Advanced Search
Search Results
60 total results found
Branch testing with Chat GPT
You can use any other Chat Bot. If you do so, change the page title. Task 1 (student 1) Using a Chat Bot identify branches for the insertSort function. Assign a tag to for each identified branch. Present the list of branches with tags. Write the prompt and...
Description of the method
Decision testing belongs to the family of logical coverages, as it's concerned with the values of logical predicates in deciding instructions. The other name for the technique comes from there: predicate coverage. A decision is simply a logical statement that ...
Example - Regula Falsi method
Task 1 The Regula Falsi method is a numerical technique for finding zeros of a continuous function on a given interval. It combines the advantages of the bisection method and the secant method, offering both convergence and the use of information about the s...
Test conditions and coverage items
Sections [krok1] [krok2] [krok3] of the section 9.3.3 from the Textbook Step 1. Identifying the subject and test elements. We have one test element – the Bisection function. ET1: Bisection Step 2. Deriving test conditions. Test conditions are basic ...
Test cases
Defining Test Cases.There are three independent exit points from the module (at B2, B5, and B11), so at least three test cases are needed.When configuring the test environment, we should specify a concrete form of the function f(x), since its values affect the...
Decision testing with MS Copilot
Task 1 (student 1) Using MS Copilot identify statements for the RegulaFalsi function. Assign a tag to for each identified statement. Present the list of statements with tags. Write the prompt and the chatbot answer. Discuss the result. Does it properly ...
Decision testing with Chat GPT
You can use any other Chat Bot. If you do so, change the page title. Task 1 (student 1) Using a Chat Bot identify statements for the RegulaFalsi function. Assign a tag to for each identified statement. Present the list of statements with tags. Write the...
Preface
The book presents examples of specification and analysis of information systems. The authors focused on practical issues. The chapters of the book contain a sequence of tasks that form the stage of analysis of functions and data of an example information syste...
Authors
Authors of individual sections of the USOS mail chapter: Section Author Specification Michał Rydzik Identification of user roles and system functions Robert Dec Identification of data structures Maciej Krempa The CRUD matrix J...
Specification
Figure 1. Sketch of an email application window Let's consider the example of an email application. Figure 1 presents the menu of the application and a sketch of the New Message window function. The user stories corresponding to the menu are as follows: ...
Identification of user roles and system functions
1.User roles:-User2.System functions:-Create a message-Send a message-Add new recipients to messages-Attach files to messages-Delete drafts-Save drafts-View recipients addresses-View sended messages-View groups of recipients-View all my drafts
Identification of data structures
user #ID_user PK int *name varchar *surname varchar *email_adress varchar *User_type FK int Message #ID_email PK int ...
The CRUD matrix
User Messages Drafts File Create a message CU CU Send a message U U Add new recipients to messages R U U Attach files to messages U U R Delete drafts D Save drafts U View reci...
The function hierarchy
Incomplete hierachy of functions: create a message add new recipients to messages attach file delete draft save draft send a message view recipient addresses view sent messages view groups of recipients view all my drafts Complete ...
Entity Relationship Diagram
Based on the Identification of data structures, the following non-normalized ERD diagram was proposed:
ERD normalization
Use Case Diagrams
Use Cases Scenarios
Use case scenarios: Add Recipients main flow (main scenario) The user clicks the "Add recipients" button. The system opens the "Select recipients" dialog window. By default, the "Individual recipients" tab is active. The user enters ...
Estimating the workload of system implementation
Completeness of the system
User Messages Drafts File Create new user C Update user informations U Delete user accout D Create a message CU CU Create file C Delete file D Change existing file U...