際際滷

際際滷Share a Scribd company logo
Black Box Testing
 It is a good all-round specification-based black-box technique. It can be
applied at any level of testing and is often a good technique.
 It is better to use the technique informally than not at all, it is much
better to use the technique in a formal way to attain the full benefits
that it can deliver.
 The idea behind the technique is to divide a set of test conditions into
groups or sets that can be considered the same.
 The equivalence partitioning technique then describes that we need to
test only one condition from each partition.
 For example, a saving account in a bank earns a different rate of interest
depending on the balance in the account.
 When we say a partition is invalid ,it doesnt mean that it represents a
value that cannot be entered by user. It just means that it is not one of
the expected inputs for this particular field.
 The software should correctly handle values from the invalid partition,
by replying with an error message Balance must me at least $0.00.
 Definition:
A boundary value is any input or output value on the
edge of an equivalence partition. Its a black box test
design technique where test cases are designed by
using boundary values; BVA is used in range checking.
 Objective :
Boundary value analysis leads to a selection of test
cases that exercise bounding values.
 Guidelines :
If an input condition specifies a range bounded by
values a and b, test cases should be designed with
value a and b, just above and below a and b.
CONDITIONS
(Candidate)
VALID
BOUNDARY
& EDGES
TAG
(applicable)
INVALID
BOUNDARY
TAG
(not-
applicable)
Relevant
Experience
Number
should be 0
to 99
0 ,1 
98,99
A1 -0.01 &
99.01
B1
Year of
Passing
1975 to 2008
1975,1976 
2007,2008
A2 1974 
2009
B2
 A black-box test design technique where the cases
are designed to execute the combinations of
inputs(causes) with their associated outputs(effects)
in a table format where each column represents a
unique combination.
 The input conditions and actions are often stated
either true/false(Boolean).
 It overcomes the defect of EP/BVP which becomes
complicated when different combinations of inputs
has to be given.
State Transition diagram represents one specific entity
at a time
It describes the states of an entity
It also describes the events that affect the entity, the
transitions of the entity from one state to another, and
actions that are initiated by the entity.
o What is a Scenario?
o Who is an Actor?
o What is a Use case?
Maintains
Database
Withdraw cash
Deposit cash
Administrator
customer
Actors
Use Cases
Main Success
Scenario
Step Action
1 A:Actor Clicks on the
Login page of the site.
2 S:System prompts the
actor to supply Username
and Password.
3 A: Actor supplies the
Username and Password
Details.
4 S:System Gets the User ID
and decrypts the
Password. System
compares User ID & the
Password provided by the
user with the stored User
ID & Password. If the
comparison is successful
actor is directed to the
Next Page.
5 Use Case ends
Extensions Step Action
3a S:If invalid Username and
Password is given then a
message should be
displayed to reenter
Username and Password
3b A:If User forgets the
Password then Actor should
invoke forgot password
S:System prompts for email
address
A:Actor provides the email
address
S:System Validates the user
provided email address with
stored email Address.
If System validation is
successful ,reset password is
emailed to actor.
4a S:If validation is not
successful then go to 3a
Thank You

More Related Content

Viewers also liked (6)

PPT
V Model in Software Testing
Abdul Raheem
PPTX
V model Over View (Software Engineering)
Badar Rameez. CH.
PPT
V model final
suhasreddy1
PDF
V model in SDLC
Jasour Obeidat
PPTX
Types of testing
Sonam Agarwal
PPTX
Types of Test
jasper gaboc
V Model in Software Testing
Abdul Raheem
V model Over View (Software Engineering)
Badar Rameez. CH.
V model final
suhasreddy1
V model in SDLC
Jasour Obeidat
Types of testing
Sonam Agarwal
Types of Test
jasper gaboc

Similar to Black Box Testing (20)

PPTX
SE 09 (test design techs).pptx
ZohairMughal1
PPTX
ISTQB Foundation Level Chapter 4: Test Design Techniques
zubair khan
PPTX
Test design techniques
Mohamed Elshenawy
PPTX
presentation_testing_1455044600_187410.pptx
sidh18
PPTX
Lavenya Testing.pptx
ssuser94400e
PPT
blckboxtesting.ppt il.;io'/ ulio'[ yjko8i[0'-p/ yk
SMayankSharma
PPTX
Test Case Design Techniques Presentation.pptx
ksp1mech
PPTX
CTFL Module 04
Davis Thomas
PPTX
Unit 2 - Test Case Design
Selvi Vts
PPTX
Specification based or black box techniques 3
Bima Alvamiko
PPTX
Black Box Testing
Mustafa Sherazi
PPTX
Specification based or black box techniques
Yoga Pratama Putra
PPTX
Blackbox
Oana Feidi
PPTX
Specification based or black box techniques
muhammad afif
PPTX
Specification based or black box techniques
Aji Pamungkas Prasetio
PPT
Dynamic Testing
Jimi Patel
PPT
Blackbox
Oana Feidi
PPTX
Test Case Design Techniques Practical Examples & Best Practices in Software...
Muhammad Fahad Bashir
PPTX
Specification based or black box techniques
Dinul
PPTX
Specification based or black box techniques
M Branikno Ramadhan
SE 09 (test design techs).pptx
ZohairMughal1
ISTQB Foundation Level Chapter 4: Test Design Techniques
zubair khan
Test design techniques
Mohamed Elshenawy
presentation_testing_1455044600_187410.pptx
sidh18
Lavenya Testing.pptx
ssuser94400e
blckboxtesting.ppt il.;io'/ ulio'[ yjko8i[0'-p/ yk
SMayankSharma
Test Case Design Techniques Presentation.pptx
ksp1mech
CTFL Module 04
Davis Thomas
Unit 2 - Test Case Design
Selvi Vts
Specification based or black box techniques 3
Bima Alvamiko
Black Box Testing
Mustafa Sherazi
Specification based or black box techniques
Yoga Pratama Putra
Blackbox
Oana Feidi
Specification based or black box techniques
muhammad afif
Specification based or black box techniques
Aji Pamungkas Prasetio
Dynamic Testing
Jimi Patel
Blackbox
Oana Feidi
Test Case Design Techniques Practical Examples & Best Practices in Software...
Muhammad Fahad Bashir
Specification based or black box techniques
Dinul
Specification based or black box techniques
M Branikno Ramadhan
Ad

Recently uploaded (20)

PDF
The Future of Product Management in AI ERA.pdf
Alyona Owens
PDF
Database Benchmarking for Performance Masterclass: Session 1 - Benchmarking F...
ScyllaDB
PPTX
CapCut Pro Crack For PC Latest Version {Fully Unlocked} 2025
pcprocore
PDF
Quantum AI Discoveries: Fractal Patterns Consciousness and Cyclical Universes
Saikat Basu
PDF
UiPath Agentic AI ile Ak脹ll脹 Otomasyonun Yeni a脹
UiPathCommunity
PDF
EIS-Webinar-Engineering-Retail-Infrastructure-06-16-2025.pdf
Earley Information Science
PDF
The Growing Value and Application of FME & GenAI
Safe Software
PDF
Hyderabad MuleSoft In-Person Meetup (June 21, 2025) 際際滷s
Ravi Tamada
PDF
Automating the Geo-Referencing of Historic Aerial Photography in Flanders
Safe Software
PPTX
Enabling the Digital Artisan keynote at ICOCI 2025
Alan Dix
PPTX
UserCon Belgium: Honey, VMware increased my bill
stijn40
DOCX
Daily Lesson Log MATATAG ICT TEchnology 8
LOIDAALMAZAN3
PDF
5 Things to Consider When Deploying AI in Your Enterprise
Safe Software
PDF
MPU+: A Transformative Solution for Next-Gen AI at the Edge, a Presentation...
Edge AI and Vision Alliance
PPTX
Simplifica la seguridad en la nube y la detecci坦n de amenazas con FortiCNAPP
Cristian Garcia G.
PPTX
Smarter Governance with AI: What Every Board Needs to Know
OnBoard
PPTX
MARTSIA: A Tool for Confidential Data Exchange via Public Blockchain - Poster...
Michele Kryston
PDF
Kubernetes - Architecture & Components.pdf
geethak285
PDF
My Journey from CAD to BIM: A True Underdog Story
Safe Software
PPTX
01_Approach Cyber- DORA Incident Management.pptx
FinTech Belgium
The Future of Product Management in AI ERA.pdf
Alyona Owens
Database Benchmarking for Performance Masterclass: Session 1 - Benchmarking F...
ScyllaDB
CapCut Pro Crack For PC Latest Version {Fully Unlocked} 2025
pcprocore
Quantum AI Discoveries: Fractal Patterns Consciousness and Cyclical Universes
Saikat Basu
UiPath Agentic AI ile Ak脹ll脹 Otomasyonun Yeni a脹
UiPathCommunity
EIS-Webinar-Engineering-Retail-Infrastructure-06-16-2025.pdf
Earley Information Science
The Growing Value and Application of FME & GenAI
Safe Software
Hyderabad MuleSoft In-Person Meetup (June 21, 2025) 際際滷s
Ravi Tamada
Automating the Geo-Referencing of Historic Aerial Photography in Flanders
Safe Software
Enabling the Digital Artisan keynote at ICOCI 2025
Alan Dix
UserCon Belgium: Honey, VMware increased my bill
stijn40
Daily Lesson Log MATATAG ICT TEchnology 8
LOIDAALMAZAN3
5 Things to Consider When Deploying AI in Your Enterprise
Safe Software
MPU+: A Transformative Solution for Next-Gen AI at the Edge, a Presentation...
Edge AI and Vision Alliance
Simplifica la seguridad en la nube y la detecci坦n de amenazas con FortiCNAPP
Cristian Garcia G.
Smarter Governance with AI: What Every Board Needs to Know
OnBoard
MARTSIA: A Tool for Confidential Data Exchange via Public Blockchain - Poster...
Michele Kryston
Kubernetes - Architecture & Components.pdf
geethak285
My Journey from CAD to BIM: A True Underdog Story
Safe Software
01_Approach Cyber- DORA Incident Management.pptx
FinTech Belgium
Ad

