Monday 19 August 2013

SQL SELECT Statement:

SQL SELECT Statement:

Syntax:

 SELECT  column1, column2....columnN
 FROM   table_name
SELECT:   Identify what columns 
FROM   :   Identify which table

Examples  :1.   Select * from Employee  ; It will Display all Details from Employee Table.
                 2 .  Select * from Department ; It will Display all Details from Department Table.
                 3.   Select * from Table ;  List all the Table .

SQL DISTINCT Clause:

We should use DISTINCT to select only Unique value from Table.

Syntax:

SELECT DISTINCT column1, column2....columnN
FROM   table_name;

Examples : 1 : Select DISTINCT Department number from  Employee ;

SQL WHERE Clause:

WHERE is Used for Restricting the Record to be Displayed .

Syntax:

SELECT column1, column2....columnN
FROM   table_name
WHERE  CONDITION;

Examples :
 1.  Select * from Employee WHERE   Department number =10 ;  It will Display all employee Details  only from Department number =10.
2.  Select Employee Name, Salary WHERE Job =' MANAGER' ; ( Here  MANAGER is case sensitive)
3.   Select * from Employee Where Hire Date = '03-Dec-2012' ;


Saturday 17 August 2013

SQL - RDBMS Databases

 RDBMS Databases

There are many popular RDBMS available to work with. This tutorial gives a brief overview of few most popular RDBMS. This would help you to compare their basic features:

MySQL

MySQL is open source SQL database, which is developed by Swedish company MySQL AB. MySQL is pronounced "my ess-que-ell," in contrast with SQL, pronounced "sequel."
MySQL is supporting many different platforms including Microsoft Windows, the major Linux distributions, UNIX, and Mac OS X.
MySQL has free and paid versions, depending on its usage (non-commercial/commercial) and features. MySQL comes with a very fast, multi-threaded, multi-user, and robust SQL database server.
History:
  • Development of MySQL by Michael Widenius & David Axmark beginning in 1994.
  • First internal release on 23 May 1995.
  • Windows version was released on 8 January 1998 for Windows 95 and NT.
  • Version 3.23: beta from June 2000, production release January 2001.
  • Version 4.0: beta from August 2002, production release March 2003 (unions).
  • Version 4.01: beta from August 2003, Jyoti adopts MySQL for database tracking.
  • Version 4.1: beta from June 2004, production release October 2004.
  • Version 5.0: beta from March 2005, production release October 2005.
  • Sun Microsystems acquired MySQL AB on 26 February 2008.
  • Version 5.1: production release 27 November 2008.
Features:
  • High Performance.
  • High Availability.
  • Scalability and Flexibility Run anything.
  • Robust Transactional Support.
  • Web and Data Warehouse Strengths.
  • Strong Data Protection.
  • Comprehensive Application Development.
  • Management Ease.
  • Open Source Freedom and 24 x 7 Support.
  • Lowest Total Cost of Ownership.
MS SQL Server

MS SQL Server is a Relational Database Management System developed by Microsoft Inc. Its primary query languages are:
  • T-SQL.
  • ANSI SQL.
History:
  • 1987 - Sybase releases SQL Server for UNIX.
  • 1988 - Microsoft, Sybase, and Aston-Tate port SQL Server to OS/2.
  • 1989 - Microsoft, Sybase, and Aston-Tate release SQL Server 1.0 for OS/2.
  • 1990 - SQL Server 1.1 is released with support for Windows 3.0 clients.
  • Aston-Tate drops out of SQL Server development.
  • 2000 - Microsoft releases SQL Server 2000.
  • 2001 - Microsoft releases XML for SQL Server Web Release 1 (download).
  • 2002 - Microsoft releases SQLXML 2.0 (renamed from XML for SQL Server).
  • 2002 - Microsoft releases SQLXML 3.0.
  • 2005 - Microsoft releases SQL Server 2005 on November 7th, 2005.
Features:
  • High Performance.
  • High Availability.
  • Database mirroring.
  • Database snapshots.
  • CLR integration.
  • Service Broker.
  • DDL triggers.
  • Ranking functions.
  • Row version-based isolation levels.
  • XML integration.
  • TRY...CATCH.
  • Database Mail.
ORACLE

It is very large and multi-user database management system. Oracle is a relational database management system developed by 'Oracle Corporation'.
Oracle works to efficiently manage its resource, a database of information, among the multiple clients requesting and sending data in the network.
It is an excellent database server choice for client/server computing. Oracle supports all major operating systems for both clients and servers, including MSDOS, NetWare, UnixWare, OS/2 and most UNIX flavors.
History:
Oracle began in 1977 and celebrating its 32 wonderful years in the industry (from 1977 to 2009).
  • 1977 - Larry Ellison, Bob Miner and Ed Oates founded Software Development Laboratories to undertake development work.
  • 1979 - Version 2.0 of Oracle was released and it became first commercial relational database and first SQL database. The company changed its name to Relational Software Inc. (RSI).
  • 1981 - RSI started developing tools for Oracle.
  • 1982 - RSI was renamed to Oracle Corporation.
  • 1983 - Oracle released version 3.0, rewritten in C language and ran on multiple platforms.
  • 1984 - Oracle version 4.0 was released. It contained features like concurrency control - multi-version read consistency etc.
  • 1985 - Oracle version 4.0 was released. It contained features like concurrency control - multi-version read consistency etc.
  • 2007 - Oracle has released Oracle11g. The new version focused on better partitioning, easy migration etc.
Features:
  • Concurrency
  • Concurrency
  • Read Consistency
  • Locking Mechanisms
  • Quiesce Database
  • Portability
  • Self managing database
  • SQL*Plus
  • ASM
  • Scheduler
  • Resource Manager
  • Data Warehousing
  • Materialized views
  • Bitmap indexes
  • Table compression
  • Parallel Execution
  • Analytic SQL
  • Data mining
  • Partitioning
MS- ACCESS

This is one of the most popular Microsoft products. Microsoft Access is entry-level database management software. MS Access database is not only an inexpensive but also powerful database for small-scale projects.
MS Access uses the Jet database engine which utilizes a specific SQL language dialect (sometimes referred to as Jet SQL).
MS Access comes with the professional edition of MS Office package. MS Access has easy to use intuitive graphical interface.
History:
  • 1992 - Access version 1.0 was released.
  • 1993 - Access 1.1 release to improve compatibility with include the Access Basic programming language.
  • The most significant transition was from the Access 97 to the Access 2000
  • 2007 - Access 2007, a new database format was introduced ACCDB which supports complex data types such as multi valued and attachment fields.
Features:

  • Users can create tables, queries, forms and reports, and connect them together with macros.
  • The import and export of data to many formats including Excel, Outlook, ASCII, dBase, Paradox, FoxPro, SQL Server, Oracle, ODBC, etc.
  • There is also the Jet Database format (MDB or ACCDB in Access 2007) which can contain the application and data in one file. This makes it very convenient to distribute the entire application to another user, who can run it in disconnected environments.
  • Microsoft Access offers parameterized queries. These queries and Access tables can be referenced from other programs like VB6 and .NET through DAO or ADO.
  • The desktop editions of Microsoft SQL Server can be used with Access as an alternative to the Jet Database Engine.
  • Microsoft Access is a file server-based database. Unlike client-server relational database management systems (RDBMS), Microsoft Access does not implement database triggers, stored procedures, or transaction logging.
Part time job available HERE  

SQL - RDBMS Concepts

What is RDBMS?

RDBMS stands for Relational Database Management System. RDBMS is the basis for SQL, and for all modern database systems like MS SQL Server, IBM DB2, Oracle, MySQL, and Microsoft Access.
A Relational database management system (RDBMS) is a database management system (DBMS) that is based on the relational model as introduced by E. F. Codd.

What is table ?

The data in RDBMS is stored in database objects called tables. The table is a collection of related data entries and it consists of columns and rows.
Remember, a table is the most common and simplest form of data storage in a relational database.


What is field?

Every table is broken up into smaller entities called fields. 
A field is a column in a table that is designed to maintain specific information about every record in the table.

What is record, or row?

A record, also called a row of data, is each individual entry that exists in a table.
A record is a horizontal entity in a table.


