Friday, October 30, 2015

2015.10.30

Learn about Java

because there is no any special task for today, I wish to learn Java. I am very much like of Java as a beginner. Actually I haven't any knowledge about Java until today. But I am with the keen about Java. So I thought that it will be better if I start to learn it from today.

http://www.ibm.com/developerworks/java/tutorials/j-introtojava1/#resources

This is the online material which I used to learn about Java. I read this material and I got to know that I can understand Java basics very quickly. So I will learn Java further too. This is only a start point of learning it.

Before learning the Java coding stuff, I have to concentrate on Object Oriented Programming concepts such as encapsulation, inheritance and polymorphism Also I have to know the foundation of Java such as object, class, behavior, state and string.

After getting knowledge about those fundamental concepts I start to learn about Java Object. There I learn how to program a code for a object by using constructs, imports, access specifiers and comments. This is all that I learned today.

2015.10.29

Learn about Bitrix 

Bitrix is same as JIRA. It is also a personal work management software. It is easy to manage. We have to study about this software and create a project for our company and allocate work for employers.

By using a software for allocating work load, it will be very efficient for project work.Also it provide a summary of work which are assigned to the employer. So they have to complete their tasks before deadline after they receive their ticket for work.

When we learn this software, we have to identify all its functionalities, how they are working and what can be done through this software. Also as QA people, we have to check whether the software fulfill the requirements of the company for allocating work for its employers.

Thursday, October 29, 2015

2015.10.28

QA for Banking Accounting system

I am asked to continue a QA process for banking accounting package. So, there I have to check the member shares functionality and Loan functionality.

In the loan functionality, I have to check whether the loans can be repaid to the system. For that I have to concentrate on the loan accounts and has to repay for loans from system. And has to check whether the repayments are updated the loan history.

On member shares, there members can deposit on member shares and withdrawal from member share account. Deposits are done using receipts and they increase the balance of member share account. withdrawals decrease the balance of member share account. Those transactions should be updated instantly.

2015.10.23/26/27

Analysis for work allocation Management System

We are advised to present an idea for how to develop a work allocation management system for company members. There we have to identify 
  1. What is the work flow of the system.(Work flow diagram)
  2. what are the functionalities of the system.
  3. who are the users of the system.(Use case Diagram)
  4. What is the design of our system.(Mock ups)


 2015.10.26 - On leave because of the 2015.10.27 Poya day holiday.


Thursday, October 22, 2015

2015.10.22

Work on JIRA 


 We are asked to create a project on JIRA. The functionalities are much more difficult to grab at onece because this project management software is based on agile. 

Scrum is the method which is used in this software. So we have to be knowledgeable about scrum concepts such as sprints, backlogs and issues. Sprint means the work load that we are targeting to do in a time period. In this software, time frame is started from 2 weeks. Then backlog means the works we have to do in a sprint.

JIRA is worked as both as a project manager and also a project team member.
JIRA Software unlocks the power of agile by giving the team the tools to easily create & estimate stories, build a sprint backlog, identify team commitments & velocity, visualize team activity, and report on the team's progress.

In this simple workflow, a manger sets up and runs a project while individual users add content and work with issues within a sprint.
  • Getting Started as a JIRA Software Manager.
  • Getting Started as a JIRA Software User. 

JIRA Software Managers

User with administrative rights for your instance of JIRA Software. These roles are usually filled by scrum masters or development managers.
Managers can...
  • Access all features in JIRA Software
  • Create and update projects
  • Add and remove users
  • Start and end sprints 
  • Perform other agile tasks

JIRA Software Users

User who works on and resolves issues. These roles are normally filled by software developers.
Users can...
  • Create and manage issues
  • Check code review status
  • Create branches (with integrated development tools)

Work Flaw of JIRA



So We create a project on JIRA and we follow the following steps to work with JIRA.
  • Created a new software project
  • Added users
  • Prepared your backlog
  • Started and completed a sprint
  • Evaluated the results.

2015.10.21

Learn about JIRA software


Jira is a agile based project management software. It is a powerful platform that combines issue collection and agile project management capabilities into a single application. Using JIRA Software helps you plan and organize tasks, workflows, and reports for your agile team more efficiently.

Installing JIRA Software

JIRA Software can be customized to suit your needs. You can also extend it and link it with other applications to provide you with the perfect solution to track all your work in one place.
Note, if you are upgrading from an existing JIRA instance, check out our Migration Hub first.
It's easy to get up and running with JIRA Software Cloud:
  1. View the Cloud products for JIRA here.
  2. Select the JIRA Software package and choose the number of users.
  3. Fill in the signup form.
You'll have to wait a few minutes until your installation is ready. A confirmation email will be sent to you with your new site address and related information, once the process has finished. Just click the link in the email to access the signup form for your new site and get started.

