Overview

CMMI is a process improvement approach that provides organizations with the essential elements of effective processes that ultimately improve their performance. CMMI can be used to guide process improvement across a project, a division, or an entire organization. It helps integrate traditionally separate organizational functions, set process improvement goals and priorities, provide guidance for quality processes, and provide a point of reference for appraising current processes.

The benefits you can expect from using CMMI include the following:

  • Your organization's activities are explicitly linked to your business objectives.
  • Your visibility into the organization's activities is increased to help you ensure that your product or service meets the customer's expectations.
  • You learn from new areas of best practice (e.g., measurement, risk)

CMMI is being adopted worldwide, including North America, Europe, Asia, Australia, South America, and Africa. This kind of response has substantiated the SEI's commitment to CMMI.

You can use CMMI in three different areas of interest:

The CMMI Version 1.2 Overview presentation introduces the CMMI concept and can help you make decisions about your process improvement plans. You can also use this presentation to inform others in your organization about CMMI.

CMMI models are collections of best practices that you can compare to your organization's best practices and guide improvement to your processes. A formal comparison of a CMMI model to your processes is called an appraisal. The Standard CMMI Appraisal Method for Process Improvement (SCAMPI) incorporates the best ideas of several process improvement appraisal methods.

'Computer Science' 카테고리의 다른 글

요구사항관리  (0) 2010.04.03
IT 개발을 위한 CMMI  (0) 2010.04.03
소프트웨어 테스트  (0) 2010.04.03
소프트웨어 테스트 V-모델  (0) 2010.04.03
정보시스템 감리사 Q&A  (0) 2010.03.30

Software testing

From Wikipedia, the free encyclopedia

Jump to: navigation, search
Software development process
Activities and steps
Requirements· Specification
Architecture· Design
Implementation· Testing
Deployment· Maintenance
Models
Agile· Cleanroom· DSDM
Iterative· RAD · RUP · Spiral
Waterfall· XP· Scrum · Lean
V-Model · FDD · TDD
Supporting disciplines
Configuration management
Documentation
Quality assurance (SQA)
Project management
User experience design
Tools
Compiler · Debugger · Profiler
GUI designer
Integrated development environment

Software testing is an investigation conducted to provide stakeholders with information about the quality of the product or service under test.[1] Software Testing also provides an objective, independent view of the software to allow the business to appreciate and understand the risks at implementation of the software. Test techniques include, but are not limited to, the process of executing a program or application with the intent of finding software bugs.

Software Testing can also be stated as the process of validating and verifying that a software program/application/product:

  1. meets the business and technical requirements that guided its design and development;
  2. works as expected; and
  3. can be implemented with the same characteristics.

Software Testing, depending on the testing method employed, can be implemented at any time in the development process. However, most of the test effort occurs after the requirements have been defined and the coding process has been completed. As such, the methodology of the test is governed by the Software Development methodology adopted.

Different software development models will focus the test effort at different points in the development process. Newer development models, such as Agile, often employ test driven development and place an increased portion of the testing in the hands of the developer, before it reaches a formal team of testers. In a more traditional model, most of the test execution occurs after the requirements have been defined and the coding process has been completed.

Contents

[hide]

[edit] Overview

Testing can never completely identify all the defects within software. Instead, it furnishes a criticism or comparison that compares the state and behavior of the product against oracles—principles or mechanisms by which someone might recognize a problem. These oracles may include (but are not limited to) specifications, contracts,[2] comparable products, past versions of the same product, inferences about intended or expected purpose, user or customer expectations, relevant standards, applicable laws, or other criteria.

Every software product has a target audience. For example, the audience for video game software is completely different from banking software. Therefore, when an organization develops or otherwise invests in a software product, it can assess whether the software product will be acceptable to its end users, its target audience, its purchasers, and other stakeholders. Software testing is the process of attempting to make this assessment.