What is column?

A column is a vertical entity in a table that contains all information associated with a specific field in a table.


What is NULL value?

A NULL value in a table is a value in a field that appears to be blank which means A field with a NULL value is a field with no value.
It is very important to understand that a NULL value is different than a zero value or a field that contains spaces. A field with a NULL value is one that has been left blank during record creation.

SQL Constraints:

Constraints are the rules enforced on data columns on table. These are used to limit the type of data that can go into a table. This ensures the accuracy and reliability of the data in the database.
Contraints could be column level or table level. Column level constraints are applied only to one column where as table level constraints are applied to the whole table.
Following are commonly used constraints available in SQL:
  • NOT NULL Constraint : Ensures that a column cannot have NULL value.This Ensure that at least some value should be present for an attribute . Can have more then one NOT NULL constraints on a table
  • DEFAULT Constraint : Provides a default value for a column when none is specified.
  • UNIQUE Constraint: Ensures that all values in a column are different.It check for Duplicate values.A UNIQUE column can have multiple null value .
  • PRIMARY Key: Uniquely identified each rows/records in a database table.It is used for identifying a record uniquely. It is combination of NOT NULL and UNIQUE.                                                        a) CANDIDATE KEYS : The columns that are eligible to become PK are called candidate keys.   b)  ALTERNATE KEY: A column which is   eligible to become PK but not chosen as PK is called Alternate key.                                                                                                                                  c) COMPOSITE PK: When PK is created out of more then one column then is called composite. 
  • FOREIGN Key: Uniquely identified a rows/records in any another database table.foreign key is always created on the child tables.
  • CHECK Constraint: The CHECK constraint ensures that all values in a column satisfy certain conditions.
  • INDEX: Use to create and retrieve data from the database very quickly.
Data Integrity:

The following categories of the data integrity exist with each RDBMS:
  • Entity Integrity : There are no duplicate rows in a table.
  • Domain Integrity : Enforces valid entries for a given column by restricting the type, the format, or the range of values.
  • Referential integrity : Rows cannot be deleted, which are used by other records.
  • User-Defined Integrity : Enforces some specific business rules that do not fall into entity, domain, or referential integrity.
Database Normalization

Database normalization is the process of efficiently organizing data in a database. There are two reasons of the normalization process:
  1. Eliminating redundant data, for example, storing the same data in more than one tables.
  2. Ensuring data dependencies make sense.
Both of these are worthy goals as they reduce the amount of space a database consumes and ensure that data is logically stored. Normalization consists of a series of guidelines that help guide you in creating a good database structure.
Normalization guidelines are divided into normal forms; think of form as the format or the way a database structure is laid out. The aim of normal forms is to organize the database structure so that it complies with the rules of first normal form, then second normal form, and finally third normal form.
It's your choice to take it further and go to fourth normal form, fifth normal form, and so on, but generally speaking, third normal form is enough.
  1. First Normal Form (1NF)
  2. Second Normal Form (2NF)
  3. Third Normal Form (3NF)

SQL Commands:

SQL Commands:
The standard SQL commands to interact with relational databases are CREATE, SELECT, INSERT, UPDATE, DELETE, and DROP. These commands can be classified into groups based on their nature:
DDL - Data Definition Language:
Command
Description
CREATE
Creates a new table, a view of a table, or other object in database
ALTER
Modifies an existing database object, such as a table.
DROP
Deletes an entire table, a view of a table or other object in the database.
DML - Data Manipulation Language:
Command
Description
INSERT
Creates a record
UPDATE
Modifies records
DELETE
Deletes records
DCL - Data Control Language:
Command
Description
GRANT
Gives a privilege to user
REVOKE
Takes back privileges granted from user
DQL - Data Query Language:
Command
Description
SELECT
Retrieves certain records from one or more tables

Monday 12 August 2013

SQL OVERVIEW

What is SQL ?.

  • SQL is structured Query Language which is a computer language for storing,manipulating and retrieving data stored in relational database.


  • SQL is the standard language for Relational database system.All relational database management system like MySQL,MS Access,Oracle,Sybase,Informix postgre,and SQL Server uses SQL As database language.