What is JIRA Admin?

The powerful issue collection and agile project management capabilities of JIRA Software are built on top of JIRA Admin. JIRA Admin also contains the administrative functionalities of JIRA Software. Many application settings are configured in JIRA Admin, like creating and editing workflows, or configuring permissions. Whenever you are asked to perform functions like these, which require administrative access to JIRA Admin, we will direct you to the JIRA administration documentation to accomplish these tasks.

Functionalities of JIRA

The topics in this chapter cover the activities that you will need to do in each stage of the agile development lifecycle:


Starting a new project


Time to get everything set up! This is the stage where you create  a new JIRA Software project, configure your development tools (e.g. create repositories in Bitbucket, create projects in Bamboo, etc), and determine how you will manage documentation and team calendars.

Building a backlog

A backlog is a list of outstanding work. Before starting new work, you will build a new backlog or groom an existing backlog. This involves creating, ranking, and estimating issues, so that you have a prioritized list of tasks to work from.

Planning a version

Ready to start work on a new version? To plan a version, you need to set up the version in JIRA Software and configure your development tools appropriately (e.g. branch your repository, set up Bamboo plans, etc).

Getting to work

All systems are go! Once work begins, you will be running sprints and tracking your team's progress. For teams using Scrum, this involves planning and starting sprints, monitoring sprints via boards and charts, and completing sprints. For teams using Kanban, this involves monitoring the work in progress, and limiting work to the constraints for your team, via boards and charts.

Releasing a version

This is the culmination of your team's hard work. Before releasing a version, you would typically check if there is outstanding work for the version. If everything's good to go, you can then deploy the version, and create the related release reports and documentation.

Reporting

Reporting is an activity that occurs throughout a development cycle. You may need to make reports available to different stakeholders or use them yourself. JIRA Software has a number of reports that you can use to provide different information about the progress of your team's work.



2015.10.20

Continue the test case creation for Guru 99 online banking project. There I haven't gain any benefit and I can gain only the knowledge and QA experience only.

updated QA report is attached to my Google Drive.
https://drive.google.com/drive/folders/0B6JFp5AUey9ZNUJCcGxjTDloYjQ

Tuesday, October 20, 2015

2015.10.19

Check the functionalities by inserting real data in to database for Accounting Package

There is an accounting package which is developed for a customer with full functionalities. Client has requested to insert his real data to the system database and check for 100% accurate financial statements such as balance sheets and trial balance report. For that purpose we have enter data in to the database. And we have to check that all the reports are suitable with clients requirement or not.


Quality Assurance for Guru 99 Banking project 

I have followed Guru 99 (http://www.guru99.com/) web site for learn about Quality Assurance and Business analysis. There I saw that they provide online projects to complete. So I requested one and engaged with it.
They provide Software requirement specification document to study about it and. Then I have to create test cases for that banking project. Actually it would be a really huge experience for me.


SRS and updated QA report are attached to my Google drive.

Thursday, October 15, 2015

2015.10.09

learn about mobile application testing


 Some or all of the following testing types may be performed depending on your mobile testing requirements
  • Functional testing
  • Performance testing
  • Security testing
  • Usability testing
  • Compatibility testing
  • Recoverability Testing

Functional testing:

The functional testing of Mobiles normally consists in the areas of testing user interactions as well as testing the transactions. The various factors which are relevant in functional testing are
  1. Type of application based upon the business functionality usages (banking, gaming, social or business)
  2. Target audience type (consumer, enterprise, education)
  3. Distribution channel which is used to spread the application (e.g. Apple App Store, Google play, direct distribution)
The most fundamental test scenarios in the functional testing can be considered as :
  1. To validate whether all the required mandatory fields are working as required.
  2. To validate that the mandatory fields are displayed in the screen in a distinctive way than the non-mandatory fields.
  3. To validate whether the application works as per as requirement whenever the application starts/stops.
  4. To validate whether the application goes into minimized mode whenever there is an incoming phone call. In order to validate the same we need to use a second phone, to call the device.
  5. To validate whether the phone is able to store, process and receive SMS whenever the app is running. In order to validate the same we need to use a second phone to send sms to the device which is being tested and where the application under test is currently running.
  6. To validate that the device is able to perform required multitasking requirements whenever it is necessary to do so.
  7. To validate that the application allows necessary social network options such as sharing, posting and navigation etc.
  8. To validate that the application supports any payment gateway transaction such as Visa, Mastercard, Paypal etc as required by the application.
  9. To validate that the page scrolling scenarios are being enabled in the application as necessary.
  10. To validate that the navigation between relevant modules in the application are as per the requirement.
  11. To validate that the truncation errors are absolutely to an affordable limit.
  12. To validate that the user receives an appropriate error message like “Network error. Please try after some time” whenever there is any network error.
  13. To validate that the installed application enables other applications to perform satisfactorily, and it does not eat into the memory of the other applications.
  14. To validate that the application resumes at the last operation in case of a hard reboot or system crash.
  15. To validate whether the installation of the application can be done smoothly provided the user has the necessary resources and it does not lead to any significant errors.
  16. To validate that the application performs auto start facility according to the requirements.
  17. To validate whether the application performs according to the requirement in all versions of Mobile that is 2g, 3g and 4g.
  18. To perform regression testing to uncover new software bugs in existing areas of a system after changes have been made to them. Also rerun previously performed tests to determine that the program behavior has not changed due to the changes.
  19. To validate whether the application provides an available user guide for those who are not familiar to the app

Performance testing:

This type of testing’s fundamental objective is to ensure that the application performs acceptably under certain performance requirements such as access by a huge number of users or the removal of a key infrastructure part like a database server.
The general test scenarios for performance testing in a Mobile application are:
  1. To determine whether the application performs as per the requirement under different load conditions.
  2. To determine whether the current network coverage is able to support the application at peak, average and minimum user levels.
  3. To determine whether the existing client-server configuration setup provides the required optimum performance level.
  4. To identify the various application and infrastructure bottlenecks which prevent the application to perform at the required acceptability levels.
  5. To validate whether the response time of the application is as per as the requirements.
  6. To evaluate product and/or hardware to determine if it can handle projected load volumes.
  7. To evaluate whether the battery life can support the application to perform under projected load volumes.
  8. To validate application performance when network is changed to WIFI from 2G/3G or vice versa.
  9. To validate each of the required the CPU cycle is optimization
  10. To validate that the battery consumption, memory leaks, resources like GPS, Camera performance is well within required guidelines.
  11. To validate the application longevity whenever the user load is rigorous.
  12. To validate the network performance while moving around with the device.
  13. To validate the application performance when only intermittent phases of connectivity is required.

Security testing:

The fundamental objective of security testing is to ensure that the application’s data and networking security requirements are met as per guidelines.
The following are the most crucial areas for checking the security of Mobile applications.
  1. To validate that the application is able to withstand any brute force attack which is an automated process of trial and error used to guess a person’s username, password or credit-card number.
  2. To validate whether an application is not permitting an attacker to access sensitive content or functionality without proper authentication.
  3. To validate that the application has a strong password protection system and it does not permit an attacker to obtain, change or recover another user’s password.
  4. To validate that the application does not suffer from insufficient session expiration.
  5. To identify the dynamic dependencies and take measures to prevent any attacker for accessing these vulnerabilities.
  6. To prevent from SQL injection related attacks.
  7. To identify and recover from any unmanaged code scenarios.
  8. To ensure whether the certificates are validated, does the application implement Certificate Pinning or not.
  9. To protect the application and the network from the denial of service attacks.
  10. To analyze the data storage and data validation requirements.
  11. To enable the session management for preventing unauthorized users to access unsolicited information.
  12. To check if any cryptography code is broken and ensure that it is repaired.
  13. To validate whether the business logic implementation is secured and not vulnerable to any attack from outside.
  14. To analyze file system interactions, determine any vulnerability and correct these problems.
  15. To validate the protocol handlers for example trying to reconfigure the default landing page for the application using a malicious iframe.
  16. To protect against malicious client side injections.
  17. To protect against malicious run time injections.
  18. To investigate file caching and prevent any malicious possibilities from the same.
  19. To prevent from insecure data storage in the keyboard cache of the applications.
  20. To investigate cookies and preventing any malicious deeds from the cookies.
  21. To provide regular audits for data protection analysis.
  22. Investigate custom created files and preventing any malicious deeds from the custom created files.
  23. To prevent from buffer overflows and memory corruption cases.
  24. To analyze different data streams and preventing any vulnerabilities from these.