A study conducted by NIST in 2002 reports that software bugs cost the U.S. economy $59.5 billion annually. More than a third of this cost could be avoided if better software testing was performed.[3]

[edit] History

The separation of debugging from testing was initially introduced by Glenford J. Myers in 1979.[4] Although his attention was on breakage testing ("a successful test is one that finds a bug"[4][5]) it illustrated the desire of the software engineering community to separate fundamental development activities, such as debugging, from that of verification. Dave Gelperin and William C. Hetzel classified in 1988 the phases and goals in software testing in the following stages:[6]

  • Until 1956 - Debugging oriented[7]
  • 1957–1978 - Demonstration oriented[8]
  • 1979–1982 - Destruction oriented[9]
  • 1983–1987 - Evaluation oriented[10]
  • 1988–2000 - Prevention oriented[11]

[edit] Software testing topics

[edit] Scope

A primary purpose for testing is to detect software failures so that defects may be uncovered and corrected. This is a non-trivial pursuit. Testing cannot establish that a product functions properly under all conditions but can only establish that it does not function properly under specific conditions.[12] The scope of software testing often includes examination of code as well as execution of that code in various environments and conditions as well as examining the aspects of code: does it do what it is supposed to do and do what it needs to do. In the current culture of software development, a testing organization may be separate from the development team. There are various roles for testing team members. Information derived from software testing may be used to correct the process by which software is developed.[13]

[edit] Functional vs non-functional testing

Functional testing refers to tests that verify a specific action or function of the code. These are usually found in the code requirements d0cumentation, although some development methodologies work from use cases or user stories. Functional tests tend to answer the question of "can the user do this" or "does this particular feature work".

Non-functional testing refers to aspects of the software that may not be related to a specific function or user action, such as scalability or security. Non-functional testing tends to answer such questions as "how many people can log in at once", or "how easy is it to hack this software".

[edit] Defects and failures

Not all software defects are caused by coding errors. One common source of expensive defects is caused by requirement gaps, e.g., unrecognized requirements, that result in errors of omission by the program designer.[14] A common source of requirements gaps is non-functional requirements such as testability, scalability, maintainability, usability, performance, and security.

Software faults occur through the following processes. A programmer makes an error (mistake), which results in a defect (fault, bug) in the software source code. If this defect is executed, in certain situations the system will produce wrong results, causing a failure.[15] Not all defects will necessarily result in failures. For example, defects in dead code will never result in failures. A defect can turn into a failure when the environment is changed. Examples of these changes in environment include the software being run on a new hardware platform, alterations in source data or interacting with different software.[15] A single defect may result in a wide range of failure symptoms.

[edit] Finding faults early

It is commonly believed that the earlier a defect is found the cheaper it is to fix it.[16] The following table shows the cost of fixing the defect depending on the stage it was found.[17] For example, if a problem in the requirements is found only post-release, then it would cost 10–100 times more to fix than if it had already been found by the requirements review.

Time Detected
RequirementsArchitectureConstructionSystem TestPost-Release
Time IntroducedRequirements5–10×10×10–100×
Architecture-10×15×25–100×
Construction--10×10–25×

[edit] Compatibility

A common cause of software failure (real or perceived) is a lack of compatibility with other application software, operating systems (or operating system versions, old or new), or target environments that differ greatly from the original (such as a terminal or GUI application intended to be run on the desktop now being required to become a Web application, which must render in a Web browser). For example, in the case of a lack of backward compatibility, this can occur because the programmers develop and test software only on the latest version of the target environment, which not all users may be running. This results in the unintended consequence that the latest work may not function on earlier versions of the target environment, or on older hardware that earlier versions of the target environment was capable of using. Sometimes such issues can be fixed by proactively abstracting operating system functionality into a separate program module or library.

[edit] Input combinations and preconditions

A very fundamental problem with software testing is that testing under all combinations of inputs and preconditions (initial state) is not feasible, even with a simple product.[12][18] This means that the number of defects in a software product can be very large and defects that occur infrequently are difficult to find in testing. More significantly, non-functional dimensions of quality (how it is supposed to be versus what it is supposed to do)—usability, scalability, performance, compatibility, reliability—can be highly subjective; something that constitutes sufficient value to one person may be intolerable to another.

[edit] Static vs. dynamic testing

There are many approaches to software testing. Reviews, walkthroughs, or inspections are considered as static testing, whereas actually executing programmed code with a given set of test cases is referred to as dynamic testing. Static testing can be (and unfortunately in practice often is) omitted. Dynamic testing takes place when the program itself is used for the first time (which is generally considered the beginning of the testing stage). Dynamic testing may begin before the program is 100% complete in order to test particular sections of code (modules or discrete functions). Typical techniques for this are either using stubs/drivers or execution from a debugger environment. For example, Spreadsheet programs are, by their very nature, tested to a large extent interactively ("on the fly"), with results displayed immediately after each calculation or text manipulation.

[edit] Software verification and validation

Software testing is used in association with verification and validation:[19]

  • Verification: Have we built the software right? (i.e., does it match the specification).
  • Validation: Have we built the right software? (i.e., is this what the customer wants).

The terms verification and validation are commonly used interchangeably in the industry; it is also common to see these two terms incorrectly defined. According to the IEEE Standard Glossary of Software Engineering Terminology:

Verification is the process of evaluating a system or component to determine whether the products of a given development phase satisfy the conditions imposed at the start of that phase.
Validation is the process of evaluating a system or component during or at the end of the development process to determine whether it satisfies specified requirements.

[edit] The software testing team

Software testing can be done by software testers. Until the 1980s the term "software tester" was used generally, but later it was also seen as a separate profession. Regarding the periods and the different goals in software testing,[20] different roles have been established: manager, test lead, test designer, tester, automation developer, and test administrator.

[edit] Software Quality Assurance (SQA)

Though controversial, software testing may be viewed as an important part of the software quality assurance (SQA) process.[12] In SQA, software process specialists and auditors take a broader view on software and its development. They examine and change the software engineering process itself to reduce the amount of faults that end up in the delivered software: the so-called defect rate.

What constitutes an "acceptable defect rate" depends on the nature of the software. For example, an arcade video game designed to simulate flying an airplane would presumably have a much higher tolerance for defects than mission critical software such as that used to control the functions of an airliner that really is flying!

Although there are close links with SQA, testing departments often exist independently, and there may be no SQA function in some companies.

Software Testing is a task intended to detect defects in software by contrasting a computer program's expected results with its actual results for a given set of inputs. By contrast, QA (Quality Assurance) is the implementation of policies and procedures intended to prevent defects from occurring in the first place.

[edit] Testing methods

[edit] The box approach

Software testing methods are traditionally divided into black box testing and white box testing. These two approaches are used to describe the point of view that a test engineer takes when designing test cases.

[edit] Black box testing

Black box testing treats the software as a "black box"—without any knowledge of internal implementation. Black box testing methods include: equivalence partitioning, boundary value analysis, all-pairs testing, fuzz testing, model-based testing, traceability matrix, exploratory testing and specification-based testing.

Specification-based testing: Specification-based testing aims to test the functionality of software according to the applicable requirements.[21] Thus, the tester inputs data into, and only sees the output from, the test object. This level of testing usually requires thorough test cases to be provided to the tester, who then can simply verify that for a given input, the output value (or behavior), either "is" or "is not" the same as the expected value specified in the test case.
Specification-based testing is necessary, but it is insufficient to guard against certain risks.[22]
Advantages and disadvantages: The black box tester has no "bonds" with the code, and a tester's perception is very simple: a code must have bugs. Using the principle, "Ask and you shall receive," black box testers find bugs where programmers do not. But, on the other hand, black box testing has been said to be "like a walk in a dark labyrinth without a flashlight," because the tester doesn't know how the software being tested was actually constructed. As a result, there are situations when (1) a tester writes many test cases to check something that could have been tested by only one test case, and/or (2) some parts of the back-end are not tested at all.

Therefore, black box testing has the advantage of "an unaffiliated opinion," on the one hand, and the disadvantage of "blind exploring," on the other. [23]

[edit] White box testing

White box testing is when the tester has access to the internal data structures and algorithms including the code that implement these.

Types of white box testing
The following types of white box testing exist:
  • API testing (application programming interface) - Testing of the application using Public and Private APIs
  • Code coverage - creating tests to satisfy some criteria of code coverage (e.g., the test designer can create tests to cause all statements in the program to be executed at least once)
  • Fault injection methods - improving the coverage of a test by introducing faults to test code paths
  • Mutation testing methods
  • Static testing - White box testing includes all static testing
Test coverage
White box testing methods can also be used to evaluate the completeness of a test suite that was created with black box testing methods. This allows the software team to examine parts of a system that are rarely tested and ensures that the most important function points have been tested.[24]
Two common forms of code coverage are:
  • Function coverage, which reports on functions executed
  • Statement coverage, which reports on the number of lines executed to complete the test

They both return a code coverage metric, measured as a percentage.

