ComputerScienceExpert

(11)

$18/per page/

About ComputerScienceExpert

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Applied Sciences,Calculus See all
Applied Sciences,Calculus,Chemistry,Computer Science,Environmental science,Information Systems,Science Hide all
Teaching Since: Apr 2017
Last Sign in: 10 Weeks Ago
Questions Answered: 4870
Tutorials Posted: 4863

Education

  • MBA IT, Mater in Science and Technology
    Devry
    Jul-1996 - Jul-2000

Experience

  • Professor
    Devry University
    Mar-2010 - Oct-2016

Category > Programming Posted 23 May 2017 My Price 11.00

SIT707 Software Quality and Testing

hii..i am just wonedring how to solve this assignment

 

SIT707 Software Quality and Testing Assignment 1Trimester 2, 2016Objectives•To understand the critical issues in black box testing.•To demonstrate the ability to research and apply proper techniques to address a given bug.•To write a proper essay for a specific topic and presenting / arguing the findings.Due Date: 4pm, Monday, August 8, 2016The assignment consists of the following parts (20 marks in total):•Test report file in PDF format including screenshots of executing test cases on Selenium.•A ZIP file containing all source codes with comments.Delays caused by student’s own computer downtime cannot be accepted as a valid reason for latesubmission without penalty. Students must plan their work to allow for both scheduled and unscheduleddowntime.Submission details: You must submit an electronic copy of all your assignment files via CloudDeakin.You must include both your report and presentation file. Assignments will not be accepted throughany other manner. Students should note that this means that email and paper based submissions willordinarily be rejected.Late submissions: Submissions received after the due date are penalised at a rate of 10% (out of thefull mark) per day, no exceptions. Late submission after 3 days would be penalised at a rate of 100% outof the full mark. Close of submissions on the due date and each day thereafter for penalties will occurat 05:00 pm Australian Eastern Time (UTC +10 hours). Students outside of Victoria should note thatthe normal time zone in Victoria is UTC+10 hours. No extension will be granted.It is the student’s responsibility to ensure that they understand the submission instructions. If youhave ANY difficulties ask the Lecturer/Tutor for assistance (prior to the submission date).Copying, Plagiarism NoticeThis is an individual assignment. You are not permitted to work as a part of a group when writingthis assignment. Plagiarism is the submission of somebody else’s work in a manner that gives theimpression that the work is your own. For individual assignments, plagiarism includes the case wheretwo or more students work collaboratively on the assignment. The School of Information Technologytreats plagiarism very seriously. When it is detected, penalties are strictly imposed. The University’spolicy on plagiarism can be viewed online athttp://www.deakin.edu.au/students/study-support/referencing/plagiarism1