  • SQL is not case sensitive language.


Why SQL ?.

  • Allow users to access data in relational database management systems.
  • Allow user to describe the data.
  • Allow user to define the data in database and manipulate that data.
  • Allow to embed within other languages using SQL modules,libraries and pre-compilers.
  • Allow users to create and drop database and tables.
  • Allow users to create view,stored procedure in a database.
  • Allow users to set permissions on tables,procedures and views.



Thursday 8 August 2013

RDBMS CONCEPTS

DATABASE SOFTWARE :-

When we install a Database software in a system a part of Hard Disk will be reserved for performing Database related operations as called Database.

TYPES OF DATABASE SOFTWARE :-

 Database Management System (DBMS).

--- DBMS is a program that stores ,retrieves and modifies data in the database on request.
--- Study of different techniques of design ,development and maintenance of the database.

TYPES OF Database Management System (DBMS).
These types are based upon management of database structures.Types of DBMS are entirely dependent upon how the database is structured by the particular DBMS.

1. Hierarchical:-

A DBMS is said to be hierarchical if the relationships among the database are established in such a way  that one data item present as the subordinate of another one.Direct relationship exists between any two records that are stored consecutively . The data structure tree is followed by DBMS to structure the database.No backward movement is possible or allowed.

Examples - Dbase,Foxpro 

2. Network :-

A DBMS is said to be in a Network DBMS if the  relationships among the database  are the type many to many.

Examples- Pascal,cobol,Fortran etc 

3:- Relational :-

A DBMS is said to be a Relational or RDBMS if the  relationships are treated in the form of a table .

Examples - Oracle,sybase,informix,sql server,microsoft access etc


looking for part/full time jobs click here


DATABASE

DATA
--- Data means useful information.
--- Small set of information becomes data.
--- Data helps in making certain decision.

DATA BASE

Place where you store the  Data.Database represents some aspect of the real world called "mini world ".A database is designed,built and populated with with data for a specific purpose.

In other words ,a database has some sources from which data is derived,some degree of interaction with events in the real world and an audience that is actively interested in contents of the data base.


Database can also be defined as collection of one or more Tables.

Examples Mobil, human brain etc

for full/part time jobs click below link  http://www.dataentryjobs.us/143316.html


Monday 29 July 2013

what are the Different procedures / models are available to develop a software

 1) Waterfall model

2 ) SPIRAL MODEL 

3)  V – MODEL / V & V MODEL (Verification and Validation Model )
4) PROTOTYPE  DEVELOPMENT  MODEL
5) Derived model or Customized model

6) HYBRID MODEL

Are you looking for Homebased jobs check below link

What is Software Development Life Cycle ?

SDLC: - Software Development Life Cycle

It is a procedure to develop the software.
It is a process of creating or altering systems and the models and methodologies that people use to develop these systems.

Any SDLC should result in a high quality system that meets or exceeds customer expectations, reaches completion within time and cost estimates, works effectively and efficiently and is inexpensive to maintain and cost effective to enhance.

Are you looking for Homebased jobs check below link

Saturday 27 July 2013

Maturity Levels

Maturity Levels

a) SEI
'Software Engineering Institute' at Carnegie-Mellon University; initiated by the U.S. Defense Department to help improve software development processes.
b) CMM
 'Capability Maturity Model', now called the CMMI ('Capability Maturity Model Integration'), developed by the SEI. It's a model of 5 levels of process 'maturity' that determine effectiveness in delivering quality software. It is geared to large organizations such as large U.S. Defense Department contractors. However, many of the QA processes involved are appropriate to any organization, and if reasonably applied can be helpful. Organizations can receive CMMI ratings by undergoing assessments by qualified auditors.
       Level 1 - characterized by chaos, periodic panics, and heroic efforts required by individuals to successfully complete projects.  Few if any processes in place; successes may not be repeatable.
       Level 2 - software project tracking, requirements management, realistic planning, and configuration management processes are in place; successful practices can be repeated.
       Level 3 - standard software development and maintenance processes are integrated throughout an organization; a Software Engineering Process Group is is in place to oversee. Software processes, and training programs are used to                ensure understanding and compliance.
       Level 4 - metrics are used to track productivity, processes, and products.  Project performance is predictable, and quality is consistently high.      
       Level 5 - the focus is on continuous process improvement. The impact of new processes and technologies can be predicted and effectively implemented when required.

