SlideShare a Scribd company logo
1 of 16
Download to read offline
1
Quality Assurance
and
Testing
(2)
Lecture 17
Abdisalam Issa-Salwe
Thames Valley University
Abdisalam Issa-Salwe, Thames Valley University
2
Topic list
 Testing methods of testing
 Developing a testing strategy
Abdisalam Issa-Salwe, Thames Valley University
3
Decision table
 A decision table is a tabular
representation for conditional action.
It was developed as a design
technique for complicated decisions.
 The first half of a decision table
specifies possible combinations of
conditions; the second half arranged
below the first, specifies the actions
taken for each combination.
 The first half are guards for actions in
the second half.
Abdisalam Issa-Salwe, Thames Valley University
4
Decision table (cont...)
 This technique works well for a few,
strongly interrelated conditions and
actions. It makes information easy to
determine but sequence information is
implicit.
 Decision tables and decision trees help
us consider all the possible actions
that need be taken under a given set
of circumstances in a complete and
unambiguous fashion.
Abdisalam Issa-Salwe, Thames Valley University
5
Decision table (cont...)
 To design a decision table:
 Specify the name of the table as its
heading, and insert a reference to it
at the place in the process
description where the table applies
 List all possible conditions in the
condition stub
 List all possible actions in the action
stub
Abdisalam Issa-Salwe, Thames Valley University
6
Decision table (cont...)
 Fill in the condition entries by marking
the presence (Y) or absence (N) of the
conditions. The number of rules, that
is, entries in the right-hand side of the
table equals the number of possible
combinations of conditions.
 For every condition entry, mark with
an X an action entry opposite the
action(s) to be taken under these
circumstances.
Abdisalam Issa-Salwe, Thames Valley University
7
Decision table (cont...)
 Characteristics of decision trees
 They are easier to read than are
decision tables, but the greater
the number of conditions, the
more tedious they are to draw
up.
 They are better for checking the
completeness of the policy
represented.
Abdisalam Issa-Salwe, Thames Valley University
8
Conditions
Is it 8 o’clock yet?
Is it the weekend?
Entry
Yes
No
Actions
Get up
Stay in bed
Entry
X
Abdisalam Issa-Salwe, Thames Valley University
9
Conditions
Is it 8 o’clock yet?
Is it the weekend?
Entry
Yes
No
Actions
Get up
Stay in bed
Entry
X
Abdisalam Issa-Salwe, Thames Valley University
10
Conditions
Is it 8 o’clock yet?
Is it the weekend?
1 2 3 4
Actions
Get up
Stay in bed
Abdisalam Issa-Salwe, Thames Valley University
11
Conditions
Is it 8 o’clock yet?
Is it the weekend?
1 2 3 4
Y Y N N
Y N Y N
Actions
Get up
Stay in bed
Abdisalam Issa-Salwe, Thames Valley University
12
Conditions
Is it 8 o’clock yet?
Is it the weekend?
1 2 3 4
Y Y N N
Y N Y N
Actions
Get up
Stay in bed
X
X
X X
Abdisalam Issa-Salwe, Thames Valley University
13
Decision table (cont...)
 Advantages:
 Information is presented through a table
in an easy to modify format. Decision
table systems correspond with known
design techniques.
 Disadvantages
 Sequence information is implicit
Abdisalam Issa-Salwe, Thames Valley University
14
Developing testing strategy
 Strategy approach
 To be formulated that the details approach
that will be taken to testing, including the
tests to be conducted and the testing
tools/techniques that will be used
 Test plan:
 A test plan should be developed that
state:
 What will be tested
 When it will be tested (sequence)
 The test environment
Abdisalam Issa-Salwe, Thames Valley University
15
Limitation
 Poor testing process:
 The test plan may not cover all area of
system functionality
 Inadequate time:
 Software and systems are inevitable
produces under significant time pressure
 Future requirements not anticipated:
 The test data used may have been fine at
the time of testing, but future demands
may be outside the range of values tested
Abdisalam Issa-Salwe, Thames Valley University
16
Limitation (cont…)
 Software changes inadequate tested:
 System/software changes made as a
result of testing findings or for other
reasons may not be adequately tested as
they were not in the original test plan

More Related Content

Similar to Acca17(quality assurance&testing)

1st file (P and S).pdf
1st file (P and S).pdf1st file (P and S).pdf
1st file (P and S).pdfRanaUmairCoc8
 
Tracking the Progress of an SDL Program: Lessons from the Gym
Tracking the Progress of an SDL Program: Lessons from the GymTracking the Progress of an SDL Program: Lessons from the Gym
Tracking the Progress of an SDL Program: Lessons from the GymOWASP
 
Lecture 1 from MIT Communicating with Data Course
Lecture 1 from MIT Communicating with Data CourseLecture 1 from MIT Communicating with Data Course
Lecture 1 from MIT Communicating with Data CourseRaul Santahelena
 
