ࡱ>  t5bjbj 4-\  EEEEEYYY8\Y1^"o4]]]]]]]$`bt]E]EE]   FEE] ]  2W^\7vYv2Y.]]<1^`Y1d{*1d\^\1dE^\( ]]d1^1d : Introduction: How to Use This Template An application test strategy is a crucial input into the testing effort for software implementation projects. A test strategy is a document that defines the scope, approach, and schedule of the planned testing activities. It identifies, at a high level, the items that require testing along with the resources who will execute the testing. For further information on test planning, read the ITA Premium research note, Five Fundamentals of a Successful Application Test Strategy. The template contains six sections that should be updated with information applicable to the software being tested. Complete the relevant sections: Test Overview Test Schedule Test Resources Test Environment Defect Tracking Test Metrics Cover Sheet Notes on Usage: In order to use this template effectively, overwrite text that is in italics and colored grey with the enterprises own information. Prepared for: Insert company name Prepared by: Insert creators name Insert address Insert phone # and contact info Date Created: Insert todays date Date Last Revised: Insert applicable date 1. Purpose The purpose of the test strategy document is to inform project management and project sponsors of the approach that will be taken with testing. This document strives to ensure that the budget, start up time, facilities, and resources are anticipated and approved prior to the start of the testing phase. Describe additional reasons for having a test strategy this section. The purpose should include project statements or links to other project documents like the charter. The testing effort should be described in the context of the purpose of the overall project with links to external information that not all people may be aware of. 2. Test Overview 2.1 Test Objectives The following are the objectives of the test strategy document. The test objectives should include information such as a summary of the products being tested, testing aims and goals, high-level schedule, etc. Example: The overall test effort will commence on DD/MM/YYYY and will be executed for a period of X months. The test effort is scheduled for completion on DD/MM/YYYY. Example: All high priority requirements must pass through 2 rounds of successful application testing prior to sign-off. 2.2 Test Approach The following specifies the testing phases that will be integrated in the overall testing effort and estimates the required effort and duration for each. Refer to ITA Premium research note, HYPERLINK "http://www.infotech.com/Research/Notes/ITAP/SetYourSightsOntheSixSoftwareTestingTargets.aspx?PublicationNumber=%7b1A5B2BE6-5834-4A38-ABE4-DF36ECEBD6BC%7d&SubCenter=%7b728F5C9C-81CD-4ACB-803C-F4513448D41C%7d&referredFrom=searchEngine"Set Your Sights on the Six Software Testing Targets to understand the six types of testing recommended to achieve a high quality end product: Unit Testing, Functional Testing, System Testing, Regression Testing, System Integration Testing, and Acceptance Testing. Example: The testing effort will involve six phases of testing to be executed in the following order: unit testing, functional testing, system testing, regression testing, system integration testing, and acceptance testing. Example: The unit test phase will commence on DD/MM/YYYY and will run for 4 weeks throughout the development effort. 