Page 111 - SOFTWARE TESTING & QUALITY ASSURANCE
P. 111
Software Testing and Quality Assurance
7.3 Summary
• Product documentation provides users the information about the product specifications. This
helps the users to know about the product and its features. Thus, it enables the customers to use
the product easily.
• The tester performs documentation testing to check for any errors in the document. Since
documentation errors will not only convey incorrect or wrong information to the users it will also
bring down the reputation of the company.
• The various software components of documentation are Packaging Text and Graphics, Marketing
Material, Ads and Other Inserts, Warranty/Registration, End User License Agreement, Labels and
Stickers, Installation and Setup instructions, User's Manual, Online Help, Tutorials, Wizards, and
Computer Based Training (CBT), Samples, Examples, and Templates, and Error Messages.
• Documentation testing helps to improve the usability and reliability of a software product. It also
helps the organization to reduce the product support cost.
• Security testing is the most important aspect of software testing. This enables the tester to find the
system's vulnerability to security risks.
• Security threat modeling helps to analyze the system in a structured way, so as to find the threats
that the system faces with respect to security. This model not only detects the threats, but it also
documents the threats found and rates them based on the severity of the threat.
• Buffer overrun is one of the most popular bugs that the hackers use to attack the system. It is a
major security threat for any software product.
• The usages of safe string function have enabled the developers to overcome the problem of buffer
overrun. The tester has to make sure that the developers use these functions to develop their
programs.
• Testers must test the software for any latent data available in it, since this data can cause issues
related to software security.
7.4 Keywords
Crypto System: Any computer system that involves cryptography is called as crypto system.
Cryptography is an art of studying hidden, coded, or encrypted information.
Unicode: Binary codes that are used to represent text or script characters in computer programming
languages.
Virus: A computer program that can copy itself and infect a computer.
Vulnerability: Susceptibility to attack.
Warranty: A written assurance that some product or service will be provided or will meet certain
specifications.
7.5 Self Assessment
1. State whether the following statements are true or false.
(a) Documentation meets its objective only if it provides necessary and complete information
to the end users or customers.
(b) The details of the license will sometimes be printed on the envelope or package of software
CD.
(c) Today, many organizations provide the entire information about a product using printed
manuals.
(d) Threat modeling is a highly structured and organized approach of threat correction.
104 LOVELY PROFESSIONAL UNIVERSITY