[edit] Grey Box Testing

Grey box testing (American spelling: Gray box testing) involves having access to internal data structures and algorithms for purposes of designing the test cases, but testing at the user, or black-box level. Manipulating input data and formatting output do not qualify as grey box, because the input and output are clearly outside of the "black-box" that we are calling the system under test. This distinction is particularly important when conducting integration testing between two modules of code written by two different developers, where only the interfaces are exposed for test. However, modifying a data repository does qualify as grey box, as the user would not normally be able to change the data outside of the system under test. Grey box testing may also include reverse engineering to determine, for instance, boundary values or error messages.

[edit] Testing Levels

Tests are frequently grouped by where they are added in the software development process, or by the level of specificity of the test.

[edit] Unit Testing

Unit testing refers to tests that verify the functionality of a specific section of code, usually at the function level. In an object-oriented environment, this is usually at the class level, and the minimal unit tests include the constructors and destructors.[25]

These type of tests are usually written by developers as they work on code (white-box style), to ensure that the specific function is working as expected. One function might have multiple tests, to catch corner cases or other branches in the code. Unit testing alone cannot verify the functionality of a piece of software, but rather is used to assure that the building blocks the software uses work independently of each other.

Unit testing is also called Component Testing.

[edit] Integration Testing

Integration testing is any type of software testing that seeks to verify the interfaces between components against a software design. Software components may be integrated in an iterative way or all together ("big bang"). Normally the former is considered a better practice since it allows interface issues to be localised more quickly and fixed.

Integration testing works to expose defects in the interfaces and interaction between integrated components (modules). Progressively larger groups of tested software components corresponding to elements of the architectural design are integrated and tested until the software works as a system.[26]

[edit] System Testing

System testing tests a completely integrated system to verify that it meets its requirements.[27]

[edit] System Integration Testing

System integration testing verifies that a system is integrated to any external or third party systems defined in the system requirements.[citation needed]

[edit] Regression Testing

Regression testing focuses on finding defects after a major code change has occurred. Specifically, it seeks to uncover software regressions, or old bugs that have come back. Such regressions occur whenever software functionality that was previously working correctly stops working as intended. Typically, regressions occur as an unintended consequence of program changes, when the newly developed part of the software collides with the previously existing code. Common methods of regression testing include re-running previously run tests and checking whether previously fixed faults have re-emerged. The depth of testing depends on the phase in the release process and the risk of the added features. They can either be complete, for changes added late in the release or deemed to be risky, to very shallow, consisting of positive tests on each feature, if the changes are early in the release or deemed to be of low risk.

[edit] Acceptance testing

Acceptance testing can mean one of two things:

  1. A smoke test is used as an acceptance test prior to introducing a new build to the main testing process, i.e. before integration or regression.
  2. Acceptance testing performed by the customer, often in their lab environment on their own HW, is known as user acceptance testing (UAT). Acceptance testing may be performed as part of the hand-off process between any two phases of development.[citation needed]

[edit] Alpha testing

Alpha testing is simulated or actual operational testing by potential users/customers or an independent test team at the developers' site. Alpha testing is often employed for off-the-shelf software as a form of internal acceptance testing, before the software goes to beta testing.[citation needed]

[edit] Beta testing

Beta testing comes after alpha testing. Versions of the software, known as beta versions, are released to a limited audience outside of the programming team. The software is released to groups of people so that further testing can ensure the product has few faults or bugs. Sometimes, beta versions are made available to the open public to increase the feedback field to a maximal number of future users.[citation needed]

[edit] Non Functional Software Testing

Special methods exist to test non-functional aspects of software. In contrast to functional testing, which establishes the correct operation of the software (correct in that it matches the expected behavior defined in the design requirements), non-functional testing verifies that the software functions properly even when it receives invalid or unexpected inputs. Software fault injection, in the form of fuzzing, is an example of non-functional testing. Non-functional testing, especially for software, is designed to establish whether the device under test can tolerate invalid or unexpected inputs, thereby establishing the robustness of input validation routines as well as error-handling routines. Various commercial non-functional testing tools are linked from the Software fault injection page; there are also numerous open-source and free software tools available that perform non-functional testing.