2.3 Test Scope The test strategy scope defines the high-level items that will be tested and also details items excluded from testing. The scope should include applications and systems that are in scope and out of scope. If major functions or process are known those should also be included. Items included in test scope Example: Functional capabilities including: accounts receivable, accounts payable, contact management Example: Performance testing, load testing, data conversion testing Items excluded from test scope Example: Functional capabilities including: service requests, sales force automation 3. Test Schedule The test schedule outlines the dates during which each phase of testing is planned to take place. In addition, it includes key milestones for each testing effort and specifies the milestone date. 3.1 Key Assumptions for Test Schedule In this section, discuss points regarding how testing will be scheduled taking into consideration the way the project is being run. For example, the project may involve multiple releases and the overall release testing schedule could be included in this section. Alternately, the project may be using an iterative approach and it may be necessary to state that testing for one iteration overlaps the requirements/design piece of the next iteration. Table 1 describes the known start and end dates of the various phases of testing. It also includes key milestones and their corresponding dates. Table 1. Test Schedule The test schedule should list all known dates for the various phases of testing. Maintain the overall test schedule within the test strategy document as dates become available further into the project. Test PhaseStart DateEnd DateDurationKey MilestonesMilestone DateExample: Overall Test EffortDD/MM/YYYYDD/MM/YYYY70 work daysComplete Draft Test PlanDD/MM/YYYYAchieve Test Plan Sign-off from Project ManagementDD/MM/YYYYExample: Unit TestingDD/MM/YYYYDD/MM/YYYY15 work daysComplete Unit Test PlanDD/MM/YYYYUnit Test major components A,B, and CDD/MM/YYYY    4. Test Resources The following resources will be completely or partially dedicated to the testing effort. The roles each will play in the testing phase are as follows: List the people that will be executing testing and the role(s) each will play. Specify which testing phase the resource will take part in. Table 2. Test Resources ResourceTest AssignmentTest PhaseResource 1GUI layout, font consistency, Color usage, style, sizeUnit Test, Functional Test, System Test, System Integration Test, Regression Test, Acceptance TestResource 2 Stress test, load test, volume limitsSystem Integration Test, Regression TestResource 3Installation, On-line user documentationSystem Test, System Integration Test, Regression Test   . 