1. Web application
The application has two modes, C/S and B/S. C/S mode, that is, Client/Server (client/server) mode, this type of program can run independently. B/S mode, that is, Browser/Server (browser/server) mode, this type of program needs to be run with the help of a browser.
Web applications are generally in B/S mode. A Web application is composed of various Web components (web components) that complete specific tasks and displays services to the outside world through the Web. In actual applications, Web applications are composed of multiple Servlets, JSP pages, HTML files, image files, etc.
Now that we understand web applications, how to test them?
2. Functional testing
Functional testing is to verify the functions of the product. The test points are:
Link test
(1) Whether all links link to the linked page as instructed
(2) Whether the linked page exists
(3) Ensure that there are no orphan pages
Form test
(1)Verify that the server can correctly save these data
(2)The program running in the background can correctly Interpret and use this information
Cookies Test
(1) Whether Cookies work
(2) Whether Cookies are saved for a scheduled time
( 3) What impact does refreshing have on Cookies
Design language test
(1) Different versions of the design language will cause serious problems on the client and server sides
Database test
(1) Data consistency error: The submitted form information is incorrect
(2) Output error
Related functional tests
(1)Delete/ Adding an item: Does it affect other items? Are these effects correct?
(2) List default value check
(3) Check whether the button functions are correct: New, Edit, Delete , close, return, save, import, previous page, next page, page jump, reset (common errors)
(4) String length check: length exceeded
( 5) Character type check
(6) Punctuation check: spaces, various quotation marks, Enter key
(7) Special characters: common %, ","
(8) Chinese characters: Are they garbled
(9) Check the completeness of the information: Check the information to see if the filled-in information is complete and updated; update the information and see if the updated information is consistent with the added information
(10 ) Duplicate information: unique information is required, such as repeated names or IDs, whether duplicate names are case-sensitive, and spaces
(11) Check the delete function: do not select any information, press Delete to see how to deal with it; Select one or more to delete; select multiple pages or turn pages to delete; whether there is a prompt for deletion
(12) Check whether additions and modifications are consistent: add required items, modifications should also be required; add why Type, what type should be modified?
(13) Check and modify duplicate names: when modifying, change the items that cannot be renamed to existing content
(14) Submit the form repeatedly: one item has been Successfully submitted records, return and then submit
(15) Check multiple times using the return key: return to the original page, repeat multiple times
(16) Search check: existence or non-existence of content , see if the search results are correct; multiple search conditions, enter reasonable and unreasonable conditions at the same time; special characters
(17) Enter the location of the information
(18) Upload and download file check: Function Whether it is implemented, upload: whether the uploaded file can be opened, format requirements, whether the system has explanation information, modify the suffix of the file format that cannot be uploaded to an uploadable file format; download: whether the download can be opened, saved, format requirements
(19) Required item check: the required item is not filled in; whether there is a prompt, such as adding *; after returning the prompt for the required item, whether the focus is automatically positioned on the required item
(20) Quick Key check: Whether the shortcut keys Ctrl C, Ctrl V, and backspace are supported; for fields that do not allow input (such as drop-down options), whether shortcuts are also restricted
(21) Enter key check: How does the system process
after pressing the Enter key after inputting (22) Refresh key check: Press the browser refresh key How to process
(23) Back key check: Press the browser back key How to handle
(24) Space check: Enter one or more spaces for the input item
(25) Half-width and full-width check for input method: For example, for floating point type, enter a full-width decimal point ". " or ". ", such as 4.5; full-width space
(26) Password check: enter the limit characters of the encryption method; the password should be as long as possible
(27) User check: different types Different permissions of administrator users, whether they can delete, manage, and edit each other; permissions of general users; logout function, old users log out and re-register, whether they are new users
(28) System data check: data changes with the business Changes in processes and states must remain correct. Garbage data cannot appear in a certain process, nor can data be lost because of a certain process.
(29) System recoverability check: paralyze the system in various ways , test whether the system can be restored quickly
(30) Confirmation prompt check: system update, deletion operation: whether there is a prompt, cancel operation; whether the prompt is accurate; prompts before and after the event
(31) Data injection check: database injection, special characters, and destruction of SQL statements
(32) Time and date check: time, date, time verification: whether the date range conforms to the actual business; whether there are restrictions on dates that do not conform to the actual business
(33) Multi-browser verification
3. Usability test (interface test)
Overall interface test
