#TestCulture ๐Ÿฆ… Episode 8 โ€” Different types of tests

2 min readMar 20, 2023

When it comes to types of tests, we can separate ๐šŠ๐šž๐š๐š˜๐š–๐šŠ๐š๐šŽ๐š tests and ๐š–๐šŠ๐š—๐šž๐šŠ๐š• tests. Here, we are going to cover both types of tests.

๐—จ๐—ป๐—ถ๐˜ ๐˜๐—ฒ๐˜€๐˜๐˜€. They allow to test each component of an application individually, and validate โœ… the quality of the code and the performance of a module.

๐—ฃ๐—ฒ๐—ฟ๐—ณ๐—ผ๐—ฟ๐—บ๐—ฎ๐—ป๐—ฐ๐—ฒ ๐˜๐—ฒ๐˜€๐˜๐˜€. They validate the capacity of servers and networks to support high access loads.

๐—œ๐—ป๐˜๐—ฒ๐—ด๐—ฟ๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐˜๐—ฒ๐˜€๐˜๐˜€. They validate the various modules integration and their final operating environment. They highlight gaps problems between the different programs. ๐Ÿ”ฉ

๐—™๐˜‚๐—ป๐—ฐ๐˜๐—ถ๐—ผ๐—ป๐—ฎ๐—น ๐˜๐—ฒ๐˜€๐˜๐˜€. They verify the good application conformity with the initial specifications. These tests are based on functional specifications, but also on technical specifications. ๐Ÿ› ๏ธ

๐—ฅ๐—ฒ๐—ด๐—ฟ๐—ฒ๐˜€๐˜€๐—ถ๐—ผ๐—ป ๐˜๐—ฒ๐˜€๐˜๐˜€. They verify that the modifications have not altered the functioning of the application.

๐—–๐—ผ๐—ป๐—ณ๐—ถ๐—ด๐˜‚๐—ฟ๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐˜๐—ฒ๐˜€๐˜๐˜€. They study the impact of operating environments on its functioning.

๐—œ๐—ป๐˜€๐˜๐—ฎ๐—น๐—น๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐˜๐—ฒ๐˜€๐˜๐˜€. They check all aspects related to the installation, but also to the documentation. ๐Ÿ“‹

๐—›๐— ๐—œ ๐˜๐—ฒ๐˜€๐˜๐˜€. They check if the ๐–Œ๐–—๐–†๐–•๐–๐–Ž๐–ˆ ๐–ˆ๐–๐–†๐–—๐–™๐–Š๐–— has been respected during the development. They check the visual presentation and also the navigation.

๐—Ÿ๐—ผ๐—ฎ๐—ฑ ๐˜๐—ฒ๐˜€๐˜๐˜€. These non-functional tests determine how the software application behaves when used by multiple users simultaneously.

๐—”๐—ฐ๐—ฐ๐—ฒ๐—ฝ๐˜๐—ฎ๐—ป๐—ฐ๐—ฒ ๐˜๐—ฒ๐˜€๐˜๐˜€. Acceptance testing verifies that a system meets its business requirements. They can also measure system performance and reject changes if objectives are not met. ๐Ÿ’ญ

๐—˜๐˜…๐—ฝ๐—น๐—ผ๐—ฟ๐—ฎ๐˜๐—ผ๐—ฟ๐˜† ๐˜๐—ฒ๐˜€๐˜๐˜€. Very precise, they discover errors โŒ that are difficult to spot when a manual test is performed.

๐—ฆ๐—บ๐—ผ๐—ธ๐—ฒ ๐˜๐—ฒ๐˜€๐˜๐˜€. They reveal serious failures that may reject ๐˜ข ๐˜ง๐˜ถ๐˜ต๐˜ถ๐˜ณ๐˜ฆ ๐˜ท๐˜ฆ๐˜ณ๐˜ด๐˜ช๐˜ฐ๐˜ฏ of the application. ๐Ÿ”œ They assess whether the main software functions appear to be working properly.

๐—”๐—ฑ๐—บ๐—ถ๐˜€๐˜€๐—ถ๐—ผ๐—ป ๐˜๐—ฒ๐˜€๐˜. When a smoke test is used to determine whether a computer program should be subjected to further, more refined testing, it may be called an admission test.

๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐˜๐—ฒ๐˜€๐˜๐˜€. They reveal flaws in the security mechanisms of an information system that protect data and maintain functionality as intended. However, this does not mean that there are no flaws.

๐—ฃ๐—ฒ๐—ป๐˜๐—ฒ๐˜€๐˜๐—ถ๐—ป๐—ด. Ethical hacking technique that consists in testing ๐˜ต๐˜ฉ๐˜ฆ ๐˜ท๐˜ถ๐˜ญ๐˜ฏ๐˜ฆ๐˜ณ๐˜ข๐˜ฃ๐˜ช๐˜ญ๐˜ช๐˜ต๐˜บ of a computer system, an application or a website by detecting flaws that could be exploited by a hacker or a malware. ๐Ÿ•ต๏ธ

A thread on Twitter.




Codeless functional testing at scale is now a reality.