[edit] Software performance testing and load testing

Performance testing is executed to determine how fast a system or sub-system performs under a particular workload. It can also serve to validate and verify other quality attributes of the system, such as scalability, reliability and resource usage. Load testing is primarily concerned with testing that can continue to operate under a specific load, whether that be large quantities of data or a large number of users. This is generally referred to as software scalability. The related load testing activity of when performed as a non-functional activity is often referred to as Endurance Testing.

Volume testing is a way to test functionality. Stress testing is a way to test reliability. Load testing is a way to test performance. There is little agreement on what the specific goals of load testing are. The terms load testing, performance testing, reliability testing, and volume testing, are often used interchangeably.

[edit] Stability testing

Stability testing checks to see if the software can continuously function well in or above an acceptable period. This activity of Non Functional Software Testing is oftentimes referred to as load (or endurance) testing.

[edit] Usability testing

Usability testing is needed to check if the user interface is easy to use and understand.

[edit] Security testing

Security testing is essential for software that processes confidential data to prevent system intrusion by hackers.

[edit] Internationalization and localization

Internationalization and localization is needed to test these aspects of software, for which a pseudolocalization method can be used. It will verify that the application still works, even after it has been translated into a new language or adapted for a new culture (such as different currencies or time zones).

[edit] Destructive testing

Destructive testing attempts to cause the software or a sub-system to fail, in order to test its robustness.

[edit] The testing process

[edit] Traditional CMMI or waterfall development model

A common practice of software testing is that testing is performed by an independent group of testers after the functionality is developed, before it is shipped to the customer.[28] This practice often results in the testing phase being used as a project buffer to compensate for project delays, thereby compromising the time devoted to testing.[29]

Another practice is to start software testing at the same moment the project starts and it is a continuous process until the project finishes.[30]

[edit] Agile or Extreme development model

In counterpoint, some emerging software disciplines such as extreme programming and the agile software development movement, adhere to a "test-driven software development" model. In this process, unit tests are written first, by the software engineers (often with pair programming in the extreme programming methodology). Of course these tests fail initially; as they are expected to. Then as code is written it passes incrementally larger portions of the test suites. The test suites are continuously updated as new failure conditions and corner cases are discovered, and they are integrated with any regression tests that are developed. Unit tests are maintained along with the rest of the software source code and generally integrated into the build process (with inherently interactive tests being relegated to a partially manual build acceptance process). The ultimate goal of this test process is to achieve continuous deployment where software updates can be published to the public frequently. [31] [32]

[edit] A sample testing cycle

Although variations exist between organizations, there is a typical cycle for testing[33]. The sample below is common among organizations employing the Waterfall development model.

  • Requirements analysis: Testing should begin in the requirements phase of the software development life cycle. During the design phase, testers work with developers in determining what aspects of a design are testable and with what parameters those tests work.
  • Test planning: Test strategy, test plan, testbed creation. Since many activities will be carried out during testing, a plan is needed.
  • Test development: Test procedures, test scenarios, test cases, test datasets, test scripts to use in testing software.
  • Test execution: Testers execute the software based on the plans and test d0cuments then report any errors found to the development team.
  • Test reporting: Once testing is completed, testers generate metrics and make final reports on their test effort and whether or not the software tested is ready for release.
  • Test result analysis: Or Defect Analysis, is done by the development team usually along with the client, in order to decide what defects should be treated, fixed, rejected (i.e. found software working properly) or deferred to be dealt with later.
  • Defect Retesting: Once a defect has been dealt with by the development team, it is retested by the testing team. AKA Resolution testing.
  • Regression testing: It is common to have a small test program built of a subset of tests, for each integration of new, modified, or fixed software, in order to ensure that the latest delivery has not ruined anything, and that the software product as a whole is still working correctly.
  • Test Closure: Once the test meets the exit criteria, the activities such as capturing the key outputs, lessons learned, results, logs, d0cuments related to the project are archived and used as a reference for future projects.

[edit] Automated testing

Many programming groups are relying more and more on automated testing, especially groups that use Test-driven development. There are many frameworks to write tests in, and Continuous Integration software will run tests automatically every time code is checked into a version control system.

While automation cannot reproduce everything that a human can do (and all the strange ways they think of doing it), it can be very useful for regression testing. However, it does require a well-developed test suite of testing scripts in order to be truly useful.

[edit] Testing Tools

Program testing and fault detection can be aided significantly by testing tools and debuggers. Testing/debug tools include features such as:

Some of these features may be incorporated into an Integrated Development Environment (IDE).