c) ISO
 'International Organization for Standardization' - The ISO 9001:2008 standard (which provides some clarifications of the previous standard 9001:2000) concerns quality systems that are assessed by outside auditors, and it applies to many kinds of production and manufacturing organizations, not just software. It covers documentation, design, development, production, testing, installation, servicing, and other processes. The full set of standards consists of: (a) Q9001-2008 - Quality Management Systems: Requirements; (b) Q9000-2000 - Quality Management Systems: Fundamentals and Vocabulary; (c)Q9004-2000 - Quality Management Systems: Guidelines for Performance Improvements. To be ISO 9001 certified, a third-party auditor assesses an organization, and certification is typically good for about 3 years, after which a complete reassessment is required. Note that ISO certification does not necessarily indicate quality products - it indicates only that documented processes are followed.
ISO 9126 is a standard for the evaluation of software quality and defines six high level quality characteristics that can be used in software evaluation. It includes functionality, reliability, usability, efficiency, maintainability, and portability.
d) IEEE
 'Institute of Electrical and Electronics Engineers' - among other things, creates standards such as 'IEEE Standard for Software Test Documentation' (IEEE/ANSI Standard 829), 'IEEE Standard of Software Unit Testing (IEEE/ANSI Standard 1008), 'IEEE Standard for Software Quality Assurance Plans' (IEEE/ANSI Standard 730), and others.

e) ANSI

 'American National Standards Institute', the primary industrial standards body in the U.S.; publishes some software-related standards in conjunction with the IEEE and ASQ (American Society for Quality).

Other software development/IT management process assessment methods besides CMMI and ISO 9000 include SPICE, Trillium, TickIT, Bootstrap, ITIL, MOF, and CobiT. 

when to stop testing

This can be difficult to determine. Many modern software applications are so complex and run in such an interdependent environment, that complete testing can never be done. Common factors in deciding when to stop are...
* Deadlines, e.g. release deadlines, testing deadlines;
* Test cases completed with certain percentage passed;
* Test budget has been depleted;
* Coverage of code, functionality, or requirements reaches a specified point;
* Bug rate falls below a certain level; or
* Beta or alpha testing period ends


Check the below link.for part time jobs

http://www.dataentryjobs.us/143316.html

Defect metrics

Software testing defect metrics is used to measure the quantification of a software related to its development resources and/or development process. It is usually responsible for quantifying factors like schedule, work effort, product size, project status and quality performance. Such metrics is used to estimate that how much of more future work is needed to improve the software quality before delivering it to the end-user.
This process of testing defect metrics is used to analyze the major causes of defects and in which phase most of the defects are introduced.

Defect Density:
The defect density is measured by adding up the number of defects reported by the Software Quality Assurance to the number of defects that are reported by the peer and dividing it by the actual size (which can be in either KlOC, SLOC or the function points to measure the size of the software product).

Test effectiveness:
There are several approaches towards analyzing test effectiveness, one of them is
 t/(t+Uat) and in this formula "t" is the total number of defects reported during the testing, whereas Uat means the total number of defects that are reported during the user acceptance testing.

Defect Removal Efficiency:
It's a sleek process that includes the total number of defects removed divided by the total number of defects inject to multiply by 100 during the various stages of SDLC.

Effort Variance:
Effort Variance can be calculated as
{(Actual Efforts-Estimated Efforts) / Estimated Efforts} *100.

Schedule Variance:
Just like above formula it is similarly calculated as.

{(Actual Duration - Estimated Duration)/Estimated Duration} *100

Schedule Slippage:
When a task has been delayed from its original baseline schedule then the amount of time that it has taken is defined as schedule slippage. Its calculation is as simple as.
(Actual End date - Estimated End date) / (Planned End Date – Planned Start Date) * 100

Rework Effort Ratio:
(Actual review effort spent in that particular phase / Total actual efforts spent in that phase) * 100

Requirements Stability Index:
{1 - (Total number of changes /number of initial requirements)}

Requirements Creep:
(Total Number of requirements added/Number of initial requirements) * 100

Weighted Defect Density:
(5*Count of fatal defects)+(3*Count of Major defects)+(1*Count of minor defects)
Where are the values 5,3,1 corresponds to the severities of the detect?

