You are here
Acceptance criteria
The expected results or performance characteristics that define whether the test case passed or failed.
Acceptance Testing / User Acceptance Testing
An acceptance test is a test that a user/sponsor and manufacturer/producer jointly perform on a finished, engineered product/system through black-box testing (i.e., the user or tester need not know anything about the internal workings of the system). It is often referred to as a(n) functional test, beta test, QA test, application test, confidence test, final test, or end user test
Accessibility Testing
Verifying a product is accessible to the people having disabilities (deaf, blind, mentally disabled etc.).
Ad-hoc Testing
Testing carried out using no recognised test case design technique. It is also known as Exploratory Testing
Agile Testing
Testing practice for projects using agile methodologies, treating development as the customer of testing and emphasizing a test-first design paradigm
Alpha Testing
In software development, testing is usually required before release to the general public. This phase of development is known as the alpha phase. Testing during this phase is known as alpha testing. In the first phase of alpha testing, developers test the software using white box techniques. Additional inspection is then performed using black box or grey box techniques.
Arc Testing / Branch Testing
A test case design technique for a component in which test cases are designed to execute branch outcomes. A test method satisfying coverage criteria that require that for each decision point, each possible branch be executed at least once.
AUT
Application Under Test
Authorization Testing
Involves testing the systems responsible for the initiation and maintenance of user sessions. This will require testing the Input validation of login fields ,Cookie security,and Lockout testing .This is performed to discover whether the login system can be forced into permitting unauthorised access. The testing will also reveal whether the system is susceptible to denial of service attacks using the same techniques.