of your grade will be decided on how well you address these issues.

Detailed Test Environment description - including test hardware, software, test tools, and data

White Box Test Cases (two): including; name of the component being tested, test inputs, special test tools, and expected outputs
Black Box Test Cases: Select (two) write a complete black box test case definitions, including; name of the test (e.g. boundary value analysis), name of the component being tested, test inputs, expected outputs, special test tools, and requirement(s) from the SRS being validated.

Traceability matrix: Each test case is used to assess compliance to a SRS/SS requirement (i.e., Black Box) or to assess correct computation, e.g., correct inventory level (i.e., White Box). Your Test Cases should trace to one or more SRS requirements. See Table 4.4 in module 4 for an example of a Traceability Matrix. (Please endeavor to validate the use cases/scenarios and requirements as you specified them in your SRS).

Hints and suggestions

For the STS, we shall be using only a subset of the IEEE template; specifically section 6 of the IEEE (Test Case Specification). Refer to Module 4 for information on software testing and examples of black-box and white-box test case definitions. Remember: each test case is used to assess compliance to a SRS/SS requirement (i.e., Black Box) or to assess correct computation, e.g., correct reservation tracking (i.e., White Box). Here are the details required for each test case description:

Test objective

unique test case identifier
input specification
output specification
special environment conditions
special procedural requirements
execution procedure steps
dependencies

You are encouraged to select and use any of the use cases or requirements defined in your SRS. Collaborate with your team and decide who has the best representation to use.

Make sure your work is neat and legible. Your charts, illustrations and diagrams can be done using any word processing, drawing, and/or software CASE drawing tool (or by hand) as long as it is neat and organized. Embed or scan any diagrams that you create in your STS document-do not upload them separately.

Reference no: EM13781070

Questions Cloud

Discussion board mis : Discussion board mis.
Benefits of majoring in psychology : Compare and contrast similarities and differences between two areas of specialization in psychology, and provide an example of a career in each specialization.
The slopes of some key graph-lines covered in the b2 unit : ">Consider the following statement about the slopes of some key graph-lines covered in the B2 unit. I. The slope of an estimated Security Market Line (SML) equals the Equity Premium estimated by the person building the SML graph.
Suppose that the marginal propensity to consume is : Suppose that the marginal propensity to consume is 0.8, and investment spending increases by $100 billion. What is The increase in aggregate demand? How to calculate the answer?
Lead a software development team to build a system : You have been asked to lead a software development team to build a system fulfilling the Statement of Need specified in project 1. Your team is employed by a small company. The customer wants a project that balances reasonable development cost, ti..
Demographics of henrietta lacks issues : What ethical principles in this research are violated?,What diversity implications are involved?
Consenting to the patient wishes : There have been multiple incidents where the family have verbally abused the nursing staff for consenting to the patient's wishes. You decide to convene the ethics committee. Discuss this in a paper of 3-4 pages, including the following:
Discuss rational choice theory : In a 1-2 page well constructed essay, discuss Rational Choice Theory as it is used to explain criminal behavior.Which of the different aspects of this theory are most influential in explaining criminal behavior?
Legal implications of being a patient advocate : Explain why caregivers are considered patient advocates. When and how does one become a patient advocate? Discuss the legal implications of being a patient advocate.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Specifically, for the session long project for this module

Specifically, for the Session Long Project for this Module, you are to review the Mitnick Security Consulting website [available at http://mitnicksecurity.com/]. Kevin Mitnick was for a number of years one of the most successful bad-guy hackers in th..

  How many ways are there to pick a collection of 13 coin

How many ways are there to pick a collection of 13 coins from piles of pennies, nickels, dimes, quarters, and half-dollars? Base on the following condition: a) Assuming that each pile has at least 13 or more coins. b) Assuming that each pile has at l..

  Write a c++ code that includes the following operations

Write a C++ code that includes the following operations: z=x * y z=z + 5.0 x, y, and z are floating point variables. A function (subroutine) named GetData should be declared to get data (x and y) from keyboard. The call by reference mechanism shou..

  What is the number of significant decimal digits

the 36 bit computer uses the 28 bit mantissa and the 8 bit exponent. what is the number of significant decimal digits and what is the range of real numbers for this machine?

  Application letter and resume

In this project, you will work with a fax cover sheet, an application letter, and a resume. To complete the project you will create a table, add text to a table, and format tables.

  Why do you need to run both zenmap gui and nessus

Why do you need to run both Zenmap GUI and Nessus to perform the first three steps of the hacking process

  Few techniques to incorporate to site

Did you know that you do not have to start from scratch if your site is not accessible? There are a few techniques you may incorporate to your site.

  A week after the upgrade it is foud out that there are some

while maintaining your companys configuration management it is determined that you need to upgrade your switches. after

  What would the data dictionary

what would the data dictionary look like for question 5a pg. 88

  A network application for accessing a dial-up database

Wworking for a company that has a network application for accessing a dial-up database of corporate profiles. From your computer workstation, a request for a profile travels over corporate local area network to a modem. The modem, using a conventiona..

  What is the maximum amount of physical memory

Consider a logical address space of 256 pages with a 4-KB page size, mapped onto a physical memory of 64 frames.

  Evaluate the type of applications that the msmp

assignmentincreasing the number of cpus in a computer system tends to increase system performance. there are different

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd