A Review of Scripting Techniques
نویسندگان
چکیده
Software testing is the process of evaluating the developed system to assess the quality of the final product. Unfortunately, software-testing process is expensive and consumes a lot of time through software development life cycle. As software systems grow, manual software testing becomes more and more difficult. Therefore, there was always a need to decrease the testing time. Recently, automation is as a major factor in reducing the testing effort by many researchers. Therefore, automating software-testing process is vital to its success. This study aims to compare the main features of different scripting techniques used in process of automating the execution phase in software testing process. In addition, an overview of different scripting techniques will be presented to show the state of art of this study. Keyword— Software Testing; Automated Software Testing; Test Data; Test Case; Test Script; Manual Testing; Software Under Test; Graphical User Interface.
منابع مشابه
Current state of research on cross-site scripting (XSS) - A systematic literature review
Keywords: Systematic literature review Cross-site scripting Security Web applications a b s t r a c t Context: Cross-site scripting (XSS) is a security vulnerability that affects web applications. It occurs due to improper or lack of sanitization of user inputs. The security vulnerability caused many problems for users and server applications. Objective: To conduct a systematic literature revie...
متن کاملA Review of the Control Techniques for Brushless Direct Current Motors (REVIEW PAPER)
This paper surveys the literature of the brushless DC motor speed control techniques. The paper should prove useful to both researchers as well as practising engineers as a signpost to the current state of the art. Based on the review some further studies are suggested.
متن کاملA Critical Review on Detecting Cross-Site Scripting Vulnerability
The world relies on internet today. We can analyze it in several ways , if you consider the example of money transfer then there are several ways of transferring the money using world wide web, Social Sites and communities like Facebook, Twitter and LinkedIn, mail services etc. and all these services are rely on web browsers. Then the communication is provided by different protocols via web bro...
متن کاملToward A Taxonomy of Techniques to Detect Cross-site Scripting and SQL Injection Vulnerabilities
Since 2002, over half of reported cyber vulnerabilities are caused by input validation vulnerabilities . Over 50 % of input validation vulnerabilities were cross-site scripting and SQL injection vulnerabilities in 2006, based on the (US) National Vulnerability Database. Techniques to mitigate cross-site scripting and SQL injection vulnerabilities have been proposed. However, applying those tech...
متن کاملCoronary Artery Bifurcation Lesions; A Review and a Guide for Specific Interventional Techniques
Percutaneous coronary intervention in the setting of coronary bifurcation lesions is associated with increased risk for complications. The goal of this manuscript is to review the currently available classifications for coronary artery bifurcation lesions with a guide to the use of specific coronary bifurcation techniques based on lesion characteristics
متن کامل