Web Testing Experience Finishing

Source: Internet
Author: User
Tags sql injection methods time and date

1. Page link check: Each link has a corresponding page, and the page between the correct switch. You can use tools such as Linkbotpro, File-aidcs, HTML Link validater, Xenu, and more. Linkbotpro does not support Chinese, the characters are garbled; HTML link validater can only test Web links ending in html or HTM, Xenu does not need to be installed, support ASP, do, JSP and so on end of the Web page, Xenu test links include internal links and external links, which should be noted at the time of use, as well as the ability to generate test reports in HTML format. If the system is QTP, you can also use the QTP page checkpoint check, automated check

2. Correlation check:

Ø Functional dependencies: deleting/Adding an item will have an impact on other items, and if so, whether the effect is correct or not, the common case is that after a data record is added, if the data records a field with a longer content, it may distort the data list when queried.

Ø Data dependencies: down list default check, down list value check, if a list of data items depend on the data in other modules, also need to check, for example, if a data is disabled, it may not be visible in the list referencing the data item.

3. Check the function of the button is correct: such as new, edit, delete, close, return, save, import, previous page, next page, page jump, reset and other functions are correct. Common errors appear on the reset button, which is performed as a function failure.

4. String length check: Enter content that exceeds the length of the string as indicated by the requirement to see if the system checks the string length. Also check that the required string lengths are correct and sometimes appear, and that the required string length is too short to enter business data.

5. Character type checking: Enter other types of content where the content of the specified type should be entered (for example, enter other character types where you should enter an integer type) to see if the system checks for character types.

6. Punctuation check: The input includes various punctuation marks, especially spaces, various quotes, and enter. See if the system is working correctly. The common mistake is the system to the space processing, may add, when the space as a character, and when the query space is masked, resulting in the inability to query to add content.

7. Special character check: Enter special symbols such as @, #, $,%,! etc. to see if the system is working correctly. Common errors are appearing in% ' \ These several special characters

8. Chinese characters processing: In the system can be entered in the English language, to see whether there will be garbled or error.

9. Check the integrity of the information: when viewing the information and updating the information, check that the information you have filled in is not all updated, and that the update information and the added information are consistent. Note that each field should be checked when checking, and sometimes some fields are updated and the individual fields are not updated.

10. Information duplication: In some need to name, and the name should be the only information to enter a duplicate name or ID, see if the system has been processed, will be error, the name includes whether it is case-sensitive, and the input before and after the input space, the system to make the correct processing.

11. Check the deletion function: In some places can delete more than one message at a time, do not select any information, press "delete" to see how the system processing, will be wrong; then select one and more information, to delete, to see if the correct processing. If there are multiple pages, turn the page, to see if the system is correctly deleted, and to note that when the deletion of the prompt, so that users can correct the error, not mistakenly deleted.

12. Check that additions and modifications are consistent: Check that the requirements for adding and modifying information are consistent, such as adding required items, modifications should also be required, adding items that are defined as integral types, and modifications must be integral.

13. Check the name of the change: The changes can not duplicate the name of the item to the existing content, to see whether the processing, error. At the same time, also pay attention to, will be reported and their name of the wrong.

14. Repeat the form: A record that has been successfully submitted, and then submit it back to see if the system has been processed. For Web systems, the browser can return keys or system-provided return functions.

15. Check the use of the return key multiple times: where there is a return key, return to the original page, repeat multiple times, see if there is an error.

16. Search check: There is a search function where the input system exists and does not exist, to see whether the search results are correct. If you can enter more than one search condition, you can add reasonable and unreasonable conditions at the same time, to see if the system processing is correct, when searching the same attention to special characters, some systems will enter special characters, All the information in the system is searched.

17. Enter the information location: note When you enter information where the cursor is resting, the cursor and the information you enter will be skipped elsewhere.

18. Upload the download file check: Upload the download file function is implemented, upload file can open. What is the format of the uploaded file, whether the system has the explanation information, and check whether the system can do it. The download file can be opened or saved, whether the downloaded file has formatting requirements, such as the need for special tools to open and so on. Upload the file test should also be tested, if you can not upload the file suffix is modified to upload the file suffix, to see if it can be uploaded successfully, and, after uploading the file, re-modify to see if the uploaded file exists.

19. Required fields check: Should fill in the items are not filled out when the system has been processed, the required fields are prompted for information, such as the required fields before adding "*"; if the required fields are returned, the focus will be automatically positioned to the required fields.

20. Shortcut key check: whether to support common shortcut keys, such as CTRL + C, CTRL + V, BACKSPACE, etc., for some fields that do not allow input information, such as the selection of people, the choice of the date of the shortcut is also limited.

21. Enter Check: Press ENTER after the end of the input to see how the system processing, will be error. There is a good chance that there will be an error in this place.

22. Refresh key check: In the Web system, using the browser's refresh key to see how the system processing, will be error.

23. Fallback key check: In the Web system, using the browser fallback key to see how the system processing, will be error. For systems that require user authentication, after exiting the login, use the fallback key to see how the system handles it, use the fallback key multiple times, and use the forward key multiple times to see how the system is handled.

24. Direct URL link check: In the Web system, directly enter the URL address of each function page, see how the System processing, for the user authentication system is more important. If the system security design is not good, directly enter the function page URL address, it is likely to open the page normally.

25. Space check: In the input information entry, enter a space or a string to see how the system is handled. For items that require input of an integer, Fu variable, enter a space, not a null value, or a standard input.