And at the end we’d like to tell you that purpose of metrics isn't just to measure the software performance but also to understand the progress of the application to the organizational goal. Below we will discuss some parameters of determining metrics of various software packages:
• Duration
• Complexity
• Technology Constraints
• Previous Experience in Same Technology
• Business Domain
• Clarity of the scope of the project
          And one of the interesting and beneficial approaches is using the GQM (Goal.
-Question-Metric) technique. This technique consists of three stages: A Goal, a set of questions, and a set of corresponding metrics and therefore it's a hierarchical structure that specifies the purpose of measure, the object that has to be measured, issues that need to be measured, and viewpoint from which the measures are taken.

Check the below link. for home based jobs 

Software Testing Life Cycle (STLC)

 Software Testing Life Cycle (STLC)

            Software testing life cycle identifies what test activities to carry out and when (what is the best time) to accomplish the test activities. Even though testing differs in various organizations, there is a testing life cycle.

1.    Test Planning
2.    Test development
3.    Test execution
4.    Result Analysis
5.    Bug Tracking
6.    Reporting

Software testing has its own life cycle that intersects with every stage of the SDLC. The basic requirements in software testing life cycle is to control/deal with software testing – Manual, Automated and Performance.  

1. TEST PLANNING:

Test plan is a systematic approach to testing a system such as a machine or software. The plan typically contains a detailed understanding of what the eventual workflow will be.
Test Plan Document generally includes the following:

i. Introduction
          -Objective:
                   Purpose of the document is specified over here.
          -References Document:
The list of all the documents that are .(SRS and Project Plan) 
ii.   Coverage of Testing
            -inscope (Features to be tested):
                   The list of all the features that are to be tested based on the Implicit and                     explicit requirements from the customer will be mentioned here.-       -outscope (Features not to be tested)         The list of all the features that can be skipped from testing phase are mentioned here, Generally Out of scope features such as incomplete modules are listed here. If severity is low and time constraints are high then all the low risk features such as GUI or database style sheets are skipped. Also the features that are to be incorporated in future are kept out of testing temporarily.
iii. Test Strategy
         -Levels of testing: It’s a project level term which describes testing procedures in an organization. All the levels such as Unit, module, Integration, system and UAT (User Acceptance test) are mentioned here which is to be performed.
-Types of testing: All the various types of testing such as compatibility, regression and etc are mentioned here with module divisions
-Test design techniques: The List of All the techniques that are followed and maintained in that company will be listed out here in this section. Some of the most used techniques are Boundary Value Analysis (BVA) and Equivalence Class Participation (ECP).
-Configuration Management: All the documents that are generated during the testing process needs to be updated simultaneously to keep the testers and developers aware of the proceedings. Also the naming conventions and declaring new version numbers for the software builds based on the amount of change is done by the SCM (Software Configuration Management team) and the details will be listed here.
 -Test Metrics: The list of all the tasks that need to be measured and maintained will be present here.  Different metrics for tracing back the exact requirement and test case depends on the availability of metrics at the right time.
-Terminology: Testing specific jargons for the project that will be used internally in the company will be mentioned here in this section.
 -Automation Plan: The list of all the features or modules that are planned for automation testing will be mentioned here. The application only undergoes automation testing after being declared STABLE by the manual testing team.
 -List of Automated tools: The list of Automated tools, like QTP, Load runner, Win runner; etc which will be used in this project will be mentioned along with license details.
 iv. Base Criteria:
  -Acceptance Criteria: The standards or metrics that need to be achieved by the testing team before declaring the product fit will be listed here. So before handing over to the customer, the time at which the testing needs to be stopped is mentioned here in this section.
 -Suspension Criteria: In high risk projects, or huge projects that consists several modules, It is necessary to minimize the repetitive process to be efficient. The situations when the testing needs to be suspended or temporarily halted will be listed here in this section
v. Test deliverables:
         The list of all the documents that are to be prepared during the testing process will be mentioned here in this section. All the copies of verification documents after each level are submitted to the customer along with the user manual and product at the end of the project.
Documents include:
1. Test Plan Document
2. Test Scenarios Document
3. Test case Document
4. RTM
5. Defect Reporting Document
6. Final Summary Report
vi.Test environment:
          Environmental components and combinations that will be simulated for testing the product will be made sure that it is very close to the actual environment when the end user works on the product. All the details will be mentioned here in this section that is to be used for testing the application.
  vii. Resource planning:
          Roles to be performed or in other words who has to do what will be mentioned clearly here.
  viii. Scheduling:
          The starting dates and ending dates for each and every task and module will be listed here in this section.
  ix. Staffing and Training:
          How much staff is to be recruited and what kind of training is to be provided to accomplish this project successfully will be described here in a detailed fashion.

