{"id":212,"date":"2020-04-30T09:40:34","date_gmt":"2020-04-30T09:40:34","guid":{"rendered":"http:\/\/www.cyberlaws.org\/?p=212"},"modified":"2020-05-26T00:07:06","modified_gmt":"2020-05-26T00:07:06","slug":"mobile-app-testing-check-for-qa","status":"publish","type":"post","link":"http:\/\/www.cyberlaws.org\/mobile-app-testing-check-for-qa\/","title":{"rendered":"Mobile App testing Check for QA"},"content":{"rendered":"

Mobile App testing Check for QA<\/u><\/strong><\/p>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
\u00a0<\/strong><\/td>\nTesting Type<\/strong><\/td>\nDetailed<\/strong><\/td>\n<\/tr>\n
<\/td>\nUnit Testing<\/td>\nTesting a particular set of code independent of other functionalities of the App.<\/td>\n<\/tr>\n
<\/td>\n<\/td>\n<\/td>\n<\/tr>\n
<\/td>\nFunctional Testing<\/td>\nTesting All possible positive or True test Scenarios, Specifically Called as Business Flows<\/td>\n<\/tr>\n
<\/td>\n<\/td>\n<\/td>\n<\/tr>\n
<\/td>\nIntegration Testing<\/td>\nSocial connect, Payment Gateway, Cloud Services, Web Based Portal integration, Data sink if any.<\/td>\n<\/tr>\n
<\/td>\n<\/td>\n<\/td>\n<\/tr>\n
<\/td>\nNetwork Test<\/td>\nWays to create Network zone and no network zone,Check how app behaves in this.<\/p>\n

Try disabling wifi while using app.<\/p>\n

Try stopping data flow by using IP via network tool.<\/p>\n

Try Stopping the Application using application manager.<\/p>\n

 <\/td>\n<\/tr>\n

<\/td>\n<\/td>\n<\/td>\n<\/tr>\n
<\/td>\nThread or instance Test<\/td>\nIf we have multiple task or window functionality, artificially \u00a0create many instances & Check<\/td>\n<\/tr>\n
<\/td>\n<\/td>\n<\/td>\n<\/tr>\n
<\/td>\nRegression Testing<\/td>\nMost Important part, every time new release is exposed. QA should do regression testing. This is up to QA\u2019s Intelligence to decide which part might affect.<\/td>\n<\/tr>\n
<\/td>\n<\/td>\n<\/td>\n<\/tr>\n
<\/td>\nPerformance Testing<\/td>\nIf Possible Try Atomizing the app flows to test the performance of the app, using emulators or paid tools<\/td>\n<\/tr>\n
<\/td>\n<\/td>\n<\/td>\n<\/tr>\n
<\/td>\nUsability Testing<\/td>\nPage Scrolling, Navigation Between Screens, Zoom in & Zoom out By Tapping, Buttons color, size, Coordinates, Labels & Forms View, Image, Data Grid View, Menu Navigation, Back & Next flow test.<\/td>\n<\/tr>\n
<\/td>\n<\/td>\n<\/td>\n<\/tr>\n
<\/td>\nInterrupt handling<\/td>\nCall, Conf Call, Message \u00a0etc<\/td>\n<\/tr>\n
<\/td>\n<\/td>\n<\/td>\n<\/tr>\n
<\/td>\nMemory Leak<\/td>\nMost of the apps in Mobile world crash due to memory leak.In such scenarios on should always take help of App developers, mostly this occur in objects which the coder selects.<\/td>\n<\/tr>\n
<\/td>\n<\/td>\n<\/td>\n<\/tr>\n
<\/td>\nSecurity Test<\/td>\nBrute force test, username & password test, Session Expiry test.Special in case of IOS APP (SANDBOX Test with Install & Uninstall)<\/td>\n<\/tr>\n
<\/td>\n<\/td>\n<\/td>\n<\/tr>\n
<\/td>\nData Testing<\/td>\nTry Adding some negative or out of range values and check if the app behaves normal or not<\/td>\n<\/tr>\n
<\/td>\n<\/td>\n<\/td>\n<\/tr>\n
<\/td>\nData Migration Test<\/td>\nCheck Data Migration test ie: SD To Phone and Vice versa.<\/td>\n<\/tr>\n
<\/td>\n<\/td>\n<\/td>\n<\/tr>\n
<\/td>\nInstallation \/ Uninstall<\/td>\nInstallation Success, Uninstall Success, Side Effect test, App Start Stop Behavior<\/td>\n<\/tr>\n
<\/td>\n<\/td>\n<\/td>\n<\/tr>\n
<\/td>\nBackup Test<\/td>\nArchive functionality, Cloud, Email download link, phone backup etc<\/td>\n<\/tr>\n
<\/td>\n<\/td>\n<\/td>\n<\/tr>\n
<\/td>\nVersion Upgrade<\/td>\nCheck if app responds while getting upgraded<\/td>\n<\/tr>\n
<\/td>\n<\/td>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n

 <\/p>\n","protected":false},"excerpt":{"rendered":"

Mobile App testing Check for QA \u00a0 Testing Type Detailed Unit Testing Testing a particular set of code independent of other functionalities of the App. Functional Testing… <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":true,"template":"","format":"standard","meta":[],"categories":[4],"tags":[96,84,93,95,98,94,99,97],"_links":{"self":[{"href":"http:\/\/www.cyberlaws.org\/wp-json\/wp\/v2\/posts\/212"}],"collection":[{"href":"http:\/\/www.cyberlaws.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.cyberlaws.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.cyberlaws.org\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.cyberlaws.org\/wp-json\/wp\/v2\/comments?post=212"}],"version-history":[{"count":3,"href":"http:\/\/www.cyberlaws.org\/wp-json\/wp\/v2\/posts\/212\/revisions"}],"predecessor-version":[{"id":316,"href":"http:\/\/www.cyberlaws.org\/wp-json\/wp\/v2\/posts\/212\/revisions\/316"}],"wp:attachment":[{"href":"http:\/\/www.cyberlaws.org\/wp-json\/wp\/v2\/media?parent=212"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.cyberlaws.org\/wp-json\/wp\/v2\/categories?post=212"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.cyberlaws.org\/wp-json\/wp\/v2\/tags?post=212"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}