Discuss your strategy to test wlpc system, Computer Networking

Assignment Help:

Wireless Phone Company (WLPC) is a provider of wireless phone service in the US with 100,000 customers serving mostly small markets. WLPC has just purchased additional airwaves in the US, Canada and Mexico. They are expecting to win bids on airwaves in Eastern Europe, India and China. Because WLPC is serving the smaller markets, they have not invested in online billing and payment. With the expected growth and the larger markets, WLPC management has decided they need to offer customers the ability to review their airtime usage and bills as well as pay the bills online. You are a software engineer for WLPC online site and have been tasked by WLPC management to lead the team responsible for requirement elicitation and analysis, design, test and creating software development project plan.

Your Software Test Specification (STS) assignment submission must contain:

1. Test approach: Discuss your strategy to test WLPC system.

2. Test environment description: Describe your WLPC testing environment.

3. White box test case(s): Provide at least one white box test cases for each of at least three WLPC system components (In total at least three white box test cases are expected)

4. Black box test case(s): Provide at least one black box test cases for each of at least three WLPC system components (In total at least three black box test cases are expected)

5. Requirements tracing from the SS/SRS: Include requirements traceability matrix to trace (verify coverage of) your white and black box test cases to the requirements from SS/SRS

6. Formal document structure based on an industry standard, including title page, TOC, references


Related Discussions:- Discuss your strategy to test wlpc system

Explain about the intranet hardware and software, Explain about the Intrane...

Explain about the Intranet hardware and software Intranets not only provide a secure environment for companies but also provide an excellent working environment that is full of

Disk encryption and block cipher, Suppose AES (or any block cipher) is used...

Suppose AES (or any block cipher) is used to encrypt data. Which mode of encryption covered in class is best suited for each of the following two scenarios and why? If more than on

Classify different types of ip routing, INTERNETWORKING - TCP/IP 1. Sta...

INTERNETWORKING - TCP/IP 1. State the following terminologies: a) Node b) Router c) Host d) Subnet e) Network 2. What do you understand by IEEE 802 Local Area network 3.

Butterfly permutation, Butterfly permutation This permutation is gettin...

Butterfly permutation This permutation is getting by interchanging the important significant bit in address with smallest significant bit.

Explain about mesh topology, Q. Explain about Mesh Topology? - Dedicate...

Q. Explain about Mesh Topology? - Dedicated point-to-point links to each other device - n (n-1)/2 links an every device will have n-1 I/O ports - Advantages - Dedic

Determine the method to protect the web servers, Determine the method to pr...

Determine the method to protect the Web servers The company should install additional levels of security measures since it is possible for hackers to generate and send data wit

Functions of the information security steering committee, Question: (a)...

Question: (a) Do you agree with the following statements (specify your reasons to support your answer for each):- i) Policies are the foundation for the development of sta

Programming based on data parallelism, Programming Based on Data Parallelis...

Programming Based on Data Parallelism In a data parallel programming model, the focus is on data distribution. Every processor works with a portion of data. We shall discuss on

Time out - transport layer, Time  out Timers  are used to protect  aga...

Time  out Timers  are used to protect  against  lost packet. Each  packet  must have its own logical  timers since  only  a single  packet  will be retransmitted  after timeou

Security mechanism, How can the use of NAT and PAT, be considered a securit...

How can the use of NAT and PAT, be considered a security mechanism? Research the acronym(s) if it is not a part of your collection.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd