SWE2005 - Software Testing - Review 1.1.2

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 15

SWE2005 - SOFTWARE TESTING

WINTER SEMESTER (2020-2021)

TITLE: SOFTWARE PIRACY PROTECTION SYSTEM


Review – 1

19MIS0062-MOHAMMED FAIZ.N.H
19MIS0098-MULLAIVENDHAN.S.P

19MIS0115-BHARATH.S
 FACULTY
RAMESH P.S
ABSTRACT :
Software piracy is the illegal copying , distribution,
or use of software . It is such a profitable
‘’BUSINESS” that it has caught the attention of
organized crime groups in a number of countries,
Software piracy causes significant lose revenue for
publishers , which in turn results in higher prices for
the consumer . When you purchase a commercial
software package , an end user license agreement
(EULA)is included to protect that software program
from copyright infringement.
Typically , the license states that you can install the original
copy of software you bought on one computer and that you can
make a backup copy in case the original lost or damaged .You
agree to the licensing agreement when you open the software
package ,when you envelope that contains the software disks ,
or when you install the software .Software piracy applies
mainly to full function commercial software .The time limited
or function restricted versions of commercial software called
shareware are less likely to be paired since they are freely
available .Similarly , freeware, a type of software that is
copyrighted but freely distributed at ni charge, also offers little
incentive for piracy
Objectives:
• All fields entries must work properly.
• Pages must be activated from the identified link.
• We prevent the software piracy of Local Systems.
• prevents illegal use of the Software using many
techniques.
• Securing the software from being pirated
• Getting the hardware details.
• The entry screen, messages and responses must
not be delayed
Scope:

An objective of the system is used to overcome this


problem , it is used to protect the piracy of the
software . It is used for online process . In this
system only allows the authorized person , because
it checks the MAC addresses not used for other
user .
Software piracy , also known as copyright
infringement of software , is the unauthorized
duplication or distribution of copyrighted computer
software . Although most computer users today are
aware that unauthorized use and duplication of
software is illegal , many show a general disregard
for the importance og treating software as valuable
intellectual property.
Exact tool used:
SELENIUM WEBDRIVER:

Selenium WebDriver tool is used to automate


web application testing to verify that it works as
expected. It supports many browsers such as
Firefox, Chrome, IE, and Safari. However, using the
Selenium WebDriver, we can automate testing for
web applications only . It does not qualify for
window-based applications. It also supports
different programming languages such as C#, Java,
Perl, PHP and Ruby for writing test scripts .
Selenium Web driver is platform-independent since
the same code can be used on different Operating
Systems like Microsoft Windows, Apple OS and
Linux .It is one of the components of the selenium
family, which also includes Selenium IDE, Selenium
Client API, Selenium Remote Control and Selenium
Grid.
TESTING METHODOLOGY
The purpose of testing is to discover errors. Testing is the
process of trying to discorevery conceivable fault or weakness
in a work product. It is the process of exercising software with
the intent of ensuring that the Software system meets its
requirements and user expectations and does not fail in
acceptable manner. There are various types of test. Each test
type addresses a specific testing requirement.
UNIT TESTING:
Unit testing involves the design of test cases that validate that
the internal program logics functioning properly, and that
program inputs produce valid outputs. All decision branches and
internal code flow should be validated. It is the testing of
individual software units of the application .it is done after the
completion of an individual unit before integration. This is a
structural testing, that relies on knowledge of its constructional
is invasive.
INTEGRATION TESTING:
Integration tests are designed to test integrated software
components to determine if they actually run as one program.
Testing is event driven and is more concerned with the basic
outcome of screens or fields. Integration tests demonstrate that
although the components were individually satisfaction, as
shown by successfully unit testing.
FUNCTIONAL TESTING:

Functional tests provide systematic demonstrations that


functions tested are available as specified by the business and
technical requirements, system documentation, and user
manuals. Functional testing is centered on the following items:

Valid Input : identified classes of valid input must be accepted .


Invalid Input : identified classes of invalid input must be
rejected.
Functions : identified functions must be exercised.
Output : identified classes of application outputs must be
exercised . Systems/Procedures:

Interfacing systems or procedures must be invoked .


Organization and preparation of functional tests is focused on
requirements, key functions, or special test cases.
SYSTEM TESTING :
System testing ensures that the entire integrated software
system meets requirements. It tests a configuration to ensure
known and predictable results. An example of system testing is
the configuration oriented system integration test.
ARCHITECTURAL DIAGRAMS:

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy