Summary of 43 functional test points

Source: Internet
Author: User
Tags sql injection methods time and date

Functional testing is to verify the function of the product, according to the function test case, test it by item, check whether the product meets the user's requirement function. The common testing methods for Web systems are as follows:
1. Page link check:Each link has a corresponding page, and the page is switched correctly between pages. You can use tools such as Linkbotpro, File-aidcs, HTML Link validater, Xenu, and more. Linkbotpro does not support Chinese, the characters are garbled; HTML link validater can only test web links that end in HTML or HTM; Xenu no need to install, support ASP, do, JSP and other end of the Web page, Xenu test links include internal links and external links, in use should be noted, while the ability to generate HTML format test reports. If your system uses QTP for automated testing, you can also use the QTP page checkpoint check link.
2. Correlation check:Functional dependencies: deleting/Adding an item will have an impact on other items, and if so, whether these effects are correct or not, the common case is that after adding a data record, if the data records a field with a longer content, it may be in the query of the baked-in lemon naphthalene oblique pianpang. br/> Data dependencies: down list default check, down list value check, if a list of data items depend on the data in other modules, also need to check, for example, if a data is disabled, it may not be visible in the list referencing the data item.
3. Check that the button is functioning correctly:such as new, edit, delete, close, return, save, import, previous page, next page, page jump, reset and other functions are correct. Common errors appear on the reset button, which is performed as a function failure.
4. String length check:Enter content that exceeds the length of the string described by the requirement to see if the system checks the string length. Also check that the required string lengths are correct and sometimes appear, and that the required string length is too short to enter business data.
5. Character type check:Enter other types of content where the content of the specified type should be entered (such as entering other character types where you should enter an integer) to see if the system checks for character types.
6. Punctuation check:The input includes various punctuation marks, especially spaces, various quotes, and enter. See if the system is working correctly. The common mistake is the system to the space processing, may add, when the space as a character, and when the query space is masked, resulting in the inability to query to add content.
7. Special character check:Enter special symbols such as @, #, $,%,!, etc. to see if the system is working correctly. A common mistake is to appear in% ' "of these few special characters
8. Chinese character processing:In the system can input Chinese and English, to see whether there will be garbled or error.
9. Check the integrity of the information:When viewing information and updating information, check that the information you have filled in is not all updated, and that the update information and the addition information are consistent. Note that each field should be checked when checking, and sometimes some fields are updated and the individual fields are not updated.
10. Duplication of information:In some need to name, and the name should be unique to enter a duplicate name or ID, to see if the system has been processed, will be error, the names include whether it is case-sensitive, and the input before and after the input space, the system to make the correct processing.
11. Check the Delete function:In some places where you can delete more than one message at a time, do not select any information, press "delete" to see how the system handles it, and then select one and more information to delete it to see if it is handled correctly. If there are multiple pages, turn the page, to see if the system is correctly deleted, and to note that when the deletion of the prompt, so that users can correct the error, not mistakenly deleted.
12. Check that the additions and modifications are consistent:Check that the requirements for adding and modifying information are consistent, such as adding required items, modifications should also be required, adding items that are defined as integral types, and modifications must be integral.
13. Check the names of the changes:Change the name of the item can not be changed to the existing content, to see whether processing, error. At the same time, also pay attention to, will be reported and their name of the wrong.
14. Repeat the submission form:A record that has been successfully submitted, returned and then submitted to see if the system has been processed. For Web systems, the browser can return keys or system-provided return functions.
15. Check the use of the return key multiple times:Where there is a return key, return to the original page, repeat multiple times, to see if there is an error.
16. Search Check:There is a search function where the input system exists and does not exist, to see whether the search results are correct. If you can enter multiple search conditions, you can add reasonable and unreasonable conditions at the same time, to see if the system is handled correctly, when searching the same attention to special characters, some systems will be in the input of special characters, All the information in the system is searched.
17. Enter the information location:Note that when you enter information where the cursor is resting, the cursor and the information you enter will be skipped elsewhere.
18. Upload the download file check:Upload the download file is the ability to implement, whether the upload file can be opened. What is the format of the uploaded file, whether the system has the explanation information, and check whether the system can do it. The download file can be opened or saved, whether the downloaded file has formatting requirements, such as the need for special tools to open and so on. Upload the file test should also be tested, if you can not upload the file suffix is modified to upload the file suffix, to see if it can be uploaded successfully, and, after uploading the file, re-modify to see if the uploaded file exists.
19. Required Fields Check:Should fill in the items are not filled out when the system has been processed, the required fields are prompted for information, such as the required fields before adding "*"; if the required fields are returned, the focus will be automatically positioned to the required fields.
20. Shortcut key check:Whether to support commonly used shortcut keys, such as CTRL + C, CTRL + V, BACKSPACE, etc., for some fields that do not allow input information, such as the selection, the choice of the date of the shortcut is also limited.
21. Enter Check:After the input is finished, press the ENTER key directly to see how the system handles the error. There is a good chance that there will be an error in this place.
22. Refresh Key Check:In the web system, use the browser's refresh key to see how the system processing, will be error.
23. Fallback key check:In the web system, using the browser fallback key to see how the system processing, will be error. For systems that require user authentication, after exiting the login, use the fallback key to see how the system handles it, use the fallback key multiple times, and use the forward key multiple times to see how the system is handled.
24. Direct URL link check:In the web system, directly enter the URL address of each function page to see how the system is processed, it is more important for the system requiring user authentication. If the system security design is not good, directly enter the function page URL address, it is likely to open the page normally.
25. Space check:In the input information entry, enter a space or a string to see how the system is handled. For items that require input of an integer, Fu variable, enter a space, not a null value, or a standard input.
26. Input method Half-width full-width check:In the input information item, enter the half-width or full-width information to see how the system is handled. For items that require input-point data, enter the full-width decimal point (". "or". ", such as 4.5); Enter full-width spaces, and so on.
27. Password Check:Some system encryption method uses the character ASCII code to shift the way, the processing password encryption is relatively simple, and the security is high, for the local area network system, this kind of method can play the Encrypt function completely, but at the same time, may cause some problems, namely the ASCII correspondence character which is greater than 128 cannot parse when decrypting, Try to use "uvwxyz" and some other large code value as the password, while the password as long as possible, such as 17-bit password, etc., resulting in the encrypted password after the unresolved characters.
28. User check:Any system, has a variety of different users, also has one or more administrator users, check whether each administrator can manage each other, edit, delete administrator users. At the same time, for the average user, try to delete and rebuild the user with the same name to check if the other information is reproduced. Similarly, a system that provides logoff functionality, when this user is registered again, is used as a new user. And also check the user's valid date, the user who is past the effective date cannot log on to the system. An error prone situation is a non-super administrator who may be able to manage permissions on the user, and can modify the privileges of the Super Administrator.
29. System Data Check:This is the most important function test, if the system data calculation is not correct, then the functional test will certainly not pass. Data inspection According to different systems, different methods for the business management platform, the data with the business process, the change of State to maintain the correct, not because of a process of garbage data, nor because of a process to lose data.
30. System recoverability Check:In various ways to paralyze the system, the test system can be normal and rapid recovery.
31. Confirm the prompt check:Update, delete operation in the system, whether the user is prompted to confirm the update or delete, whether the operation can be rolled back (that is, whether you can choose to cancel the operation), the information is accurate. Before or after the prompt, for update or delete operation, require advance prompt.
32. Data injection Check:Data injection is mainly to the database injection, by entering some special characters, such as "'", "/", "-" and so on or character combination, to complete the destruction of SQL statements, resulting in system query, insert, delete operations of SQL because of these characters and change the original intent. such as SELECT * FROM table where id = ' and name = ', by entering "12 '-" In the ID input box, causes the query statement to comment out the name condition, and only query id=12 records. Similarly, the operation of update and delete may result in accidental deletion of data. Of course, there are some other SQL injection methods, specific to the SQL application advanced SQL injection. doc, many programs are based on the page to control the input characters, you can try to skip the interface directly to the database to insert data, such as using JMeter, to complete the data injection check.
33. Refresh Check:The real-time refresh function of WebForm control in Web system has the advantages and disadvantages in the system application, and has a great influence on the performance of the system. Detects the impact of the refresh function on the system or application during testing (white screen), checks whether the control returns to the default initial value, and checks to see if it has a significant impact on the performance of the system (such as connecting database queries every time the refresh is connected).
34. Transaction check:For transactional operations, disconnect the network or shut down the program to interrupt the operation, and the transaction is rolled back.
35. Time and date check:Time, date verification is required for each system, such as 2006-2-29, 2006-6-31, and other error dates, and for the management, financial systems, January and the previous year of December (similarly, the 1th quarter of each year and the 4th quarter of the previous year). In addition, for date, time format validation, such as February 28, 2006, 2006-2-28, 20060228 and so on. The date check also checks whether the date range is in line with the actual business, and whether the system will be prompted or restricted for dates that do not meet the time business.
36. Multi-browser authentication:As more and more browsers appear, user access to Web programs no longer relies solely on Microsoft Internet Explorer, but has more options: Maxthon, Firefox, Tencent traveler, etc. Consider using multiple browsers to access the system to verify the effect.
37. Installation test:For systems with C/S architecture, Setup testing is an important aspect, installation program automation, installation options and settings (verifying that all scenarios are properly installed), installation process interruption testing, installation sequence testing (distributed system), repair installation and uninstallation testing.
38. Document Testing:Mainly for the user manuals, product manuals for testing, check whether the description is correct, complete, and the current system version of the comparison, whether easy to understand, whether ambiguity, and so on.
39. Test data check:The facts tell us that the test data is more likely to be wrong than the code, so when the test results indicate that an error occurred, check the test data before you suspect the code error.
40. Please let my machine run:In some projects, there is a morbid problem: there is no problem with the system, it can be passed on my machine. This shows that there are environment-related bugs. "Has everything been managed by the version control tool?", "is the native development environment the same as the server's environment?", "Is there a real bug here, just a random occurrence in another machine?". All tests must be run on all system-required machines, otherwise the code may have problems.
Application of 41.Ajax technology:Ajax has many advantages, but there are many shortcomings, if the use of advantages, to avoid shortcomings, is our new Web2.0 application of a challenge. The most direct problem of AJAX application is user experience, the effect of user experience is directly related to the use of Ajax technology. "What you do, doesn't mean that you should, you have to do it," is an important comment on Ajax technology.
Application of 42.Ajax technology:Ajax uses the mechanism of asynchronous invocation to implement partial refresh of the page, the possibility of an asynchronous invocation of an unexpected interrupt, and attempts to interrupt the asynchronous data invocation by various methods to see if there is a problem. One of the problems encountered here is the operation of the date control, which has been refreshed if the page data is large.
43. Scripting Errors: With the development of asynchronous calling technology such as Ajax, IFrame and so on, JAVASCRĪPT technology has been paid more and more attention by developers, but there are some problems in debugging, such as JAVASCRĪPT, there may be incompatibility among browsers, so script error may occur in Web system. At the same time, the consequences of script errors can be large, small, can not be ignored.

Summary of 43 functional test points

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.