STM Unit 1
STM Unit 1
What is testing?
Testing is the process of exercising or evaluating a system or system components by manual or automated means to
verify that it satisfies specified requirements.
Testing consumes at least half of the time and work required to produce a functional program.
o MYTH: Good programmers write code without bugs. (It’s wrong!!!)
o History says that even well written programs still have 1-3 bugs per hundred statements.
1
o Testing and Test Design are parts of quality assurance should also focus on bug
prevention. A prevented bug is better than a detected and corrected bug.
Phases in a tester's mental life:
Phases in a tester's mental life can be categorized into the following 5 phases:
1. Phase 0: (Until 1956: Debugging Oriented) There is no difference between testing and
debugging. Phase 0 thinking was the norm in early days of software development till testing
emerged as a discipline.
2. Phase 1: (1957-1978: Demonstration Oriented) the purpose of testing here is to show that
software works. Highlighted during the late 1970s. This failed because the probability of
showing that software works 'decreases' as testing increases. I.e. the more you test, the more
likely you will find a bug.
3. Phase 2: (1979-1982: Destruction Oriented) the purpose of testing is to show that software
doesn’t work. This also failed because the software will never get released as you will find
one bug or the other. Also, a bug corrected may also lead to another bug.
4. Phase 3: (1983-1987: Evaluation Oriented) the purpose of testing is not to prove anything
but to reduce the perceived risk of not working to an acceptable value (Statistical Quality
Control). Notion is that testing does improve the product to the extent that testing catches bugs
and to the extent that those bugs are fixed. The product is released when the confidence on
that product is high enough. (Note: This is applied to large software products with millions
of code and years of use.)
5. Phase 4: (1988-2000: Prevention Oriented) Testability is the factor considered here. One
reason is to reduce the labor of testing. Other reason is to check the testable and non- testable
code. Testable code has fewer bugs than the code that's hard to test. Identifying the testing
techniques to test the code is the main key here.
Test Design:
We know that the software code must be designed and tested, but many appear to be unaware that tests themselves
must be designed and tested. Tests should be properly designed and tested before applying it to the actual code.
1. Inspection Methods: Methods like walkthroughs, desk checking, formal inspections and
code reading appear to be as effective as testing but the bugs caught don’t completely
overlap.
2. Design Style: While designing the software itself, adopting stylistic objectives such as
testability, openness and clarity can do much to prevent bugs.
3. Static Analysis Methods: Includes formal analysis of source code during compilation. In
2
earlier days, it is a routine job of the programmer to do that. Now, the compilers have taken
over that job.
4. Languages: The source language can help reduce certain kinds of bugs. Programmers find
new bugs while using new languages.
5. Development Methodologies and Development Environment: The development
process and the environment in which that methodology is embedded can prevent many
kinds of bugs.
Dichotomies:
Testing Debugging
Testing starts with known conditions, Debugging starts from possibly unknown
uses predefined procedures and has initial conditions and the end cannot be
predictable outcomes. predicted except statistically.
Testing can and should be planned, Procedure and duration of debugging cannot
designed and scheduled. be so constrained.
Testing is a demonstration of error or
Debugging is a deductive process.
apparent correctness.
Debugging is the programmer's vindication
Testing proves a programmer's failure.
(Justification).
Testing, as executes, should strive to be
Debugging demands intuitive leaps,
predictable, dull, constrained, rigid and
experimentation and freedom.
inhuman.
Much testing can be done without design Debugging is impossible without detailed
knowledge. design knowledge.
Testing can often be done by an outsider.
Debugging must be done by an insider.
3
functionality and features and not the program's implementation.
o In Structural testing does look at the implementation details. Things such as
programming style, control method, source language, database design, and coding
details dominate structural testing.
o Both Structural and functional tests are useful, both have limitations, and both target
different kinds of bugs. Functional tests can detect all bugs but would take infinite
time to do so. Structural tests are inherently finite but cannot detect all errors even
if completely executed.
o Test designer is the person who designs the tests where as the tester is the one
actually tests the code. During functional testing, the designer and tester are
probably different persons. During unit testing, the tester and the programmer
merge into one person.
o Tests designed and executed by the software designers are by nature biased towards
structural consideration and therefore suffer the limitations of structural testing.