(1) The overall feeling given to the user: comfort; being able to find the information they are looking for by feeling; Whether the design style is consistent
Control test
(2)The function of each control
Multimedia test
(1)Graphics must have a clear purpose, pictures , the animations are arranged in an orderly manner and the purpose is clear
(2) The picture button link is valid, and the link attributes are correct (for example, a new window is opened, the current page is opened)
(3) The background image should be Match the font color and foreground color
(4) Check the size and quality of the picture: generally jpg, gif, png; the size of the picture can be reduced to less than 30kb without affecting the quality of the picture
(5) Whether the gif animation is set to the correct cycle mode and whether the color is normal
(6) Whether the Flash and Silverlight elements are normal
Navigation test
( 1) Site map and navigation bar: Whether the location is reasonable; page structure
Content test
(2) The correctness, accuracy, and relevance of the information provided
Container test
(1) DIV
(2) Table: As a control, whether the settings are correct; whether the length and width are sufficient. As an earlier web page layout method, consider changes in browser window size; the impact of dynamic addition or deletion of content on the interface
4. Compatibility test
Platform test: windows; unix; macintosh ;linux
Browser test: Browsers from different manufacturers have different support for Java, Javascript, ActiveX, plug-ins or different HTML specifications; frames and hierarchies are also displayed differently in different browsers
5. Security test
Security test requirements:
(1) Be able to prevent password probing tools
(2) Be able to prevent cookies Common means of attack
(3) Sensitive data is guaranteed not to be transmitted in clear text
(4) It can prevent the acquisition of important information by guessing the file name and viewing the content of the html file
(5 ) can guarantee that the website will be restored within a given time after receiving the tool, and the loss of important data will not exceed 1 hour
Test points
(1)Application-level security
The purpose of application-level security testing is to find security risks in the programming design of the Web system itself. The test areas are:
(1.1) Registration and login: valid and invalid user names and passwords; pay attention to whether there are upper and lower case letters Sensitive; limit on how many times you can try; whether you can browse a page directly without logging in
(1.2) Online timeout: timeout limit
(1.3) Operation traces: whether related information is written Log entry
(1.4) Backup and recovery: database incremental backup; database full backup; system full backup
(2)Transport level security
Transport level security The purpose of the test is to test the possible security of data transmitted from the client to the server. loopholes , the server's ability to prevent illegal access, test points:
(2.1) HTTPS and SSL testing; server-side script vulnerability check; test the problem of not being able to place and edit scripts on the server side without authorization
(2.2) Firewall test: firewall function; firewall settings
(2.3) Data encryption test: verify the transmission, access, processing person's identity and related content of the involved information
(2.4) Key: generation, distribution, storage, replacement and destruction of keys
6. Performance test
(1) Stress test: actually destroy a web application system and test the system’s response , Test the system's limitations and fault recovery capabilities
(2) Load test: Performance at a certain load level, including the number of users accessing the Web at a certain time and the number of online data processing
(3) Strength test: Test the acceptability of the object under abnormal performance behavior or extreme conditions (such as reduced resources or too many users) to verify the system software and hardware level
(4) Database capacity Test: Insert a certain amount of data into the database table through the stored procedure to see if
can be displayed in time (5) Performance test of expected indicators: Some performance indicators will be proposed during the demand analysis and design stages. For predetermined The performance requirements must be tested first
(6) Independent business performance testing: Conduct user concurrency testing on core business modules, including performing exactly the same operations at the same time and using the exact same functions at the same time
(7) Combined business performance test: simulate the different operations of multiple users, which is closest to the actual user usage, and simulate the combined concurrency of each module according to the proportion of the actual number of users
(8) Fatigue Strength performance test: When the system is running stably, test the system to run for a long time under a certain load pressure
(9) Network performance test: Accurately display how changes in bandwidth, delay, load, and port affect users
(10) Large data volume performance test at the corresponding time: real-time large data volume, simulating the real-time large data volume when the user is working; test under extreme state, the system is used for a period of time, and when a certain amount of data is accumulated, it can Whether it can operate normally, and combine the previous two
(11) Server performance test: When conducting user concurrency performance test, fatigue strength, and large data volume performance test, complete the monitoring of server performance and conduct evaluation
(12) Some special tests : Configuration testing, some special tests for memory leaks
The above is the detailed content of What are the basic knowledge points for web testing?. For more information, please follow other related articles on the PHP Chinese website!