   x. Risks and Contingencies:
            The list of all the potential risks and the corresponding solution plans will be listed here
 Risks: Example, Resources may leave the organization, license and update deadlines, customer may change the requirements in terms of testing or maintenance in middle of the project etc
           Contingencies:  Maintaining bench strength, Rechecking initial stages of the whole process, Importance and priority settings for features to be tested and features to be skipped under time constraints to be listed and shared clearly.

  xi. Assumptions:
  Some features or testing methods have to be done mandatorily even though, the customer does not mention it in his requirements document. These assumptions are listed out here in this section.

  xii. Approval Information
           As this document is published and circulated, the relevant and required authorities will approve the plan and will update this section with necessary details like date and department etc.


2. TEST DESIGN STAGE:


This is the most important stage of the testing life cycle, in this phase of the testing; the testers will develop the test scenarios and test cases based against the requirements of the customer.  

2.1. Test Scenario

A set of test cases that ensure that the business process flows are tested from end to end. They may be independent tests or a series of tests that follow each other, each dependent on the output of the previous one.
The following is the 

2.2. Test Case

Test Development simply involves writing Test cases from test scenarios. Every Company follows a particular format for test cases called test case template
Test cases are broadly divided into two types.
·         G.U.I Test Cases.
·         Functional test cases.
Functional test cases are further divided into two types.
·         Positive Test Cases.
·         Negative Test Cases.

Test case template typically consists of
        
Test Case ID: Test Case number
          Test case created on: The date test case created on
          Category:  category deals with type of the testing done like functional, GUI,   negative testing etc
Test Scenario: A set of test cases that ensure that the business process flows are tested from end to end. They may be independent tests or a series of tests that follow each other, each dependent on the output of the previous one.
Test Data: If you are writing test case then you need input data for any kind of test. Tester may provide this input data at the time of executing the test cases. The test data may be any kind of input to application, it may be in any format like xml test data, system test data, SQL test data or stress tested.
Generally testers call it as test bed. In test bed all software and hardware     requirements are set using the predefined data values. If you don’t have the systematic approach for building test data while writing and executing test cases then there are chances of missing some important test cases
          Execution steps: The steps to be followed to execute the test case
Expected Result:  When the test case is executed what has happened dictates the expected result
Actual Result: What is actually expected when the test case is executed
Status: The pass or fail criteria
Comments:  Any comments can be added.

2.3. Requirement Traceability Matrix


 The Test cases ensure that all the functionalities are being covered in testing but these should be mapped with business requirements to ensure that all the requirements are met. For this we need to prepare RTM, to verify 100% Coverage of Requirements.
Requirement Traceability matrix typically consists of
      
            Requirement ID:  Maps to the requirement document
          Requirement Description:  Brief Description of the requirement
          Reference Document:  The document from where the requirement is fetched like BRD,SRS etc
          Module Name:  The module in the project where the requirement is under consideration
Test Case ID:  The Test case Id from the test case template

Requirement Changes: If any changes are made in the requirements that has to be notified.

                                                

3TEST EXECUTION PHASE:

In this phase test engineers will execute the test cases and log the defects. During the test execution phase the test engineer will do the following.
a)    He will perform the action that is described in the description column.
b)    He will observe the actual behavior of the application.
c)    He will document the observed value under the actual value column.