A module is a discrete, well-defined, small component of a system. Smaller the modules, difficult to integrate;
larger the modules, difficult to understand. Both tests and systems can be modular. Testing can and should
likewise be organized into modular components. Small, independent test cases can be designed to test
independent modules.
Programming in large means constructing programs that consists of many components written by many
different programmers. Programming in the small is what we do for ourselves in the privacy of our own
offices. Qualitative and Quantitative changes occur with size and so must testing methods and quality criteria.
Most software is written and used by the same organization. Unfortunately, this situation is dishonest because
it clouds accountability. If there is no separation between builder and buyer, there can be no accountability.
The different roles / users in a system include:
1. Builder: Who designs the system and is accountable to the buyer.
2. Buyer: Who pays for the system in the hope of profits from providing services?
3. User: Ultimate beneficiary or victim of the system. The user's interests are also
guarded by.
4. Tester: Who is dedicated to the builder's destruction?
5. Operator: Who has to live with the builders' mistakes, the buyers' murky
(unclear) specifications, testers' oversights and the users' complaints?
4
MODEL FOR TESTING:
5
(Benign: Not Dangerous)
2. Bug Locality Hypothesis: The belief that a bug discovered with in a component
affects only that component's behavior.
3. Control Bug Dominance: The belief those errors in the control structures (if, switch etc) of
programs dominate the bugs.
4. Code / Data Separation: The belief that bugs respect the separation of code and data.
5. Lingua Salvatore Est.: The belief that the language syntax and semantics (e.g. Structured
Coding, Strong typing, etc) eliminates most bugs.
6. Corrections Abide: The mistaken belief that a corrected bug remains corrected.
7. Silver Bullets: The mistaken belief that X (Language, Design method, representation,
environment) grants immunity from bugs.
8. Sadism Suffices: The common belief (especially by independent tester) that a sadistic streak,
low cunning, and intuition are sufficient to eliminate most bugs. Tough bugs need
methodology and techniques.
9. Angelic Testers: The belief that testers are better at test design than programmers is at code
design.
Test
s:
o Tests are formal procedures, Inputs must be prepared, Outcomes should predict,
tests should be documented, commands need to be executed, and results are to be
observed. All these errors are subjected to error
o We do three distinct kinds of testing on a typical software system. They are:
1. Unit / Component Testing: A Unit is the smallest testable piece of
software that can be compiled, assembled, linked, loaded etc. A unit is
usually the work of one programmer and consists of several hundred or
fewer lines of code. Unit Testing is the testing we do to show that the unit
does not satisfy its functional specification or that its implementation
structure does not match the intended design structure. A Component is an
integrated aggregate of one or more units. Component Testing is the testing
we do to show that the component does not satisfy its functional
specification or that its implementation structure does not match the
intended design structure.
2. Integration Testing: Integration is the process by which components are
aggregated to create larger components. Integration Testing is testing done
to show that even though the components were individually satisfactory
(after passing component testing), checks the combination of components
are incorrect or inconsistent.
6
3. System Testing: A System is a big component. System Testing is aimed
at revealing bugs that cannot be attributed to components. It includes testing
for performance, security, accountability, configuration sensitivity, startup
and recovery.
Role of Models: The art of testing consists of creating, selecting, exploring, and revising
models. Our ability to go through this process depends on the number of different models
we have at hand and their ability to express a program's behavior.
CONSEQUENCES OF BUGS:
7
Importance= ($) = Frequency * (Correction cost + Installation cost + Consequential
cost)
8
Flexible severity rather than absolutes:
o Quality can be measured as a combination of factors, of which number of bugs and
their severity is only one component.
o Many organizations have designed and used satisfactory, quantitative, quality
metrics.
o Because bugs and their symptoms play a significant role in such metrics, as testing
progresses, you see the quality rise to a reasonable value which is deemed to be safe
to ship the product.
o The factors involved in bug severity are:
1. Correction Cost: Not so important because catastrophic bugs may be
corrected easier and small bugs may take major time to debug.
2. Context and Application Dependency: Severity depends on the context
and the application in which it isused.
3. Creating Culture Dependency: What’s important depends on the creators
of software and their cultural aspirations. Test tool vendors are more
sensitive about bugs in their software then games software vendors.
4. User Culture Dependency: Severity also depends on user culture. Naive
users of PC software go crazy over bugs where as pros (experts) may just
ignore.
5. The software development phase: Severity depends on development
phase. Any bugs gets more severe as it gets closer to field use and more
severe the longer it has been around.
TAXONOMY OF BUGS:
There is no universally correct way categorize bugs. The taxonomy is not rigid.
A given bug can be put into one or another category depending on its history and the
programmer's state of mind.
The major categories are: (1) Requirements, Features and Functionality Bugs (2)
Structural Bugs (3) Data Bugs (4) Coding Bugs (5) Interface, Integration and System
Bugs (6) Test and Test Design Bugs.
9
and environment.
What hurts most about the bugs is that they are the earliest to invade the system and
the last to leave.
2. Feature Bugs:
Specification problems usually create corresponding feature problems.
A feature can be wrong, missing, or superfluous (serving no useful purpose). A missing
feature or case is easier to detect and correct. A wrong feature could have deep design
implications.
Removing the features might complicate the software, consume more resources, and foster
more bugs.
10
Another reason for control flow bugs is that use of old code especially ALP & COBOL
code are dominated by control flow bugs.
Control and sequence bugs at all levels are caught by testing, especially structural testing,
more specifically path testing combined with a bottom line functional test based on a
specification.
2. Logic Bugs:
Bugs in logic, especially those related to misunderstanding how case statements and
logic operators behave singly and combinations
Also includes evaluation of boolean expressions in deeply nested IF-THEN-ELSE
constructs.
If the bugs are parts of logical (i.e. boolean) processing not related to control flow, they
are characterized as processing bugs.
If the bugs are parts of a logical expression (i.e. control-flow statement) which is used to
direct the control flow, then they are categorized as control-flow bugs.
3. Processing Bugs:
Processing bugs include arithmetic bugs, algebraic, mathematical function evaluation,
algorithm selection and general processing.
Examples of Processing bugs include: Incorrect conversion from one data
representation to other, ignoring overflow, improper use of greater-than-or-equal etc
Although these bugs are frequent (12%), they tend to be caught in good unit testing.
4. Initialization Bugs:
Initialization bugs are common. Initialization bugs can be improper and superfluous.
Superfluous bugs are generally less harmful but can affect performance.
Typical initialization bugs include: Forgetting to initialize the variables before first use,
assuming that they are initialized elsewhere, initializing to the wrong format, representation
or type etc
Explicit declaration of all variables, as in Pascal, can reduce some initialization problems.
Data bugs:
Data bugs include all bugs that arise from the specification of data objects, their
formats, the number of such objects, and their initial values.
Data Bugs are at least as common as bugs in code, but they are often treated as if they did
not exist at all.
Code migrates data: Software is evolving towards programs in which more and more of
11
the control and processing functions are stored in tables.
Because of this, there is an increasing awareness that bugs in code are only half the battle
and the data problems should be given equal attention.
Dynamic data are transitory. Whatever their purpose their lifetime is relatively short,
typically the processing time of one transaction. A storage object may be used to hold
dynamic data of different types, with different formats, attributes and residues.
Dynamic data bugs are due to leftover garbage in a shared resource. This can be handled
in one of the three ways: (1) Clean up after the use by the user (2) Common Cleanup by
the resource manager (3) No Clean up
Static Data are fixed in form and content. They appear in the source code or database
directly or indirectly, for example a number, a string of characters, or a bit pattern.
Compile time processing will solve the bugs caused by static data.
Coding bugs:
Coding errors of all kinds can create any of the other kind of bugs.
Syntax errors are generally not important in the scheme of things if the source language
translator has adequate syntax checking.
If a program has many syntax errors, then we should expect many logic and coding bugs.
The documentation bugs are also considered as coding bugs which may mislead the
maintenance programmers.
1. External Interfaces:
12
The external interfaces are the means used to communicate with the world.
These include devices, actuators, sensors, input terminals, printers, and communication
lines.
The primary design criterion for an interface with outside world should be robustness.
All external interfaces, human or machine should employ a protocol. The protocol may
be wrong or incorrectly implemented.
Other external interface bugs are: invalid timing or sequence assumptions related to
external signals
Misunderstanding external input or output formats.
Insufficient tolerance to bad input data.
2. Internal Interfaces:
Internal interfaces are in principle not different from external interfaces but they are
more controlled.
A best example for internal interfaces is communicating routines.
The external environment is fixed and the system must adapt to it but the internal
environment, which consists of interfaces with other components, can be negotiated.
Internal interfaces have the same problem as external interfaces.
3. Hardware Architecture:
Bugs related to hardware architecture originate mostly from misunderstanding how the
hardware works.
Examples of hardware architecture bugs: address generation error, i/o device operation
/ instruction error, waiting too long for a response, incorrect interrupt handling etc.
The remedy for hardware architecture and interface problems is twofold: (1) Good
Programming and Testing (2) Centralization of hardware interface software in programs
written by hardware interface specialists.
5. Software Architecture:
Software architecture bugs are the kind that called - interactive.
Routines can pass unit and integration testing without revealing such bugs.
Many of them depend on load, and their symptoms emerge only when the system is
stressed.
Sample for such bugs: Assumption that there will be no interrupts, Failure to block or un
block interrupts, Assumption that memory and registers were initialized or not
13
initialized etc
Careful integration of modules and subjecting the final system toa stress test are
effective methods for these bugs.
6. Control and Sequence Bugs (Systems Level):
These bugs include: Ignored timing, Assuming that events occur in a specified sequence, Working on data
before all the data have arrived from disc, Waiting for an impossible combination of prerequisites, Missing,
wrong, redundant or superfluous process steps.
The remedy for these bugs is highly structured sequence control. Specialize,
internal, sequence control mechanisms are helpful.
8. Integration Bugs:
Integration bugs are bugs having to do with the integration of, and with the interfaces
between, working and tested components.
These bugs results from inconsistencies or incompatibilities between components.
The communication methods include data structures, call sequences, registers, semaphores,
and communication links and protocols results in integration bugs.
The integration bugs do not constitute a big bug category (9%) they are expensive category
because they are usually caught late in the game and because they force changes in several
components and/or data structures.
9. System Bugs:
System bugs covering all kinds of bugs that cannot be ascribed to a component or to their
simple interactions, but result from the totality of interactions between many components
such as programs, data, hardware, and the operating systems.
There can be no meaningful system testing until there has been thorough component and
integration testing.
System bugs are infrequent (1.7%) but very important because they are often found only
after the system has been fielded.
14
Test criteria: if the specification is correct, it is correctly interpreted and implemented, and
a proper test has been designed; but the criterion by which the software's behavior is
judged may be incorrect or impossible. So, a proper test criteria has to be designed. The more complicated
the criteria, the likelier they are to have bugs.
Path Testing:
o Path Testing is the name given to a family of test techniques based on
judiciously selecting a set of test paths through the program.
o If the set of paths are properly chosen then we have achieved some measure of
test thoroughness. For example, pick enough paths to assure that every source
statement has been executed at least once.
o Path testing techniques are the oldest of all structural test techniques.
o Path testing is most applicable to new software for unit testing. It is a
structural technique.
o It requires complete knowledge of the program's structure.
o It is most often used by programmers to unit test their own code.
o The effectiveness of path testing rapidly deteriorates as the size of the
software aggregate under test increases.