Usability testing:

The usability testing process of the Mobile application is performed to have a quick and easy step application with less functionality than a slow and difficult application with many features. The main objective is to ensure that we end up having an easy-to-use, intuitive and similar to industry-accepted interfaces which are widely used.
  1. To ensure that the buttons should have the required size and be suitable to big fingers.
  2. To ensure that the buttons are placed in the same section of the screen to avoid confusion to the end users.
  3. To ensure that the icons are natural and consistent with the application.
  4. To ensure that the buttons, which have the same function should also have the same color.
  5. To ensure that the validation for the tapping zoom-in and zoom-out facilities should be enabled.
  6. To ensure that the keyboard input can be minimized in an appropriate manner.
  7. To ensure that the application provides a method for going back or undoing an action, on touching the wrong item, within an acceptable duration.
  8. To ensure that the contextual menus are not overloaded because it has to be used quickly.
  9. To ensure that the text is kept simple and clear to be visible to the users.
  10. To ensure that the short sentences and paragraphs are readable to the end users.
  11. To ensure that the font size is big enough to be readable and not too big or too small.
  12. To validate the application prompts the user whenever the user starts downloading a large amount of data which may be not conducive for the application performance.
  13. To validate that the closing of the application is performed from different states and verify if it re-opens in the same state.
  14. To ensure that all strings are converted into appropriate languages whenever a language translation facility is available.
  15. To ensure that the application items are always synchronized according to the user actions.
  16. To ensure that the end user is provided with a user manual which helps the end user to understand and operate the application who may be not familiar with the application’s proceedings
Usability testing is normally performed by manual users since only human beings can understand the sensibility and comfort ability of the other users.

Compatibility testing:

Compatibility testing on mobile devices is performed to ensure that since mobile devices have different size, resolution, screen, version and hardware so the application should be tested across all the devices to ensure that the application works as desired.
The following are the most prominent areas for compatibility testing.
  1. To validate that the user Interface of the application is as per the screen size of the device, no text/control is partially invisible or inaccessible.
  2. To ensure that the text is readable for all users for the application.
  3. To ensure that the call/alarm functionality is enabled whenever the application is running. The application is minimized or suspended on the event of a call and then whenever the call stops the application is resumed.

Recoverability Testing:

  1. Crash recovery and transaction interruptions
  2. Validation of the effective application recovery situation post unexpected interruption/crash scenarios.
  3. Verification of how the application handles a transaction during a power failure (i.e. Battery dies or a sudden manual shutdown of the device)
  4. The validation of the process where the connection is suspended, the system needs to re-establish for recovering the data directly affected by the suspended connection.

Other Important Checks:

  1. Installation testing (whether the application can be installed in a reasonable amount of time and with required criterion)
  2. Uninstallation testing (whether the application can be uninstalled in a reasonable amount of time and with required criterion)
  3. Network test cases (validation of whether the network is performing under required load or not, whether the network is able to support all the necessary applications during the testing procedures)
  4. Check Unmapped keys
  5. Check application splash screen
  6. Continued keypad entry during interrupts and other times like network issues
  7. Methods which deal with exiting the application
  8. Charger effect while an application is running in the background
  9. Low battery and high performance demand
  10. Removal of battery while an application is being performed
  11. Consumption of battery by application
  12. Check Application side effects

2015.10.15/16

Re-correct the mistakes of QA report for live web system

There are few mistakes that I have done in the QA report which is completed yesterday. Basically those mistakes are very few grammar mistakes in my report. I have to re correct them, because the QA report is created for the purpose of giving to the officers of our company.

Some of failed constraints in the system which are identified yesterday are also re-corrected today by developers of the system, so I have to update my QA report for removing those failed ones to pass.