译者 | 李睿审校 | 孙淑娟Web Speech API是一种Web技术,允许用户将语音数据合并到应用程序中。它可以通过浏览器将语音转换为文本,反之亦然。Web Speech API于2012年由W3C社区引入。而在十年之后,这个API仍在开发中,这是因为浏览器兼容性有限。该API既支持短时输入片段,例如一个口头命令,也支持长时连续的输入。广泛的听写能力使它非常适合与Applause应用程序集成,而简短的输入很适合语言翻译。语音识别对可访问性产生了巨大的影响。残疾用户可以使用语音更轻松地浏览

docker部署javaweb系统1.在root目录下创建一个路径test/appmkdirtest&&cdtest&&mkdirapp&&cdapp2.将apache-tomcat-7.0.29.tar.gz及jdk-7u25-linux-x64.tar.gz拷贝到app目录下3.解压两个tar.gz文件tar-zxvfapache-tomcat-7.0.29.tar.gztar-zxvfjdk-7u25-linux-x64.tar.gz4.对解

web端指的是电脑端的网页版。在网页设计中我们称web为网页,它表现为三种形式,分别是超文本(hypertext)、超媒体(hypermedia)和超文本传输协议(HTTP)。

区别:1、前端指的是用户可见的界面,后端是指用户看不见的东西,考虑的是底层业务逻辑的实现,平台的稳定性与性能等。2、前端开发用到的技术包括html5、css3、js、jquery、Bootstrap、Node.js、Vue等;而后端开发用到的是java、php、Http协议等服务器技术。3、从应用范围来看,前端开发不仅被常人所知,且应用场景也要比后端广泛的太多太多。

web前端打包工具有:1、Webpack,是一个模块化管理工具和打包工具可以将不同模块的文件打包整合在一起,并且保证它们之间的引用正确,执行有序;2、Grunt,一个前端打包构建工具;3、Gulp,用代码方式来写打包脚本;4、Rollup,ES6模块化打包工具;5、Parcel,一款速度极快、零配置的web应用程序打包器;6、equireJS,是一个JS文件和模块加载器。

怎么解决高并发大流量问题?下面本篇文章就来给大家分享下高并发大流量web解决思路及方案,希望对大家有所帮助!

和它本身的轻便一样,Bottle库的使用也十分简单。相信在看到本文前,读者对python也已经有了简单的了解。那么究竟何种神秘的操作,才能用百行代码完成一个服务器的功能?让我们拭目以待。1. Bottle库安装1)使用pip安装2)下载Bottle文件https://github.com/bottlepy/bottle/blob/master/bottle.py2.“HelloWorld!”所谓万事功成先HelloWorld,从这个简单的示例中,了解Bottle的基本机制。先上代码:首先我们从b

web有前端,也有后端。web前端也被称为“客户端”,是关于用户可以看到和体验的网站的视觉方面,即用户所看到的一切Web浏览器展示的内容,涉及用户可以看到,触摸和体验的一切。web后端也称为“服务器端”,是用户在浏览器中无法查看和交互的所有内容,web后端负责存储和组织数据,并确保web前端的所有内容都能正常工作。web后端与前端通信,发送和接收信息以显示为网页。


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Dreamweaver Mac version
Visual web development tools

SublimeText3 Chinese version
Chinese version, very easy to use

SAP NetWeaver Server Adapter for Eclipse
Integrate Eclipse with SAP NetWeaver application server.

Safe Exam Browser
Safe Exam Browser is a secure browser environment for taking online exams securely. This software turns any computer into a secure workstation. It controls access to any utility and prevents students from using unauthorized resources.

VSCode Windows 64-bit Download
A free and powerful IDE editor launched by Microsoft