15
o Structured programming languages prevent many of the bugs targeted by path
testing: as a consequence the effectiveness for path testing for these languages is
reduced and for old code in COBOL, ALP, FORTRAN and Basic, the path testing
is indispensable.
o Flow Graph Elements: A flow graph contains four different types of elements.
(1) Process Block (2) Decisions (3) Junctions (4) Case Statements
1. Process Block:
A process block is a sequence of program statements
uninterrupted by either decisions or junctions.
It is a sequence of statements such that if any one of statement
of the block is executed, then all statement thereof are executed.
Formally, a process block is a piece of straight line code of one
statement or hundreds of statements.
A process has one entry and one exit. It can consists of a single
statement or instruction, a sequence of statements or
instructions, a
single entry/exit subroutine, a macro or function call, or a sequence of these.
2. Decisions:
A decision is a program point at which the control flow
can diverge.
Machine language conditional branch and conditional
skip instructions are examples of decisions.
Most of the decisions are two-way but some are three
way branches in control flow.
3. Case Statements:
A case statement is a multi-way branch or decisions.
Examples of case statement are a jump table in assembly
language, and the PASCAL case statement.
From the point of view of test design, there are no
differences between Decisions and Case Statements
4. Junctions:
A junction is a point in the program where the control flow
can merge.
Examples of junctions are: the target of a jump or skip
instruction in ALP, a label that is a target of GOTO.
16
Figure 2.1: Flow graph Elements
Control Flow Graphs Vs Flowcharts:
o A program's flow chart resembles a control flow graph.
o In flow graphs, we don't show the details of what is in a process block.
o In flow charts every part of the process block is drawn.
o The flowchart focuses on process steps, where as the flow graph focuses on control
flow of the program.
o The act of drawing a control flow graph is a useful tool that can help us clarify the
control flow and data flow issues.
Notational Evolution:
The control flow graph is simplified representation of the program's structure.The notation changes made in
creation of control flow graphs:
o The process boxes weren't really needed. There is an implied process on every line joining
junctions and decisions.
o We don't need to know the specifics of the decisions, just the fact that there is a branch.
o The specific target label names aren't important-just the fact that they exist. So we can
replace them by simple numbers.
o To understand this, we will go through an example (Figure 2.2) written in a FORTRAN
like programming language called Programming Design Language (PDL). The
program's corresponding flowchart (Figure 2.3) and flowgraph (Figure 2.4) were also
provided below for better understanding.
o The first step in translating the program to a flowchart is shown in Figure 2.3, where we
have the typical one-for-one classical flowchart. Note that complexity has increased,
17
clarity has decreased, and that we had to add auxiliary labels (LOOP, XX, and YY), which
have no actual program counterpart. In Figure 2.4 we merged the process steps and
replaced them with the single process box.
o We now have a control flow graph. But this representation is still too busy. We simplify
the notation further to achieve Figure 2.5, where for the first time we can really see what
the control flow looks like.
18
Figure 2.4: Control Flow graph for example in Figure 2.2
Although graphical representations of flow graphs are revealing, the details of the control flow inside a program
19
they are often inconvenient.
In linked list representation, each node has a name and there is an entry on the list for each link
in the flow graph. Only the information pertinent to the control flow is shown.
Linked List representation of Flow Graph:
20
Figure 2.8: Alternative Flow graphs for
same logic (Statement "IF (A=0) AND
(B=1) THEN . . .").
An improper translation from flow graph to code during coding can lead to bugs, and improper translation during the test
design lead to missing test cases and causes undiscovered bugs.
Flowcharts can be
1. Handwritten by the programmer.
2. Automatically produced by a flowcharting program based on a mechanical analysis
of the source code.
3. Semi automatically produced by a flow charting program based in part on
structural analysis of the source code and in part on directions given by the
programmer.
There are relatively few control flow graph generators.