5. Test Environment The following criteria must be met to fulfill the test environment requirements. 5.1 Hardware Requirements Identify the hardware required to build a testing environment. Examples include: Computers Networks Printers Mainframe access 5.2 Software Requirements Identify the software required to complete testing activities. Examples include: Software in addition to what is being tested Test management software Automated testing software External databases 5.3 Logistical Requirements Identify the testing environment logistics. Examples include: Office space needs Seating assignments Office furniture Disaster recovery site Testing lab Remote site 5.4 Publications Requirements Identify all documents, manuals, and user guides that are required to support the testing team. Examples include: Use cases Application requirements Out-of-the-box application guides Application design specifications 6. Defect Tracking The following process defines how to raise, track, and resolve defects found throughout testing. Describe how defects will be raised, tracked, communicated, and resolved. Where possible, use a process flow diagram to describe how the various teams involved in testing will interact to reach issue resolution. When raising a defect, include the following information: Date Raised specify the date the defect was raised Raised By specify the resource who raised the defect Issue Description a description of the defect. Include detailed steps on how to reproduce the issue. Testing Phase specify the phase in which the defect was raised i.e. functional test, system test, etc. Severity assign a severity to the defect Priority assign a priority to the defect Assigned To specify the developer which the defect is assigned to for resolution. Sign-off Date specify the date the developer fixes and signs-off the defect back to the tester Sign-off Description the developer provides a description of what was done to fix the issue. A defect priority level can be used along with severity to help determine the urgency in fixing the defect. When assigning a severity or priority to a defect, the following scale can be used to help assigning rankings: Severity Scale High: A major issue where a large piece of functionality or major system component is completely broken. There is no workaround and testing must halt. Medium: A significant issue where a large piece of functionality or major system component is not working properly. There is a workaround, however, and testing can proceed. Low: A minor issue that imposes some loss of functionality, but for which there is an acceptable and easily reproducible workaround. Testing can proceed without interruption. Priority Scale High: This has a major impact on the customer. This must be fixed immediately. Medium: This has a major impact on the customer. The problem should be fixed before release of the current version in development, or a patch must be issued if possible. Low: This has a minor impact on the customer. The flaw should be fixed if there is time, but it can be deferred until the next release. 