Save
ICT
UNIT 7
Save
Share
Learn
Content
Leaderboard
Learn
Created by
nuriye aamir
Visit profile
Cards (18)
verification is a
way of making sure data being entered into system is exactly matching source of data
Verification methods:
proof reading
and
double entry
proof reading is
once data has been entered it will be checked to see if it is correct
Implementation techniques:
phased implementation
,
pilot running
,
direct changeover
and
parallel running
VALIDATION TECHNIQUES:
presence check
,
range check
,
length check
,
type check
and
format chec
presence check
is to check if
data has been entered
range
check is to check
data entered is in correct range
length check is to check if
item of text is too short or long
type check if to check if
type of data entered is correct
format
check is to check if
data has been entered in correct format
a typical test plan would include:
what is being tested, test data that will be used and expected outcome of test
types of test data:
normal data, abnormal data and extreme data
SYSTEMS
LIFE CYCLE:
analysis, design, development, implementation, documentation and evaluation
analysis is
collecting info
about present system and
identifying problems
design is designing new system to correct problems identified in analysis
implementation is
replacing old system with new system
documentation is
creating technical and user documentation for new system
evaluation is evaluating whether
new system meets requirements of design