Path: A path through a program is a sequence of instructions or statements that starts at an entry,
junction, or decision and ends at another, or possibly the samejunction, decision, or exit.
o A path may go through several junctions, processes, or decisions, one or
more times.
o Paths consist of segments.
o The segment is a link - a single process that lies between two nodes.
o A path segment is succession of consecutive links that belongs to some path.
o The length of path measured by the number of links in it and not by the number
of the instructions or statements executed along that path.
o The name of a path is the name of the nodes along the path.
There are many paths between the entry and exit of a typical routine.
Every decision doubles the number of potential paths. And every loop multiplies the number of potential paths by the number
of different iteration values possible for the loop.
Defining complete testing:
1. Exercise every path from entry to exit.
2. Exercise every statement or instruction at least once.
3. Exercise every branch and case statement, in each direction at least once.
If prescription 1 is followed then 2 and 3 are automatically followed. But it is impractical for most routines. It
can be done for the routines that have no loops, in which it is equivalent to 2 and 3 prescriptions.
21
EXAMPLE: Here is the correct version.
For X negative, the output is X + A, while for X greater than or equal to zero, the output is X + 2A. Following
prescription 2 and executing every statement, but not every branch, would not reveal the bug in the following incorrect
version:
A negative value produces the correct answer. Every statement can be executed, but if the test cases do not force each
branch to be taken, the bug can remain hidden. The next example uses a test based on executing each branch but does
not force the execution of all statements:
The hidden loop around label 100 is not revealed by tests based on prescription 3 alone because no test forces the
execution of statement 100 and the following GOTO statement. Furthermore, label 100 is not flagged by the compiler
as an unreferenced label and the subsequent GOTO does not refer to an undefined label.
A Static Analysis (that is, an analysis based on examining the source code or structure) cannot determine whether a
piece of code is or is not reachable. There could be subroutine calls with parameters that are subroutine labels, or in
the above example there could be a GOTO that targeted label 100 but could never achieve a value that would send the
program to that label.
Only a Dynamic Analysis (that is, an analysis based on the code's behavior while running - which is to say, to all
intents and purposes, testing) can determine whether code is reachable or not and therefore distinguish between the
ideal structure we think we have and the actual, buggy structure.
Any testing strategy based on paths must at least both exercise every instruction and take branches in all directions.
A set of tests that does this is not complete in an absolute sense, but it is complete in the sense that anything less
22
must leave something untested.
So we have explored three different testing criteria or strategies out of a potentially infinite family of strategies.
23
Path Selection Example:
7. After you have traced a covering path set on the master sheet and filled in the table
for every path, check the following:
1. Does every decision have a YES and a NO in its column? (C2)
2. Has every case of all case statements been marked? (C2)
3. Is every three - way branch (less, equal, greater) covered? (C2)
24
4. Is every link (process) covered at least once? (C1)
8. Revised Path Selection Rules:
Pick the simplest, functionally sensible entry/exit path.
Pick additional paths as small variation from previous paths. Pick paths that do not
have loops rather than paths that do. Favor short paths that make sense over paths
that don't.
Pick additional paths that have no obvious functional meaning only if it's necessary to
provide coverage.
Be comfortable with your chosen paths. Play your hunches (guesses) and give your
intuition free reign as long as you achieve C1+C2.
Don't follow rules slavishly (blindly) - except for coverage.
LOOPS:
Cases for a single loop: A Single loop can be covered with two cases: Looping and Not looping. But, experience
shows that many loop-related bugs are not discovered by C1+C2. Bugs hide themselves in corners and congregate at
boundaries - in the cases of loops, at or around the minimum or maximum number of times the loop can be iterated.
The minimum number of iterations is often zero, but it need not be.
25
9. Attempt one more than the maximum number of iterations.
CASE 3: Single loops with excluded values
Treat single loops with excluded values as two sets of tests consisting of loops without
excluded values, such as case 1 and 2 above.
Example, the total range of the loop control variable was 1 to 20, but that values 7, 8,9,10
were excluded. The two sets of tests are 1-6 and 11-20.
The test cases to attempt would be 0,1,2,4,6,7 for the first range and 10,11,15,19,20,21
for the second range.