26. Input method Half-width full-width check: In the input information item, enter the half-width or full-width information to see how the system is handled. For items that require input-point data, enter the full-width decimal point (". "or". ", such as 4. 5); Enter full-width spaces, and so on.

27. Password check: Some of the system's encryption method uses the character ASCII code to shift the way, the processing password encryption is relatively simple, and the security is high, for the local area network system, this kind of method can play the Encrypt function completely, but at the same time, will cause some problems, That is, more than 128 of the ASCII corresponding characters can not be resolved when decrypting, try to use "uvwxyz" and some other large code value as a password, while the password as long as possible, such as 17-bit password, etc., resulting in the encrypted password after the unresolved characters.

28. User check: Any system, has a variety of different users, also has one or more administrator users, check whether each administrator can manage each other, edit, delete administrator users. At the same time, for the average user, try to delete and rebuild the user with the same name to check whether other information for that user is reproduced. Similarly, a system that provides logoff functionality, when this user is registered again, is used as a new user. And also check the user's valid date, the user who is past the effective date cannot log on to the system. An error prone situation is a non-super administrator who may be able to manage permissions on the user, and can modify the privileges of the Super Administrator.

29. System data Check: This is the most important function test, if the system data calculation is not correct, then the functional test will certainly not pass. The data check is based on different systems and different methods. For business management platforms, data is maintained correctly as business processes and state changes, and cannot be caused by a process that has garbage data or a process that loses data.

30. System recoverability check: In various ways the system paralysis, test system can be normal and rapid recovery.

31. Confirm prompt Check: The update, delete operation in the system, whether prompt the user to confirm update or delete, whether the operation can be rolled back (that is, can choose to cancel the operation), the information is accurate. Before or after the prompt, for update or delete operation, require advance prompt.

32. Data injection Check: Data injection is mainly to the database injection, by entering some special characters, such as "'", "/", "-" and so on or character combination, complete the destruction of SQL statements, resulting in system query, insert, delete operations of SQL because these characters and change the original intent. such as SELECT * FROM table where id = ' and name = ', by entering "12 '-" In the ID input box, causes the query statement to comment out the name condition, and only query id=12 records. Similarly, the operation of update and delete may result in accidental deletion of data. Of course, there are some other SQL injection methods, specific to the SQL application advanced SQL injection. doc, many programs are based on the page to control the input characters, you can try to skip the interface directly to the database to insert data, such as using JMeter, to complete the data injection check.

33. Refresh check: The real-time refresh function of WebForm control in Web system has the advantages and disadvantages in the system application, and has a great influence on the performance of the system. Detects the impact of the refresh function on the system or application during testing (white screen), checks whether the control returns to the default initial value, and checks to see if it has a significant impact on the performance of the system (such as connecting database queries every time the refresh is connected).

34. Transaction check: For transactional operations, disconnect the network or shut down the program to interrupt operations, and the transaction is rolled back.

35. Time and date check: time, date verification is required for each system, such as 2006-2-29, 2006-6-31, and other error dates, and for the management, financial class system, January with the previous year of December (similarly, the 1th quarter of each year and the 4th quarter of the previous year). In addition, for date, time format validation, such as February 28, 2006, 2006-2-28, 20060228 and so on. Date Check Also check whether the date range is in line with the actual business, whether the system will be prompted or restricted for dates that do not meet the time business

36. Multi-browser validation: As more and more browsers are appearing, user access to Web programs no longer relies solely on Microsoft Internet Explorer, but has more options: Maxthon, Firefox, Tencent traveler, etc. Consider using multiple browsers to access the system to verify the effect.

37. Installation testing: For systems with C/S architecture, Setup testing is an important aspect, installation program automation, installation options and settings (to verify that all scenarios are installed properly), installation process interruption testing, installation sequencing test (distributed system), repair installation and uninstallation tests.

38. Document testing: Mainly to the user manuals, product manuals for testing, check whether the description is correct, complete, and whether the current system version against, whether easy to understand, whether the ambiguity and so on.

39. Test data check: The fact is that the test data is more likely to be wrong than the code, so when the test results indicate that an error occurred, check the test data first before you suspect the code error.

40. Please let my machine run: In some projects, there is a morbid problem: there is no problem with the system, it can be passed on my machine. This shows that there are environment-related bugs. "Has everything been managed by the version control tool?" "," is the native development environment the same as the server environment? "," Is there a real bug here, just a random occurrence in another machine? ”。 All tests must be run on all system-required machines, otherwise the code may have problems.

41. Ajax Technology Application: Ajax has many advantages, but there are many shortcomings, if the use of advantages, to avoid shortcomings, is our new Web2.0 application of a challenge. The most direct problem of AJAX application is user experience, the effect of user experience is directly related to the use of Ajax technology. "What you do, doesn't mean that you should, you have to do it," is an important comment on Ajax technology.

42. The application of AJAX technology: Ajax uses the mechanism of asynchronous invocation to implement partial refresh of the page, the possibility of asynchronous invocation of abnormal interruption, try various methods to abort the asynchronous data call, see if there is a problem. One of the problems encountered here is the operation of the date control, which has been refreshed if the page data is large.

43. Script error: With the development of Ajax, IFRAME and other asynchronous call technology, JAVASCRĪPT technology has been paid more and more attention by developers, but there are some problems such as debugging difficulty, the possibility of incompatibility among browsers, so there may be a script error in the Web system. At the same time, the consequences of scripting errors can be large and small

Web Testing Experience Finishing

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.