Midland regional collaborative approach: An Example of enabling regional deci...
Midland regional collaborative approach: An Example of enabling regional deci...Midland regional collaborative approach: An Example of enabling regional deci...
Midland regional collaborative approach: An Example of enabling regional deci...Health Informatics New Zealand
 
Test design techniques
Test design techniquesTest design techniques
Test design techniquesTaufik hidayat
 
Specification based or black box techniques
Specification based or black box techniquesSpecification based or black box techniques
Specification based or black box techniquesIrvan Febry
 

Similar to Acca17(quality assurance&testing) (8)

Acca 11(information systemsdevelopmentprocess)
Acca 11(information systemsdevelopmentprocess)Acca 11(information systemsdevelopmentprocess)
Acca 11(information systemsdevelopmentprocess)
 
1st file (P and S).pdf
1st file (P and S).pdf1st file (P and S).pdf
1st file (P and S).pdf
 
Tracking the Progress of an SDL Program: Lessons from the Gym
Tracking the Progress of an SDL Program: Lessons from the GymTracking the Progress of an SDL Program: Lessons from the Gym
Tracking the Progress of an SDL Program: Lessons from the Gym
 
Lecture 1 from MIT Communicating with Data Course
Lecture 1 from MIT Communicating with Data CourseLecture 1 from MIT Communicating with Data Course
Lecture 1 from MIT Communicating with Data Course
 
Midland regional collaborative approach: An Example of enabling regional deci...
Midland regional collaborative approach: An Example of enabling regional deci...Midland regional collaborative approach: An Example of enabling regional deci...
Midland regional collaborative approach: An Example of enabling regional deci...
 
07 rules-and-cases
07 rules-and-cases07 rules-and-cases
07 rules-and-cases
 
Test design techniques
Test design techniquesTest design techniques
Test design techniques
 
Specification based or black box techniques
Specification based or black box techniquesSpecification based or black box techniques
Specification based or black box techniques
 

More from Taibah University, College of Computer Science & Engineering

More from Taibah University, College of Computer Science & Engineering (20)

Lecture 1- Computer Organization and Architecture.pdf
Lecture 1- Computer Organization and Architecture.pdfLecture 1- Computer Organization and Architecture.pdf
Lecture 1- Computer Organization and Architecture.pdf
 
The paper the welfare state of the somali nation - a possible solution to t...
The paper   the welfare state of the somali nation - a possible solution to t...The paper   the welfare state of the somali nation - a possible solution to t...
The paper the welfare state of the somali nation - a possible solution to t...
 
Colonial intrusion and_the_somali_resistance
Colonial intrusion and_the_somali_resistanceColonial intrusion and_the_somali_resistance
Colonial intrusion and_the_somali_resistance
 
Lecture 3 (Contemporary approaches to Information Systems)
Lecture 3 (Contemporary approaches to Information Systems)Lecture 3 (Contemporary approaches to Information Systems)
Lecture 3 (Contemporary approaches to Information Systems)
 
Lecture 7 (business-level strategy and the value chain model)
Lecture 7  (business-level strategy and the value chain model)Lecture 7  (business-level strategy and the value chain model)
Lecture 7 (business-level strategy and the value chain model)
 
Lecture 4 (using information technology for competitive advantage)
Lecture 4 (using information technology for competitive advantage)Lecture 4 (using information technology for competitive advantage)
Lecture 4 (using information technology for competitive advantage)
 
Lecture 2 (major types of information systems in organizations)
Lecture 2 (major types of information systems in organizations)Lecture 2 (major types of information systems in organizations)
Lecture 2 (major types of information systems in organizations)
 
Practical session 1 (critical path analaysis)
Practical session 1 (critical path analaysis)Practical session 1 (critical path analaysis)
Practical session 1 (critical path analaysis)
 
Chapter 2 modeling the process and life-cycle
Chapter 2  modeling the process and life-cycleChapter 2  modeling the process and life-cycle
Chapter 2 modeling the process and life-cycle
 
Historical Perspective on the Challenge Facing the Somali Sacral Unity
Historical Perspective on the Challenge Facing the Somali Sacral UnityHistorical Perspective on the Challenge Facing the Somali Sacral Unity
Historical Perspective on the Challenge Facing the Somali Sacral Unity
 
Colonial intrusion and the Somali Resistance
Colonial intrusion and the Somali ResistanceColonial intrusion and the Somali Resistance
Colonial intrusion and the Somali Resistance
 
Lecture 8 (information systems and strategy planning)
Lecture 8  (information systems and strategy planning)Lecture 8  (information systems and strategy planning)
Lecture 8 (information systems and strategy planning)
 
Lecture 4 (using information technology for competitive advantage)
Lecture 4 (using information technology for competitive advantage)Lecture 4 (using information technology for competitive advantage)
Lecture 4 (using information technology for competitive advantage)
 
Lecture1 data structure(introduction)
Lecture1 data structure(introduction)Lecture1 data structure(introduction)
Lecture1 data structure(introduction)
 
Lecture2 is331 data&infomanag(databaseenv)
Lecture2 is331 data&infomanag(databaseenv)Lecture2 is331 data&infomanag(databaseenv)
Lecture2 is331 data&infomanag(databaseenv)
 
Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)Lecture1 is322 data&infomanag(introduction)(old curr)
Lecture1 is322 data&infomanag(introduction)(old curr)
 
Lecture6 is353(ea&data viewpoint )
Lecture6 is353(ea&data viewpoint )Lecture6 is353(ea&data viewpoint )
Lecture6 is353(ea&data viewpoint )
 
Lecture4 is353-ea(fea)
Lecture4 is353-ea(fea)Lecture4 is353-ea(fea)
Lecture4 is353-ea(fea)
 
Lecture3 is353-ea(togaf)
Lecture3 is353-ea(togaf)Lecture3 is353-ea(togaf)
Lecture3 is353-ea(togaf)
 
Lecture2 is353-ea(the zachma framework)
Lecture2 is353-ea(the zachma framework)Lecture2 is353-ea(the zachma framework)
Lecture2 is353-ea(the zachma framework)
 

Recently uploaded

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 

Recently uploaded (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

Acca17(quality assurance&testing)

  • 1. 1 Quality Assurance and Testing (2) Lecture 17 Abdisalam Issa-Salwe Thames Valley University
  • 2. Abdisalam Issa-Salwe, Thames Valley University 2 Topic list  Testing methods of testing  Developing a testing strategy
  • 3. Abdisalam Issa-Salwe, Thames Valley University 3 Decision table  A decision table is a tabular representation for conditional action. It was developed as a design technique for complicated decisions.  The first half of a decision table specifies possible combinations of conditions; the second half arranged below the first, specifies the actions taken for each combination.  The first half are guards for actions in the second half.
  • 4. Abdisalam Issa-Salwe, Thames Valley University 4 Decision table (cont...)  This technique works well for a few, strongly interrelated conditions and actions. It makes information easy to determine but sequence information is implicit.  Decision tables and decision trees help us consider all the possible actions that need be taken under a given set of circumstances in a complete and unambiguous fashion.
  • 5. Abdisalam Issa-Salwe, Thames Valley University 5 Decision table (cont...)  To design a decision table:  Specify the name of the table as its heading, and insert a reference to it at the place in the process description where the table applies  List all possible conditions in the condition stub  List all possible actions in the action stub
  • 6. Abdisalam Issa-Salwe, Thames Valley University 6 Decision table (cont...)  Fill in the condition entries by marking the presence (Y) or absence (N) of the conditions. The number of rules, that is, entries in the right-hand side of the table equals the number of possible combinations of conditions.  For every condition entry, mark with an X an action entry opposite the action(s) to be taken under these circumstances.
  • 7. Abdisalam Issa-Salwe, Thames Valley University 7 Decision table (cont...)  Characteristics of decision trees  They are easier to read than are decision tables, but the greater the number of conditions, the more tedious they are to draw up.  They are better for checking the completeness of the policy represented.
  • 8. Abdisalam Issa-Salwe, Thames Valley University 8 Conditions Is it 8 o’clock yet? Is it the weekend? Entry Yes No Actions Get up Stay in bed Entry X
  • 9. Abdisalam Issa-Salwe, Thames Valley University 9 Conditions Is it 8 o’clock yet? Is it the weekend? Entry Yes No Actions Get up Stay in bed Entry X
  • 10. Abdisalam Issa-Salwe, Thames Valley University 10 Conditions Is it 8 o’clock yet? Is it the weekend? 1 2 3 4 Actions Get up Stay in bed
  • 11. Abdisalam Issa-Salwe, Thames Valley University 11 Conditions Is it 8 o’clock yet? Is it the weekend? 1 2 3 4 Y Y N N Y N Y N Actions Get up Stay in bed
  • 12. Abdisalam Issa-Salwe, Thames Valley University 12 Conditions Is it 8 o’clock yet? Is it the weekend? 1 2 3 4 Y Y N N Y N Y N Actions Get up Stay in bed X X X X
  • 13. Abdisalam Issa-Salwe, Thames Valley University 13 Decision table (cont...)  Advantages:  Information is presented through a table in an easy to modify format. Decision table systems correspond with known design techniques.  Disadvantages  Sequence information is implicit
  • 14. Abdisalam Issa-Salwe, Thames Valley University 14 Developing testing strategy  Strategy approach  To be formulated that the details approach that will be taken to testing, including the tests to be conducted and the testing tools/techniques that will be used  Test plan:  A test plan should be developed that state:  What will be tested  When it will be tested (sequence)  The test environment
  • 15. Abdisalam Issa-Salwe, Thames Valley University 15 Limitation  Poor testing process:  The test plan may not cover all area of system functionality  Inadequate time:  Software and systems are inevitable produces under significant time pressure  Future requirements not anticipated:  The test data used may have been fine at the time of testing, but future demands may be outside the range of values tested
  • 16. Abdisalam Issa-Salwe, Thames Valley University 16 Limitation (cont…)  Software changes inadequate tested:  System/software changes made as a result of testing findings or for other reasons may not be adequately tested as they were not in the original test plan