Kinds of Loops: There are only three kinds of loops with respect to path testing:
Nested Loops:
The number of tests to be performed on nested loops will be the exponent of the tests performed on single
loops.As we cannot always afford to test all combinations of nested loops' iterations values. Here's a tactic used
to discard some of these values:
1. Start at the inner most loop. Set all the outer loops to their minimum values.
2. Test the minimum, minimum+1, typical, maximum-1 , and maximum for the innermost
loop, while holding the outer loops at their minimum iteration parameter values. Expand the
tests as required for out of range and excluded values.
3. If you've done the outmost loop, GOTO step 5, else move out one loop and set it up as in
step 2 with all other loops set to typical values.
4. Continue outward in this manner until all loops have been covered.
5. Do all the cases for all loops in the nest simultaneously.
Concatenated Loops:
Concatenated loops fall between single and nested loops with respect to test cases. Two loops are concatenated
if it's possible to reach one after exiting the other while still on a path from entrance to exit.
If the loops cannot be on the same path, then they are not concatenated and can be treated as individual loops.
Horrible Loops:
A horrible loop is a combination of nested loops, the use of code that jumps into and out of loops,
intersecting loops, hidden loops, and cross connected loops.
Makes iteration value selection for test cases an awesome and ugly task, which is another reason such structures
should be avoided.
26
Figure 2.10: Example of Loop types
27
Put in limits or checks that prevent the combined extreme cases. Then you have to test the
software that implements such safety measures.
PREDICATE: The logical function evaluated at a decision is called Predicate. The direction taken at a decision
depends on the value of decision variable. Some examples are: A>0, x+y>=90.......
PATH PREDICATE: A predicate associated with a path is called a Path Predicate. For example, "x is greater than
zero", "x+y>=90", "w is either negative or equal to 10 is true" is a sequence of predicates whose truth values will cause
the routine to take a specific path.
MULTIWAY BRANCHES:
The path taken through a multiway branch such as a computed GOTO's, case statement, or
jump tables cannot be directly expressed in TRUE/FALSE terms.
Although, it is possible to describe such alternatives by using multi valued logic, an expedient
(practical approach) is to express multiway branches as an equivalent set of if..then..else
statements.
For example a three way case statement can be written as: If case=1 DO A1 ELSE (IF Case=2
DO A2 ELSE DO A3 ENDIF)ENDIF.
INPUTS:
In testing, the word input is not restricted to direct inputs, such as variables in a subroutine
call, but includes all data objects referenced by the routine whose values are fixed prior to
entering it.
For example, inputs in a calling sequence, objects in a data structure, values left in registers,
or any combination of object types.
The input for a particular test is mapped as a one dimensional array called as an Input Vector.
PREDICATE INTERPRETATION:
The simplest predicate depends only on input variables.
For example if x1,x2 are inputs, the predicate might be x1+x2>=7, given the values of x1 and
x2 the direction taken through the decision is based on the predicate is determined at input
time and does not depend on processing.
Another example, assume a predicate x1+y>=0 that along a path prior to reaching this predicate
we had the assignment statement y=x2+7. although our predicate depends on processing, we
can substitute the symbolic expression for y to obtain an equivalent predicate x1+x2+7>=0.
The act of symbolic substitution of operations along the path in order to express the predicate
solely in terms of the input vector is called predicate interpretation.
Sometimes the interpretation may depend on the path; for
28
example, INPUT X
ON X GOTO A, B, C, ...
A: Z := 7 @ GOTO HEM B: Z
:= - 7 @ GOTO HEM C: Z := 0
@ GOTO HEM
.........
HEM: DO SOMETHING
.........
HEN: IF Y + Z > 0 GOTO ELL ELSE GOTO EMM
The predicate interpretation at HEN depends on the path we took through the first multiway branch. It yields for the
three cases respectively, if Y+7>0, Y-7>0, Y>0.
The path predicates are the specific form of the predicates of the decisions along the
selected path after interpretation.