Black Box Testing

  • 2. It is a good all-round specification-based black-box technique. It can be applied at any level of testing and is often a good technique. It is better to use the technique informally than not at all, it is much better to use the technique in a formal way to attain the full benefits that it can deliver. The idea behind the technique is to divide a set of test conditions into groups or sets that can be considered the same. The equivalence partitioning technique then describes that we need to test only one condition from each partition. For example, a saving account in a bank earns a different rate of interest depending on the balance in the account. When we say a partition is invalid ,it doesnt mean that it represents a value that cannot be entered by user. It just means that it is not one of the expected inputs for this particular field. The software should correctly handle values from the invalid partition, by replying with an error message Balance must me at least $0.00.
  • 3. Definition: A boundary value is any input or output value on the edge of an equivalence partition. Its a black box test design technique where test cases are designed by using boundary values; BVA is used in range checking. Objective : Boundary value analysis leads to a selection of test cases that exercise bounding values. Guidelines : If an input condition specifies a range bounded by values a and b, test cases should be designed with value a and b, just above and below a and b.
  • 4. CONDITIONS (Candidate) VALID BOUNDARY & EDGES TAG (applicable) INVALID BOUNDARY TAG (not- applicable) Relevant Experience Number should be 0 to 99 0 ,1 98,99 A1 -0.01 & 99.01 B1 Year of Passing 1975 to 2008 1975,1976 2007,2008 A2 1974 2009 B2
  • 5. A black-box test design technique where the cases are designed to execute the combinations of inputs(causes) with their associated outputs(effects) in a table format where each column represents a unique combination. The input conditions and actions are often stated either true/false(Boolean). It overcomes the defect of EP/BVP which becomes complicated when different combinations of inputs has to be given.
  • 6. State Transition diagram represents one specific entity at a time It describes the states of an entity It also describes the events that affect the entity, the transitions of the entity from one state to another, and actions that are initiated by the entity.
  • 7. o What is a Scenario? o Who is an Actor? o What is a Use case?
  • 9. Main Success Scenario Step Action 1 A:Actor Clicks on the Login page of the site. 2 S:System prompts the actor to supply Username and Password. 3 A: Actor supplies the Username and Password Details. 4 S:System Gets the User ID and decrypts the Password. System compares User ID & the Password provided by the user with the stored User ID & Password. If the comparison is successful actor is directed to the Next Page. 5 Use Case ends
  • 10. Extensions Step Action 3a S:If invalid Username and Password is given then a message should be displayed to reenter Username and Password 3b A:If User forgets the Password then Actor should invoke forgot password S:System prompts for email address A:Actor provides the email address S:System Validates the user provided email address with stored email Address. If System validation is successful ,reset password is emailed to actor. 4a S:If validation is not successful then go to 3a