For what items should the protocols in assurance testing test a system?

What will be an ideal response?


Those protocols should test how well the system traps real-world errors and handles the unanticipated events that might come up in normal, day-to-day activity (that is, anything feasibly covered by Murphy's First Law of computer operation). This requires such common sense activities as verifying the software's functioning under typical operating conditions. An example of this would be testing when the database is loaded that such things as exception handling under that normal operational load can be confirmed and that the normal security and disaster recovery controls are present and work correctly.

Computer Science & Information Technology

You might also like to view...

A hash function that satisfies the properties of variable input size, fixed output size, efficiency, preimage resistant, second preimage resistant and __________ is referred to as a strong hash function.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The ____ Web site feature is used to configure the accepted file extensions for files that don't change.

A. MIME types B. handler mappings C. application mappings D. file mappings

Computer Science & Information Technology

Excel's VLOOKUP function searches vertically down the far left column of a table, then reads across the row to find the value in the column you specify. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

_______ is considered the first computer programmer.

a. Charles Babbage b. Ada Lovelace c. Grace Hopper

Computer Science & Information Technology