7. Test Metrics Test metrics provide a vehicle to communicate testing progress to the project team. The following information will be collected from test results to develop testing metrics. In the table, list the information that should be recorded for metric calculations. Examples: Functional Metrics: Number of requirements verified (may be broken down by testing phase, component, testing resource or all of the above) Code Metrics: Percent of code executed (may be broken down by test and/or component) Problem Metrics: Problems found per day, problems found per component Schedule Metrics: Percent of tests completed Estimated days to completion Time to complete testing by component Table 3. Metric Collection Details MetricPurposeRequired Information      8. Test Strategy Sign-Off The sign-off below indicates that the following person(s) have reviewed the test strategy document and approve of the content. The Test Strategy Sign-off section allows the person(s) acting as the Test Manager, Project Manager and Business Sponsor to indicate they have reviewed the strategy and approve the content. The person(s) who are required to review the document and sign-off should be established during the initial project planning phase. Name_________________________ Role_____________________ Sign-off Date_________________ Name_________________________ Role_____________________ Sign-off Date_________________ Name_________________________ Role_____________________ Sign-off Date_________________ Name_________________________ Role_____________________ Sign-off Date_________________ _____________________________________________________ Info-Tech Research Group tools and template documents are provided for the free and unrestricted use of subscribers to Info-Tech Research Group services. Use this document either in whole or in part as a basis and guide for document creation. To customize this document with corporate marks and titles, simply replace the Info-Tech Information in the Header and Footer fields of this document.     Applica Template ITA Premium: Implement & Integrate PAGE  PAGE 4 &'<D|   % }  䶾侤䜫䈁o^ htWhT6B*^JaJph#htWhT56B*^JaJph hBhThh2hAJB*phh"B*phh{]B*ph h hhh2hh2B*phh;YB*phh:`fB*phh hh2B*phh h B*phh B*phhh2B*phhF]B*phhQ>hB*ph$'( XI & FEƀ٪f.gdh2I & FEƀ٪f.gdh2 7$8$H$gd gdQ>gdQ> k!I & FEƀ٪f.gdh2I & FEƀ٪f.gdh2I & FEƀ٪f.gdh2   B l m n gd `gdTgdTgdTgd gdh2I & FEƀ٪f.gdh2  . A U k l t ?`)*W_hjkxtpfhg66B*phhg6h_$< hAJhAJhAJhAJaJ hAJhg6hQ.6B*phhj$6B*phhQ.6B*phhQ.hQ.6B*ph hQ.hQ.hQ.hThRwhTB*^JphhBhT56B*^JphhRwhT6B*^JphhBhT5^J(n o p q s t u *jkI & FEƀ٪fgdAJgdAJgdAJgdQ.gdAJgd  !"#01򽷮q]qNqh3>h3>0J6B*ph'jh3>h3>6B*Uph!jh3>h3>6B*Uphh3>h3>6B*phh4"6B*phh3> hAJhihi hiaJ hAJhiaJ h3>aJ hg6hg66B*phh)P6B*ph hohoho6B*phhAJho6B*phhg66B*phhAJ1I & FEƀ٪fgdi 7$8$H$gd3>gdigdigdQ. & Fgdg6:IJLNOPZ[np789WX`ukukuukuk`hg6hg6B*phh_$<6B*phh_$<h_$<6B*ph h_$<5h_$<h_$<5hh_$<5h_$< hAJhoho hiaJ hAJhoaJ hj$aJ h3>aJ hihi6B*phh)P6B*phhi6B*phhAJhi6B*phhih3>h3>6B*ph$IJKL[op89X$a$gdoh^hgdg6 & Fgd_$<gd_$<gdogdoI & FEƀ٪fgdi8vwx  " $Ifgd4"l  & Fgd_gd_gd_gdPP gdPP gdAJgdo)5e()*0Wuwx   "45:;prsz{⡚h)PhLfh6B*phhLfhPP 5 hPP h_h_hPP 6B*ph h_5hihi5 hc5 hchchchc6B*phh_h_6B*phh_6B*phh_hh3>hihPP 2 %45S^iv$IfgdPP l Ff$Ifgd4"l 2$IfgdPP l kd$$IfTl4ֈ]& !J(```` t0644 laytLfT$IfgdPP l 2$Ifgdl kda$$IfTl4ֈ]& !J(     t0644 laytLfT /:$IfgdPP l $Ifgdl :;<=2$IfgdPP l kd!