Problem StatementSelenium is an automation testing framework widely used by the industry. You are required to demon-strate your ability of correctly using this tool to perform black box testing on the following web applica-tion.You are required to test a user registration web application. The web application consists of twoPHP pages —signup.phpdisplaying the html controls and two buttons associated with a web form andsignup-process.phpdisplaying the results after the web form data are submitted. The web applicationuser is supposed to supply with a genuine email address as username, fill in the nominated passwordtwice, type in first and last names, provide date of birth and gender information. All of the input fields aremandatory. This web application is developed in PHP with an Oracle database. Legitimate registrationinformation will be then inserted into a database table. The developer claims that this web applicationworks correctly. It is your tasks to generate test cases, execute them, identify bugs, and recommendbug fixes. The web application is available online athttp://www.deakin.edu.au/~zoidberg/SIT707/signup.phpUpon satisfactory completion of this assignment you will be able to conduct basic level research insoftware engineering, analyze gathered information, and communicate your findings. To demonstrateyour achievement of these goals, you must write a 3,000 word report regarding this vulnerability.Your report should consist of the following chapters:1. A proper title which matches the contents of your report.2. Your name and Deakin student number in the author line.3. An executive summary which summarizes your findings. (You may find hints on writing goodexecutive summaries fromhttp://unilearning.uow.edu.au/report/4bi1.html.)4. An introduction chapter which explains Selenium, web application testing, black box testing, andthe organization of the rest of your report.5. A literature review chapter which surveys the latest academic papers regarding web applicationtesting and Selenium which include (at a minimum) all papers listed below. You are advised toidentify and include more papers published by ACM and IEEE journals or conference proceedings.Your review must not simply be a summary of each paper, but rather a deep analysis of the bodyof work reported in the set of paper. Your aim in this part of the report is to demonstrate deep andthorough understanding of the existing body of knowledge encompassing web application testing.(Please read through the hints on this web page before writing this chapterhttp://www.uq.edu.au/student-services/learning/literature-review.)6. A test case chapter which lists your test cases and explains why you would use each of them.7. A test demonstration chapter which consists of fully explained screenshots when you use Seleniumto conduct the testing tasks. You are required to register 100 users and document your findings.8. A bug reporting solution chapter which outlines the identified bugs at the three levels (user interface,data model and database storage, and logic of web controllers), your proposal to fix the bugs andyour justifications on the priorities of bug fixes. You may extend your answers into the securityaspect.9. A conclusions chapter which summarizes major findings of the study and indicates future workwhich should be conducted in the area.10. A bibliography list of all cited papers and other resources. You must use in-text citations inHarvard style and each citation must correspond to a bibliography entry. There must be nobibliography entries that are not cited in the report. (You should know the contents from this pagehttp://www.deakin.edu.au/students/study-support/referencing/harvard.)2

A Minimal List of Papers•I. Altaf, J.A. Dar, F.u. Rashid and M. Rafiq, “Survey on selenium tool in software testing,” GreenComputing and Internet of Things (ICGCIoT), 2015 International Conference on, Noida, 2015,pp. 1378–1383.•A. Holmes and M. Kellogg, “Automating functional tests using Selenium,” AGILE 2006 (AG-ILE’06), Minneapolis, MN, 2006.•A.M.F.V. de Castro, G.A. Macedo, E.F. Collins and A.C. Dias-Neto, “Extension of Selenium RCtool to perform automated testing with databases in web applications,” Automation of SoftwareTest (AST), 2013 8th International Workshop on, San Francisco, CA, 2013, pp. 125–131.•Radu Banabic and George Candea. 2012. “Fast black-box testing of system recovery code.” InProceedings of the 7th ACM european conference on Computer Systems (EuroSys ’12). ACM,New York, NY, USA, pp. 281–294.•E. Murphy-Hill, T. Zimmermann, C. Bird and N. Nagappan, “The Design Space of Bug Fixesand How Developers Navigate It,” in IEEE Transactions on Software Engineering, vol. 41, no. 1,pp. 65–81, Jan. 1 2015.•D. Xu, W. Xu, B.K. Bavikati and W.E. Wong, “Mining Executable Specifications of Web Appli-cations from Selenium IDE Tests,” Software Security and Reliability (SERE), 2012 IEEE SixthInternational Conference on, Gaithersburg, MD, 2012, pp. 263–272.•J. Bau, E. Bursztein, D. Gupta and J. Mitchell, “State of the Art: Automated Black-Box WebApplication Vulnerability Testing,” 2010 IEEE Symposium on Security and Privacy, Oakland, CA,USA, 2010, pp. 332–345.•A. Leff and J.T. Rayfield, “Web-application development using the Model/View/Controller designpattern,” Enterprise Distributed Object Computing Conference, 2001. EDOC’01. Proceedings.Fifth IEEE International, Seattle, WA, 2001, pp. 118-127.3