                                                

4. RESULT ANALYSIS:

After the successful execution of test cases, the tester will compare the expected values with the actual values and declare the result as pass or fail.  

5. BUG TRACKING AND REPORTING:

It consists of entire list of defects you have come across while testing your application. We have a defects meeting where QA, Developers and PM attend and discuss the defects. If they think it’s a valid defect then QA lead assigns it to development lead who in turn will assign it to the developer to fix the defect.

5.1 Difference between Bug, Defect and Error

Error:  Any mismatches while compiling the code is called Error. A human action which produces an incorrect result. In simple words error in programming or coding is an error
Defect:  A flow in a component or system that can cause the component or system to fail to perform its required function. The gaps in functionality or any mismatches in functionality are called a defect.
Bug: The defects accepted by developers are bugs.
Fault: Fault is similar to a defect.
Failure: Deviation of the component or system from its expected delivery, service or result.
Issue: It’s same as defect.
Suggestion: The points not covered in BRD but which can improve quality can be suggested by testers to the developers

5.2. Reporting Of bugs


a) Classical Bug Reporting Process:

Drawbacks:   1.Time consuming
2. Redundancy.
3. No Security.

b) Common Repository Oriented Bug Reporting Process:

Drawbacks:    1.Time consuming.
2. Redundancy.

c) Bug Tracking Tool Oriented Bug Reporting Process:

Very Important stage to update the DPD (Defect profile document) and the let the developers know of the defects.

5.3. DPD (Defect Profile Document)


Defect ID: Serial no. of the defect
Defect Description:  A brief description of the defect.
Status:  Status of the defect
          Status - New/Open/Assign/Deferred/Rejected/Re Opened/Closed.
a)    New: When the bug is posted for the first time, it states will be new this means the bug is not yet approved.
b)    Open: After a tester has posted a bug, the lead of the tester will approves the bug is genuine and he changes the state as “OPEN”.
c)    Assign: Once the lead changes the state as “OPEN” he assigns the bug to the corresponding developer or developer team.
d)    Deferred: The bug changed to deferred state means the bug is expected to fix in next release due to various factors.
e)    Rejected: If the developer feels the bug is not genuine, he rejects the bug. The state of the bug changed to “REJECTED”.
f)    Reopened: If the bug still exists even after the bug is fixed by the developer, the tester changes the statues to “RE-OPENED”.
g)    Closed: Once the bug is fixed, it is tested by tester. If the tester feels that the bug no longer exists in the software, he changes the status of the bug to “CLOSED”.
Severity: Impact of Bug on the application. The different Severities are Show stopper, Critical, Major, Minor, Cosmetic. It will be decided by the tester.
a)    Show stopper: Stops development and/or testing work.
b)    Critical: Crashes, loss of data, severe memory leak.
c)     Major: Major loss of function.
d)     Minor: Minor loss of function, or other problem where easy work around is present.
e)     Cosmetic: Cosmetic problem like misspelled words or misaligned text, Background color of the specific field.
Priority: Priority of the Bug as per the client's requirements.
               The different   priorities are High, Medium and Low.

a)    High: Bug must be fixed immediately; the product cannot ship with this bug.
b)    Medium: These are important problems that should be fixed as soon as possible. The problem should be fixed within the time available.
     c) Low: It is not important that these bugs be addressed.
Fix these bugs after all other bugs have been fixed

Test case ID:  Test case Number that is written in the test case Document.

Assigned To:  Person (developer) to whom the bug is assigned to fix.
Assigned By:  Testing personnel by whom the bug is found or the Testing person who   assigns the bug to developer.
Date of testing:  The date on which testing is done.
Remarks:  Any remarks can be provided.


Once all the bugs are fixed and complete regression testing is done then the final summary report is made.

5.2. Final summary report


6. TEST CLOSURE:
                           It is the last phase of STLC process. All test cases execution should be completed and there should not be any high level severity and high level priority bugs. Once the UAT has done with successfully then final test summary report is generated and then sign off the project.
·         Client Acceptance

·         Replication of product delivery records submission client sign-off.