$$IfTl4ֈ]& !J(```` t0644 laytLfT=>?ep$Ifgdl $IfgdPP l pqrs2$IfgdPP l kd$$IfTl4ֈ]& !J(     t0644 laytLfTstuvwx$IfgdPP l xyz{4!!$IfgdPP l kd$$IfTlֈ]& !J( t0644 laytLfT{|}~$IfgdPP l 4!!$IfgdPP l kdJ $$IfTlֈ]& !J( t0644 laytLfT567@D`    8 m n ǽǨ햌~햌q`~` hihi6B*mH phsH hih{]6B*phhi6B*mH phsH hi6B*phhihi6B*ph hi5hhi5 hW5hh5h6B*phhi6B*phh!'yhi6B*ph hi5CJh{]hqDhi hPP hPP hh)P#$IfgdPP l 4/**gdigdPP kd $$IfTlֈ]& !J( t0644 laytLfT67 $Ifgd{]gdigdi  DE<<< $Ifgdikd $$IfTlF6'  t0J(6    44 lapytP&T jaaaa $Ifgdikd $$IfTlF6' t0J(6    44 laytP&T   8 n jaaa $IfgdikdQ $$IfTlF6' t0J(6    44 laytP&Tn o p q r s jaaaa $Ifgdikd $$IfTlF6' t0J(6    44 laytP&Tn o p q s t u v x y z { }  !!#!V!W!`!a!k!r!!޶޶tjt]S]ShE6B*phhEhE6B*phhEhE5\hE6B*\phhEhE6B*\ph h,/5\h,/hE0J h,/0Jh{]hE hAJhihihihi6B*phhi6B*ph hihi6B*mH phsH hih{]6B*phh{]6B*phh]0himH sH  s t u v w x jaaaa $Ifgdikd $$IfTlF6' t0J(6    44 laytP&Tx y z { | } jaaaa $Ifgdikdg$$IfTlF6' t0J(6    44 laytP&T} ~ !jee```[[[[gdEgdEgdikd$$IfTlF6' t0J(6    44 laytP&T !W!a!j!fI & F Eƀ٪fgdEI & F Eƀ٪fgdEgdEj!s!!!!!kfafgd,/gdEI & F Eƀ٪fgdEI & F Eƀ٪fgdE!!!!!!!!!e"f""""#(#)#*#G#I#J#K#######$ $#$$$%$&$J$Q$R$$$$%%%%%ɿ󿨿䡝qhh56B*phhh6B*phhh6B*phhh hE5CJh,/6B*phh,/h{]6B*phhE6B*phh,/hE6B*phhEhE6B*\phhEh,/ hRhEhEhE6B*ph,!"7"R"k!I & F Eƀ٪fgdEI & F Eƀ٪fgdEI & F Eƀ٪fgdER"e"f""""aI & F Eƀ٪fgdEgd,/gdEI & F Eƀ٪fgdE"""#k!I & F Eƀ٪fgdEI & F Eƀ٪fgdEI & F Eƀ٪fgdE##)#*#J##kfa\gdEgd,/gd{]I & F Eƀ٪fgd,/I & F Eƀ٪fgdE###$k!I & F Eƀ٪fgdEI & F Eƀ٪fgdEI & F Eƀ٪fgdE$$$%$&$($)$<$$$u%v%%%gdgdgdE^gdEI & F Eƀ٪fgdE %%&&k!I & FEƀ٪fgdI & FEƀ٪fgdI & FEƀ٪fgd%%&.&&&&&&'' ','3'C'N'''' (V(W(X((5)H)))**9+L+++C,F,,,,,---.Ÿūŝ䕑rhh56B*phh6B*ph h5CJhhh6hh56B*phhh6B*phhh6B*phh6B*phh56B*phh6B*phhh6B*phhh56B*ph+&&'C'cI & FEƀ٪fgd & FgdI & FEƀ٪fgdC'''W(k!I & FEƀ٪fgdI & FEƀ٪fgdI & FEƀ٪fgdW(X(4)5)D))*9+H++C,,,,,,,-----gdgd & Fgd & Fdd[$\$gd & Fgdgd-{../k!I & FEƀ٪fgdI & FEƀ٪fgdI & FEƀ٪fgd.{..../&/C/////////////////////////// 000111-2.2H3ǻǣǛvlvh5Z6B*phhU}6B*ph hU}hU}h{]hU}hh)Phhah5hB*CJaJphh{]B*CJaJphh)PB*CJaJphhhB*CJaJphhh6B*aJphhh56B*phhh6B*ph*/C/`//k!I & FEƀ٪fgdI & FEƀ٪fgdI & FEƀ٪fgd////// $Ifgd{]$gdgd//////C:::: $Ifgdkd$$IfTlLF2 ," r   t06    44 lapytP&T//////jaaaa $Ifgdkd$$IfTlF2 ," r  t06    44 laytP&T//////jaaaa $Ifgdkd$$IfTlF2 ," r  t06    44 laytP&T//////jaaaa $Ifgdkd6$$IfTlF2 ," r  t06    44 laytP&T//////jaaaa $Ifgdkd$$IfTlF2 ," r  t06    44 laytP&T////////////je`````````gdgdkd$$IfTlF2 ," r  t06    44 laytP&T //0001111.2/20212222222222222H3I3h^hgdU} & FgdU}gdU}gdU}gdU}gdH3I3J3M3N3T3U335555555 5!5#53545C5X5Y5Z5[5a5b5c5d5e5f5l5m5n5o5p5q5r5s5t5ϼzzvrzgzvrhf 0JmHnHuhkPhP& hP&0JjhP&0JUh;Yh;YB*OJQJphh2Mh;YB*OJQJph%h`okh;YB*CJ0OJQJaJ0ph%h`okh;YB*CJ,OJQJaJ,phhLfjhLfU h3*Ahh hhhzxhh hU}hU}'I3J3K3L3M3N3O3P3Q3R3S3T3U3335555555 5"5#5Y5Z5^gdf $a$gdgdZ5c5d5e5p5q5r5s5t5 &`#$gdkP21h:pf / =!":#$% CDyK yK http://www.infotech.com/Research/Notes/ITAP/SetYourSightsOntheSixSoftwareTestingTargets.aspx?PublicationNumber=%7b1A5B2BE6-5834-4A38-ABE4-DF36ECEBD6BC%7d&SubCenter=%7b728F5C9C-81CD-4ACB-803C-F4513448D41C%7d&referredFrom=searchEngine:$$If!vh555555#v:V