Software Testing Documentation

Initially in software development, Testing phase comes after coding but nowadays software testing is very crucial and involves in all phases of software development life cycle. In all types of developments one thing is very important and useful for future prospects and opportunities that is Documentation. Documentation is noting but written material about your developments. Documentation is required in all fields and every fields have specific types of documents. Software development also have some specific documents like- Sales Documentation, Software Development Documentation, Software Testing Documentation and etc. Here I'm going to talk about Software Testing Documentation. Testing Documentation is nothing but it is sum of one or more different types of documents. Software Testing Documentation may consist of the following documents like Test Plan Documents, Use Case Specification, Test Case Specification, Test Log, and Test Procedure etc.

In Software Testing, Test Plan is first document developed for testing. Test Plan Document is created by Quality Analysis guy's. Test Plan is a high level document that describes the software testing projects. It has the different types of section which describes the application testing information like-

Schedule and Milestones

Resources Requirements

  • Hardware
  • Software
  • Testing Tools




Test Approach

Feature Not To Be Tested

Test Deliverable

Dependencies and Risk

In Schedule and Milestones section you can describes the timeliness for each and every module whatever takes place in testing activities. Second thing in Test Plan is Resources Requirements. In this section you can defines different types of Hardware, Software and Testing Tools which are used to conduct testing. In Staffing and Responsibilities section you can assign the work and responsibilities to different team members. Training is the educational part of Test Plan documents because in this section you can define the information about training which is related to requirement, environment, and testing tools etc. The main section of Test Plan is Test Approach because in this section you can define your objectives meaning, what feature you will test in near future. In Test Deliverable section you can describe the information about Use Cases and Test Cases documentation. Dependencies and Risk are main factors of any software application because here you can define the dependencies and risks of application. Risk is noting but it defines where your application may break and what condition makes the effect on application. So this is the test plan information.

Use Case document is the second important documents for software testing. This is the technique capturing the requirements of new software application. Each Use Case documents provides one or more aspects that convey how the system should interact with the end user or another system. Use Case documents have also different types of sections like- Summary, Priority, Use Frequency, Direct Actor, Precondition, Main Success Scenario, Alternative Scenario, and Notes and Questions.

In Summary section simply you can describes the requirement of particular application and after that define the priority of that requirement.Read More »


bugzilla1.jpgOne test engineer operates different types of tools. Bugzilla is the main tool which any tester operates it. Bugzilla is the database of bugs. In English word bug means insect but this is very different from that bug. In IT, Bugs is the kinds of faults and errors which are occurs in any software program. Bugzilla is the defect tracking system. It can handle the communication with your developer and QA colleagues. Bugzilla can help on the software development process because every successful software program often are the result of successful organization and communication. It is a great tool that will help your team get organized and communicate effectively. You can integrate the Bugzilla tool with your mail server. Bugzilla functionality is very simple that whenever you find any defect and error in software program, you can simply open Bugzilla in browser and put the details of bugs. Bugzilla tool have different types of fields like Component, Platform, OS, Priority, Severity, Assigned To, URL, Summary, and Description. Bugzilla fields are provides meaningful understanding about any bug. Bugzilla has on search option through which you can search any bug.


My company is working on Open Source technology. So whenever I’m talking to anybody about my company then they always asked me, that how your company generates revenue? Because in open source every software is distributed absolutely free and I always answer them like this that if you have patience and mind then you earn a lot. Every company has it own pros and cons, here I’m not going to discuss about that. I’m just appreciating my CTO views because when he came last time in India office he started one new thing and given the name 3:30@LAB. In 3:30@LAB, we organized seminar on any technology terms. So today one of my colleague took the session on the KERBEROS term. The name Kerberos comes from Greek mythology, Kerberos word means three-headed dog. This protocol is freely available from the Massachusetts Institute of Technology. Kerberos is a computer network authentication protocol. It is providing strong authentication for client/server applications. It’s providing this thing with the help of secret key cryptography. Cryptography is a field of computer science concerned with network security and related issues, particularly encryption, decryption, and authentication. He also explained about the encryption, decryption, and authentication. Encryption is the process of secure information to make it unreadable without special knowledge. Actually when you send any information through network then that information goes to coded form so this coded form is called as encryption of data and the process of decoding data that has been encrypted into a secret format is called as Decryption. He also explained about authentication process that this is the process of identifying an individual user, which is based on a username and password. In security systems, authentication is distinct from authorization, which is the process of giving individually access to system objects based on their identity. He also explained about the Kerberos architecture that it’s working from three sides- Client system, Application server, and Kerberos server. According to working nature of kerberos, MIT given the name as three headed dog.


Synchronization is main thing in automation testing tool. It's very useful when you operate many test in one script at the same time then you can use synchronization function because when you put synchronization function in the test script then testing tools stop the execution for a particular interval of time. Synchronization is managed the time interval between your script and application because any testing tools runs the recorded scripts in milliseconds but application don't give the response according to tools that's why we are using synchronization function. You can synchronize your script in three ways- wait statement, synchronization function, and change the settings of testing tool.