FacetsProficient (above 80%)Average (60-79%)Satisfactory (50-59%)Below Expectation (0-50%)ScoreLiteratureReviewCollectandrecordself-determinedinformationfromself-selectedsources,choosing or devising an ap-propriatemethodologywithself-structuredguidelines;Organizeinformationusingstudent-determinedstruc-turesandmanagementofprocesses;Generateques-tions/aims/hypothesesbasedon literatureCollectandrecordself-determined information/ datafromself-selectedsources,choosinganappropriatemethodologybasedonstructuredguidelines;Or-ganize information/data usingstudent-determined structures,andmanagetheprocesses,withintheparameterssetby the guidelines;Generatequestions/aims/hypothesesframedwithinstructuredguidelinesCollectandrecordrequiredinformation/datafromself-selected sources using one ofseveralprescribedmethod-ologies;Organizeinforma-tion/data using recommendedstructures.Manageself-determinedprocesseswithmultiplepossiblepathways;Respondtoquestions/tasksgeneratedfromaclosedinquiry.Fail to collect required infor-mation or data from the pre-scribedsource;Failtoor-ganize information/data usingprescribed structure; Fail to re-spond to questions/tasks aris-ing explicitly from a closed in-quiryoutof4marksEvaluationandRe-flectioninTestCases andResultsEvaluateinformation/dataand inquiry process rigorouslybased on the latest literature.Reflect insightfully to renewothers’ processes.Evaluate information/data andthe inquiry process compre-hensively developed within thescope of the given literature.Reflect insightfully to refineothers’ processes.Evaluate information/data andreflect on the inquiry processbased on the given literature.Failtoevaluateinforma-tion/data and to reflect oninquiry process.outof6marksAnalysisin TestingDemon-strationand BugsAnalyzeandcreateinfor-mation/data to fill student-identifiedgapsorextendknowledge.Analyze and create informa-tion/datatofillknowledgegaps stated by others.Analyze and synthesize infor-mation/data to reorganize ex-isting knowledge in standardformats. That is, ask relevant,researchable questions emerg-ing from the research.Fail to analyze and to synthe-size information/data to repro-duce existing knowledge in pre-scribed formats.outof6marksScientificwriting inExecutiveSummary,Introduc-tion,andConclu-sionsUse appropriate language andgenre to extend the knowledgeof a range of audiences.Use discipline-specific languageand genres to address gaps ofa self-selected audience. Applyinnovatively the knowledge de-veloped to a different context.Usesomediscipline-specificlanguage and prescribed genreto demonstrate understandingfrom a stated perspective andfor a specified audience. Applyto different contexts the knowl-edge developed.Failtodemonstrateunder-standing for lecturer/teacheras audience. Fail to apply to asimilar context the knowledgedeveloped.outof2marksReferenceMorethan20bibliographicitems (all of them are academicpapers) are correctly presentedand inline citations are cor-rectly used.Morethan20bibliographicitems (most of them are aca-demic papers) are presented,but there are a few errors. In-line citations are used but witha few errors.Morethan10bibliographicitems (most of them are aca-demic papers and all given pa-pers are presented) are pre-sented. Inline citations are of-ten used incorrectly.Lessthan10bibliographicitems (some provided papersaremissing)arepresented.There are more than 7 errorsin the bibliographic list and in-line citations.outof2marksTable 1: SIT707 Assignment 1 Rubrics4

Attachments:

Answers

(11)
Status NEW Posted 23 May 2017 06:05 AM My Price 11.00

-----------

Attachments

file 1495519982-Solutions file 2.docx preview (51 words )
H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly -----------onl-----------ine----------- an-----------d g-----------ive----------- yo-----------u e-----------xac-----------t f-----------ile----------- an-----------d t-----------he -----------sam-----------e f-----------ile----------- is----------- al-----------so -----------sen-----------t t-----------o y-----------our----------- em-----------ail----------- th-----------at -----------is -----------reg-----------ist-----------ere-----------d o-----------n -----------THI-----------S W-----------EBS-----------ITE-----------. ----------- Th-----------ank----------- yo-----------u -----------
Not Rated(0)