learn about QA methodologies further

There are many different testing technologies, some are old, some are new, some are revisiting earlier methodologies and giving them new names. There are different types of testing for different stages in development. Some are integral to the development process, others done throughout the development process are various stages and some tests after development and beyond. With that said a few methodologies off the top of my head and paraphrased in my own interpretations meaning others are free to clarify or correctme if I am perceived to be in error in any aspect or detail:
  1. Bench Testing:  This is when a developer tests the code on their own machine
  2. Unit Testing:  testing the smallest possible unit
  3. White box testing: testing code logic
  4. Black box testing: Replacing the user behind the keyboard with automated testing
  5. Regression testing: Testing to make sure new code does not break existing functionality, often done with automated testing but can be done manually as well.
  6. Test Driven development (TDD):  An Agile methodology that brings testing in at the very beginning of the development cycle with a testing harness ensuring the program is tested often. Issues and dfects should be found early in theory meaning better results at release.
  7. Functional testing:  As the name implies, does the program do the intended function.
  8. Boundary testing: Testing to check boundary conditions such as what happens if I try to put more characters in a field than the field supports? What happens if i use special characters in a field that does not support special characters? etc.
  9. Smoke test:  A preliminary test usually done by development prior to sending to QA, similar to bench testing but usually on another machine other than the developers. This is a good candidate for automation and goes with regression testing.
  10. Load testing: This is to test scalability and is usually done with an automated tool. Most load testing tools test web only though some also test client server.
  11. Alpha Testing: A common testing phase in software development here the software is feature complete but not necessarily functionally complete, usually proceeds Beta testing. Alpha testing is often only an internal testing by the Development team and QA team.
  12. Beta Testing: Late stage prelease testing where software is usually testing by a wider audience including customers prior to the official release of the product version. A Golden Master or Release Candidate is often the last version of the Beta prior to release.
This is just a small sampling of some common testing methodologies and terms. There are various institutions, organizations and commercial companies that purport to have and support their own methods such as CMMI, Six Sigma, Lean Software Development, Rational Unified Process, etc. depending on the needs of the company different methods and methodologies may apply. One thing all methodologies should have when implemented is the ability to handle change as change is the only thing you can be certain will happen no matter what you are testing.

Learn about white box testing 

White Box Testing is the testing of a software solution's internal coding and infrastructure.It focuses primarily on strengthening security, the flow of inputs and outputs through the application, and improving design and usability.White box testing is also known as clear, open, structural, and glass box testing.
It is one of two parts of the "box testing" approach of software testing. Its counter-part, black box testing, involves testing from an external or end-user type perspective. On the other hand, White box testing is based on the inner workings of an application and revolves around internal testing. The term "white box" was used because of the see-through box concept. The clear box or white box name symbolizes the ability to see through the software's outer shell (or "box") into its inner workings. Likewise, the "black box" in "black box testing" symbolizes not being able to see the inner workings of the software so that only the end-user experience can be tested.

White box testing involves the testing of the software code for the following:
  • Internal security holes
  • Broken or poorly structured paths in the coding processes
  • The flow of specific inputs through the code
  • Expected output
  • The functionality of conditional loops
  • Testing of each statement, object and function on an individual basis
 
The testing can be done at system, integration and unit levels of software development. One of the basic goals of white box testing is to verify a working flow for an application. It involves testing a series of predefined inputs against expected or desired outputs so that when a specific input does not result in the expected output, you have encountered a bug.

How do you perform White Box Testing?

 
To give you a simplified explanation of white box testing, we have divided it into two basic steps. This is what testers do when testing an application using the white box testing technique:
 
STEP 1) UNDERSTAND THE SOURCE CODE
 
The first thing a tester will often do is learn and understand the source code of the application. Since white box testing involves the testing of the inner workings of an application, the tester must be very knowledgeable in the programming languages used in the applications they are testing. Also, the testing person must be highly aware of secure coding practices. Security is often one of the primary objectives of testing software. The tester should be able to find security issues and prevent attacks from hackers and naive users who might inject malicious code into the application either knowingly or unknowingly.
 
Step 2) CREATE TEST CASES AND EXECUTE
 
The second basic step to white box testing involves testing the application's source code for proper flow and structure. One way is by writing more code to test the application's source code. The tester will develop little tests for each process or series of processes in the application. This  method requires that the tester must have intimate knowledge of the code and is often done by the developer. Other methods include manual testing, trial and error testing and the use of testing tools as we will explain further on in this article.
 

White Box Testing Techniques

 
A major White box testing technique is Code Coverage analysis. Code Coverage analysis, eliminates gaps in a test case suite.It identifies areas of a program that are not exercised by a set of test cases.Once gaps are identified, you create test cases to verify untested parts of code, thereby increase the quality of the software product
There are automated tools available to perform Code coverage analysis. Below are a few coverage analysis techniques

Statement Coverage  This technique requires every possible statement in the code to be tested at least once during the testing process.  Branch Coverage - This technique checks every possible path (if-else and other conditional loops) of a software application. Tools: An example of a tool that handles branch coverage testing for C, C++ and Java applications is TCAT-PATH
 
Apart from above, there are numerous coverage types such as Condition Coverage, Multiple Condition Coverage, Path Coverage, Function Coverage etc.Each technique has its own merits and attempts to test (cover) all parts of software code.
Using Statement and Branch coverage you generally attain 80-90% code coverage which is sufficient.  
 

