Glossary all terms 3.1 / Glossary all terms 3.1: S

Власник перекладу встановив такі правила доступу, що ви не можете переглядати чужі варіанти перекладів тут.
Оригінал англійською Переклад українською

S.M.A.R.T. goal methodology (SMART)
A methodology whereby objectives are defined very specifically rather than generically. SMART is an acronym derived from the attributes of the objective to be defined: Specific, Measurable, Attainable, Relevant and Timely.




safety critical system
A system whose failure or malfunction may result in death or serious injury to people, or loss or severe damage to equipment, or environmental harm.


safety testing
Testing to determine the safety of a software product.


See Also: hashing
A cryptographic technique that adds random data (salt) to the user data prior to hashing.


Ref: After Gerrard
The capability of the software product to be upgraded to accommodate increased loads.


scalability testing
Testing to determine the scalability of the software product.


See Also: balanced scorecard, dashboard
A representation of summarized performance measurements representing progress towards the implementation of long-term goals. A scorecard provides static measurements of performance over or at the end of a defined interval.




script kiddie
See Also: hacker
A person who executes security attacks that have been created by other hackers rather than creating own ones.


scripted testing
Test execution carried out by following a previously documented sequence of tests.


scripting language


See Also: Agile software development
An iterative incremental framework for managing projects commonly used with Agile software development.




security attack
Ref: after NIST.IR.7298
An attempt to gain unauthorized access to a system or component, resources, information, or an attempt to
compromise system integrity.


security audit
An audit evaluating an organization's security processes and infrastructure.


security policy
A high-level document describing the principles, approach and major objectives of the organization regarding security.


security procedure
A set of steps required to implement the security policy and the steps to be taken in response to a security incident


security testing


security testing tool


security tool


security vulnerability
A weakness in the system that could allow for a successful security attack.


session-based test management
A method for measuring and managing session-based testing, e.g., exploratory testing.


session-based testing
An approach to testing in which test activities are planned as uninterrupted sessions of test design and execution, often used in conjunction with exploratory testing.




A programming language/interpreter technique for evaluating compound conditions in which a condition on one side of a logical operator may not be evaluated if the condition on the other side is sufficient to determine the final outcome.






site acceptance testing


smoke test
See Also: build, verification test, intake test
Synonyms: confidence test , sanity test
A subset of all defined/planned test cases that cover the main functionality of a component or system, to ascertaining that the most crucial functions of a program work, but not bothering with finer details.


social engineering
Ref: NIST.IR.7298
An attempt to trick someone into revealing information (e.g., a password) that can be used to attack systems or networks.




software integrity level


software lifecycle


software process improvement (SPI)
Ref: After CMMI
A program of activities designed to improve the performance and maturity of the organization's software processes and the results of such a program.


software quality
Ref: After ISO 9126 See Also: quality
The totality of functionality and features of a software product that bear on its ability to satisfy stated or implied needs.


Software Usability Measurement Inventory (SUMI)
Ref: Kirakowski93
A questionnaire-based usability test technique for measuring software quality from the end user's point of view.




specified input
An input for which the specification predicts a result.


SQL injection
A security attack inserting malicious SQL statements into an entry field for execution.




staged representation
See Also: CMMI
A model structure wherein attaining the goals of a set of process areas establishes a maturity level; each level builds a foundation for subsequent levels.




standard-compliant test strategy
A test strategy whereby the test team follows a standard. Standards followed may be valid e.g., for a country (legislation standards), a business domain (domain standards), or internally (organizational standards).


standard-compliant testing


state diagram
Ref: IEEE 610
A diagram that depicts the states that a component or system can assume, and shows the events or circumstances that cause and/or result from a change from one state to another.


state table


state transition


state transition testing




Наступна сторінка →