l  t<06,5p<ytLfT kdC$$IfTlֈ]& !J(  t<0644 lap<ytLfT$$If!vh555555#v:V l4 t06++++5ytLfT$$If!vh555555#v:V l4 t06++++5ytLfT$$If!vh555555#v:V l4 t06++++5ytLfT$$If!vh555555#v:V l4 t06++++5ytLfT$$If!vh555555#v:V l t065ytLfT$$If!vh555555#v:V l t065ytLfT$$If!vh555555#v:V l t065ytLfT$$If!vh555#v#v#v:V l  t0J(6,555pytP&T$$If!vh555#v#v#v:V l t0J(6555ytP&T$$If!vh555#v#v#v:V l t0J(6555ytP&T$$If!vh555#v#v#v:V l t0J(6555ytP&T$$If!vh555#v#v#v:V l t0J(6555ytP&T$$If!vh555#v#v#v:V l t0J(6555ytP&T$$If!vh555#v#v#v:V l t0J(6555ytP&T$$If!vh5 5r 5 #v #vr #v :V lL  t06,5 5r 5 pytP&T$$If!vh5 5r 5 #v #vr #v :V l t065 5r 5 ytP&T$$If!vh5 5r 5 #v #vr #v :V l t065 5r 5 ytP&T$$If!vh5 5r 5 #v #vr #v :V l t065 5r 5 ytP&T$$If!vh5 5r 5 #v #vr #v :V l t065 5r 5 ytP&T$$If!vh5 5r 5 #v #vr #v :V l t065 5r 5 ytP&T^ 2 0@P`p2( 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p8XV~_HmH nH sH tH D`D  NormalOJQJ_HaJmH sH tH R@R   Heading 1$<@&5CJ KH \^JaJ TT  Heading 2$<@&56CJ\]^JaJN@N   Heading 3$<@&5CJ\^JaJDA`D Default Paragraph FontRi@R  Table Normal4 l4a (k (No List 4@4 2MHeader  !4 @4 2MFooter  !j@j   Table Grid7:V0B'!B h2Comment ReferenceCJaJ8@28 h2 Comment TextaJ@j12@ h2Comment Subject5\HRH h2 Balloon TextCJOJQJ^JaJ^Oa^ ,/Heading 3 Char*5CJOJQJ\^J_HaJmH sH tH F"@F Caption5B*CJ\aJphORR Comment Text CharOJQJ_HmH sH tH 6U@6 3> Hyperlink >*B*phFVF )PFollowedHyperlink >*B* ph.)@. P& Page NumberPK![Content_Types].xmlj0Eжr(΢Iw},-j4 wP-t#bΙ{UTU^hd}㨫)*1P' ^W0)T9<l#$yi};~@(Hu* Dנz/0ǰ $ X3aZ,D0j~3߶b~i>3\`?/[G\!-Rk.sԻ..a濭?PK!֧6 _rels/.relsj0 }Q%v/C/}(h"O = C?hv=Ʌ%[xp{۵_Pѣ<1H0ORBdJE4b$q_6LR7`0̞O,En7Lib/SeеPK!kytheme/theme/themeManager.xml M @}w7c(EbˮCAǠҟ7՛K Y, e.|,H,lxɴIsQ}#Ր ֵ+!,^$j=GW)E+& 8PK!Ptheme/theme/theme1.xmlYOo6w toc'vuر-MniP@I}úama[إ4:lЯGRX^6؊>$ !)O^rC$y@/yH*񄴽)޵߻UDb`}"qۋJחX^)I`nEp)liV[]1M<OP6r=zgbIguSebORD۫qu gZo~ٺlAplxpT0+[}`jzAV2Fi@qv֬5\|ʜ̭NleXdsjcs7f W+Ն7`g ȘJj|h(KD- dXiJ؇(x$( :;˹! I_TS 1?E??ZBΪmU/?~xY'y5g&΋/ɋ>GMGeD3Vq%'#q$8K)fw9:ĵ x}rxwr:\TZaG*y8IjbRc|XŻǿI u3KGnD1NIBs RuK>V.EL+M2#'fi ~V vl{u8zH *:(W☕ ~JTe\O*tHGHY}KNP*ݾ˦TѼ9/#A7qZ$*c?qUnwN%Oi4 =3ڗP 1Pm \\9Mؓ2aD];Yt\[x]}Wr|]g- eW )6-rCSj id DЇAΜIqbJ#x꺃 6k#ASh&ʌt(Q%p%m&]caSl=X\P1Mh9MVdDAaVB[݈fJíP|8 քAV^f Hn- "d>znNJ ة>b&2vKyϼD:,AGm\nziÙ.uχYC6OMf3or$5NHT[XF64T,ќM0E)`#5XY`פ;%1U٥m;R>QD DcpU'&LE/pm%]8firS4d 7y\`JnίI R3U~7+׸#m qBiDi*L69mY&iHE=(K&N!V.KeLDĕ{D vEꦚdeNƟe(MN9ߜR6&3(a/DUz<{ˊYȳV)9Z[4^n5!J?Q3eBoCM m<.vpIYfZY_p[=al-Y}Nc͙ŋ4vfavl'SA8|*u{-ߟ0%M07%<ҍPK! ѐ'theme/theme/_rels/themeManager.xml.relsM 0wooӺ&݈Э5 6?$Q ,.aic21h:qm@RN;d`o7gK(M&$R(.1r'JЊT8V"AȻHu}|$b{P8g/]QAsم(#L[PK-![Content_Types].xmlPK-!֧6 +_rels/.relsPK-!kytheme/theme/themeManager.xmlPK-!Ptheme/theme/theme1.xmlPK-! ѐ' theme/theme/_rels/themeManager.xml.relsPK] t- CN[[[^ n !%.H3t5!#&3;AINX n  :=psx{ n s x } !j!!R""##$%&C'W(-/////////I3Z5t5 "$%'()*+,-./012456789:<=>?@BCDEFGHJKLMOPQRSTUVWYZ  t-XCJNUW^!!  OR$Vvn"9R2riOg 3R$v`4dR$.;Krpǂk;PR$Q-+QHc+e@H 0(  0(  B S  ?^ _Toc438481218 _Toc438481219 _Hlt182755300 _Hlt182754724 _Hlt184717213 _Hlt184717214.   u-@@@@.U   u------- -"-#-r-u-&7 ''------ -"-#-r-u-3333&}}   ''''''''))+-------- -"-#-3-b-e-o-r-u--------- -"-#-*-*-r-u-m B|s+ *&-qY^W_to~@ukh\;53-ܹb~8uO@S(7A*|GbRhj*pWF.pXwlaw[$E^!i/̘!oFFWqDL&sdbn-tSY5w}{h^`B*OJQJo(phhHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHh^`B*OJQJo(phhHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hHh^`B*OJQJo(phhHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHh^`B*OJQJo(phhHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hH^`o(. ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.h^`B*o(phhH.h^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHh ^`o(hH.h ^`o(hH.hpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHh^`B*OJQJo(phhHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHh^`B*OJQJo(phhHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHh^`B*OJQJo(phhHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHh^`B*OJQJo(phhHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHh^`B*OJQJo(phhHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHhHH^H`B*OJQJo(phhHh^`OJQJ^Jo(hHoh^`OJQJo(hHh  ^ `OJQJo(hHh^`OJQJ^Jo(hHohXX^X`OJQJo(hHh((^(`OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHh^`B*OJQJo(phhHh ^`o(hH.hpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHh^`B*o(phhH.h ^`hH.h pLp^p`LhH.h @ @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PLP^P`LhH.O@n-t;53-aw[b~83X!o&s|GbRm os+ -qYFWq(7Ak5w}W_pW^!iЏi        Џi                 Џi        Џi                          (                 _        Џi        Џi        Џi        pe        Џi        Џi        _        _                D        DCpbof PP )P%qD7c9WAJ4"j$"p%#q-Q.,/h2#3_(4g68o:_$< J2M#jOkP;Y5Ze\F]:Q`Lf:`f`okzrzx}z<}U} {]W"x,Q>H;ETycP&3>W,i _--@St-x@UnknownfyikG*Ax Times New Roman5Symbol3. *Cx Arial?. Arial Black5. .[`)Tahoma?= *Cx Courier New;WingdingsA$BCambria Math"h gg]& Q]& Q!24d-- 3qHP ?W2!xxQuality Assurance, Quality Assurance Testing, QA, QA Testing, Testing, Application Development, Application Testing, Test Plan, Test Strategy, StrategyKRISHNAKRISHNA\               Oh+'0@Td t    KRISHNAQuality Assurance, Quality Assurance Testing, QA, QA Testing, Testing, Application Development, Application Testing, Test Plan, Test Strategy, Strategy cjh Nov Wk5NormalKRISHNA1Microsoft Office Word@Ik@@P@"aW ]&՜.+,D՜.+,, hp|  Q-  Title X2Nb r _PID_HLINKSWorkflow StatusContent Pitch Month ContentTypeCategorizationsProduction CommentsContentTypeId Pitch MonthA Phttp://www.infotech.com/Research/Notes/ITAP/SetYourSightsOntheSixSoftwareTestingTargets.aspx?PublicationNumber=%7b1A5B2BE6-5834-4A38-ABE4-DF36ECEBD6BC%7d&SubCenter=%7b728F5C9C-81CD-4ACB-803C-F4513448D41C%7d&referredFrom=searchEngineS Re-Write Complete NovemberITAP Implement Download|
ITA Premium > Applications > Application Development Process > Software Quality Assurance & Testing

P0x010100D489FAF82DF6564989E4E862F4BD4A930D00A12CF105F9283344AA834FED6761492C2007-11-20T00:00:00Z  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[]^_`abcdefhijklmnopqrstuvwxyz{|}~Root Entry FpAvData \L1TablegdWordDocument4SummaryInformation(DocumentSummaryInformation8CompObjy  F'Microsoft Office Word 97-2003 Document MSWordDocWord.Document.89q