29
Any set of input values that satisfy all of the conditions of the path predicate expression
will force the routine to the path.
Sometimes a predicate can have an OR in it.
Example:
A: X5 > 0 E: X6 < 0
B: X1 + 3X2 + B: X1 + 3X2 + 17
17 >= 0
>= 0 C: X3 = 17
C: X3 = 17 D: X4 - X1 >=
D: X4 - X1 >= 14X2
14X2
PREDICATE COVERAGE:
Compound Predicate: Predicates of the form A OR B, A AND B and more complicated
Boolean expressions are called as compound predicates.
Sometimes even a simple predicate becomes compound after interpretation. Example: the
predicate if (x=17) whose opposite branch is if x.NE.17 which is equivalent to x>17. Or.
X<17.
Predicate coverage is being the achieving of all possible combinations of truth values
corresponding to the selected path have been explored under some test.
As achieving the desired direction at a given decision could still hide bugs in the associated
predicates
TESTING BLINDNESS:
Testing Blindness is a pathological (harmful) situation in which the desired path is achieved
for the wrong reason.
There are three types of Testing Blindness:
Assignment Blindness:
o Assignment blindness occurs when the buggy predicate appears to work correctly because
the specific value chosen for an assignment statement works with both the correct and
incorrect predicate.
o For Example:
Correct Buggy
X = 7 X = 7
........ ........
if Y > 0 if X+Y > 0
then ... then ...
o If the test case sets Y=1 the desired path is taken in either case, but there is still a bug.
Equality Blindness:
o Equality blindness occurs when the path selected by a prior predicate results in a value
30
that works both for the correct and buggy predicate.
o For Example:
Correct Buggy
if Y = 2 then if Y = 2 then
........ ........
if X+Y > 3 if X > 1
then ... then ...
o The first predicate if y=2 forces the rest of the path, so that for any positive value of x. the
path taken at the second predicate will be the same for the correct and buggy version.
Self Blindness:
o Self blindness occurs when the buggy predicate is a multiple of the correct predicate and as a
result is indistinguishable along that path.
o For Example:
Correct Buggy
X=A X=A
........ ........
if X-1 > if X+A-2 > 0
0 then ...
then ...
1. The assignment (x=a) makes the predicates multiples of each other, so the direction taken is the same for the
correct and buggy version.
PATH SENSITIZING:
31
o HEURISTIC PROCEDURES FOR SENSITIZING PATHS:
1. This is a workable approach, instead of selecting the paths without considering how to
sensitize, attempt to choose a covering path set that is easy to sensitize and pick hard to
sensitize paths only as you must to achieve coverage.
2. Identify all variables that affect the decision.
3. Classify the predicates as dependent or independent.
4. Start the path selection with un correlated, independent predicates.
5. If coverage has not been achieved using independent uncorrelated predicates, extend the
path set using correlated predicates.
6. If coverage has not been achieved extend the cases to those that involve dependent
predicates.
7. Last, use correlated, dependent predicates.
PATH INSTRUMENTATION:
1. Path instrumentation is what we have to do to confirm that the outcome was achieved by
the intended path.
2. Co-incidental Correctness: The coincidental correctness stands for achieving the
desired outcome for wrong reason.
32
1. Interpretive Trace Program:
o An interpretive trace program is one that executes every statement in order and records
the intermediate values of all calculations, the statement labels traversed etc.
o If we run the tested routine under a trace, then we have all the information we need to confirm
the outcome and, furthermore, to confirm that it was achieved by the intended path.
o The trouble with traces is that they give us far more information than we need. In fact,
the typical trace program provides so much information that confirming the path from
its massive output dump is more work than simulating the computer by hand to confirm
the path.
o Why Single Link Markers aren't enough: Unfortunately, a single link marker may not
do the trick because links can be chewed by open bugs.
33
We intended to traverse the ikm path, but because of a rampaging GOTO in the middle of the
m link, we go to process B. If coincidental correctness is against us, the outcomes will be the
same and we won't know about the bug.
34