Types of White Box Testing

 
White box testing encompasses several testing types used to evaluate the usability of an application, block of code or specific software package. There are listed below --
 
Unit Testing : It is often the first type of testing done on an application. Unit testing is performed on each unit or block of code as it is developed.
 Unit testing is essentially done by the programmer. As a software developer, you develop a few lines of code, a single function or an object and test it to make sure it works before continuing
Unit testing helps identify majority of bugs, early in the software development life cycle. Bugs identified in this stage are cheaper and easy to fix.
 
Testing for Memory Leaks : Memory leaks are leading causes of slower running applications. A QA specialist who is experienced at detecting memory leaks is essential in cases where you have a slow running software application.
There are many tools available to assist developers/testers with memory leak testing , example , Rational Purify  for windows application
 
Apart from above a few testing types are part of both black box and white box testing. They are listed as below -
 
White Box Penetration Testing: In this testing, the tester/developer has full information of the application's source code, detailed network information, IP addresses involved and all server information the application runs on.  The aim is to attack the code from several angles to expose security threats
 
White Box Mutation Testing: Mutation testing is often used to discover the best coding techniques to use for expanding a software solution .



Wednesday, October 14, 2015

2015.10.12/13/14

Creating a QA report of Live web System

The web system is for public service COOP. System is for uploading daily transactions to web. First client has to transfer their transactions which are identified as Add new member, Update member details, Add new personal account, Update existing personal account details to local database. Later on system administrator can upload them to live temporary table. Later on he wants upload them to live database.

There is a method of live temporary table because of the possibility to destroy transaction data when they are uploading at once to the live database directly. Live temporary table minimizes the risk of vanishing records.

So the purpose of this report is to obtain a quality assurance process for ensuring the effectiveness and efficiency of all the functions of the system to make sure whether they are working properly or not.

When obtaining a quality assurance for this live web system, I have to use the methods of black box testing and white box testing at all. Basically black box testing is based for this documentary rather than white box testing.

QA report is attached to my Google Drive.


Friday, October 9, 2015

2015.10.09

Maintain QA for verifying the clients requirements

We have a system of accounting package for a client. Clients has send us a report about some mistakes of functions of the report. There I had to verify whether those mistakes are corrected or not. I checked that report with the system and found bugs that should be corrected. Then I talked with developers and told them to correct them.

The clients requirement details are attached to my Google Drive.

Tuesday, October 6, 2015

2015.10.05/06

UML diagrams
UML is stands for Unified Modeling Language. There we used so many diagrams to depict about the project that we are going to developed. Some of those diagrams are,
  1. Class Diagram
  2. Object Diagram
  3. Component Diagram
  4. Deployment Diagram
  5. Use case Diagram
  6. Interaction Diagram
  7. Activity Diagram
I followed an online materials for learning about these diagrams. 
http://www.tutorialspoint.com/uml/index.htm 

This is the link that I have followed to learn about those.

Friday, October 2, 2015

2015.10.02

Conducting Quality Assurance process for Data transferring

There is a system which is used to transfer transactions to the online database. Client use the system from local database, client wants to publish them on a live database for easy accessing of customers. Client can upload their transaction to the live database meanwhile they are continuing their transactions or after the end of the day. 

In the local system, there will be shown the count of existing transactions which are prepared to upload to live temporary database. Then user can click on upload button and upload them in to live temporary database through internet connection.

Here I am asked to check whether all the data which are clicked to upload to live temporary database are going to the correct destination without any damage or not. Since, I have to concentrate on the internet connection more because, the data transferring method is based on internet. 

I used 2 methods for checking this.
  1. Keep the internet connection properly with the system.
  2. Disconnect the internet connection with the system.
If there is the proper internet connection with system, all the data should be transferred to live temporary database. Also if the internet connection is disconnected, there should be an error message when trying to upload data.

Also I have to check the system capability to upload heavy load of data at once. For that purpose I have to upload more than 2000 transaction data at once and wait for the system response time meanwhile controlling the internet connection.I have to count the time that the system will be taken for uploading those data sets. 

After we have the uploading count is equals to 0, I have to concentrate on the live temporary database system and there I can see the number of transaction data that have been transferred from local database system. If the count of local database transferred data and live temporary database data are equal, then I can prove that there is no data dismiss or data damage. 

Afterwards, I have to send all data which are on live temporary database to the live database. There also I have to check all transactions meanwhile controlling internet connection. The process which I follows here also the same as upon.