[edit] Measurement in software testing

Usually, quality is constrained to such topics as correctness, completeness, security,[citation needed] but can also include more technical requirements as described under the ISO standard ISO 9126, such as capability, reliability, efficiency, portability, maintainability, compatibility, and usability.

There are a number of frequently-used software measures, often called "metrics", which are used to assist in determining the state of the software or the adequacy of the testing.

[edit] Testing artifacts

Software testing process can produce several artifacts.

Test plan
A test specification is called a test plan. The developers are well aware what test plans will be executed and this information is made available to management and the developers. The idea is to make them more cautious when developing their code or making additional changes. Some companies have a higher-level d0cument called a test strategy.
Traceability matrix
A traceability matrix is a table that correlates requirements or design d0cuments to test d0cuments. It is used to change tests when the source d0cuments are changed, or to verify that the test results are correct.
Test case
A test case normally consists of a unique identifier, requirement references from a design specification, preconditions, events, a series of steps (also known as actions) to follow, input, output, expected result, and actual result. Clinically defined a test case is an input and an expected result.[34] This can be as pragmatic as 'for condition x your derived result is y', whereas other test cases described in more detail the input scenario and what results might be expected. It can occasionally be a series of steps (but often steps are contained in a separate test procedure that can be exercised against multiple test cases, as a matter of economy) but with one expected result or expected outcome. The optional fields are a test case ID, test step, or order of execution number, related requirement(s), depth, test category, author, and check boxes for whether the test is automatable and has been automated. Larger test cases may also contain prerequisite states or steps, and descriptions. A test case should also contain a place for the actual result. These steps can be stored in a word processor d0cument, spreadsheet, database, or other common repository. In a database system, you may also be able to see past test results, who generated the results, and what system configuration was used to generate those results. These past results would usually be stored in a separate table.
Test script
The test script is the combination of a test case, test procedure, and test data. Initially the term was derived from the product of work created by automated regression test tools. Today, test scripts can be manual, automated, or a combination of both.
Test suite
The most common term for a collection of test cases is a test suite. The test suite often also contains more detailed instructions or goals for each collection of test cases. It definitely contains a section where the tester identifies the system configuration used during testing. A group of test cases may also contain prerequisite states or steps, and descriptions of the following tests.
Test data
In most cases, multiple sets of values or data are used to test the same functionality of a particular feature. All the test values and changeable environmental components are collected in separate files and stored as test data. It is also useful to provide this data to the client and with the product or a project.
Test harness
The software, tools, samples of data input and output, and configurations are all referred to collectively as a test harness.

[edit] Certifications

Several certification programs exist to support the professional aspirations of software testers and quality assurance specialists. No certification currently offered actually requires the applicant to demonstrate the ability to test software. No certification is based on a widely accepted body of knowledge. This has led some to declare that the testing field is not ready for certification.[35] Certification itself cannot measure an individual's productivity, their skill, or practical knowledge, and cannot guarantee their competence, or professionalism as a tester.[36]

Software testing certification types
  • Exam-based: Formalized exams, which need to be passed; can also be learned by self-study [e.g., for ISTQB or QAI][37]
  • Education-based: Instructor-led sessions, where each course has to be passed [e.g., International Institute for Software Testing (IIST)].
Testing certifications
Quality assurance certifications

[edit] Controversy

Some of the major software testing controversies include:

What constitutes responsible software testing?
Members of the "context-driven" school of testing[45] believe that there are no "best practices" of testing, but rather that testing is a set of skills that allow the tester to select or invent testing practices to suit each unique situation.[46]
Agile vs. traditional
Should testers learn to work under conditions of uncertainty and constant change or should they aim at process "maturity"? The agile testing movement has received growing popularity since 2006 mainly in commercial circles [47][48], whereas government and military[49] software providers are slow to embrace this methodology[neutrality is disputed] in favour of traditional test-last models (e.g. in the Waterfall model).
Exploratory test vs. scripted[50]
Should tests be designed at the same time as they are executed or should they be designed beforehand?
Manual testing vs. automated
Some writers believe that test automation is so expensive relative to its value that it should be used sparingly.[51] More in particular, test-driven development states that developers should write unit-tests of the XUnit type before coding the functionality. The tests then can be considered as a way to capture and implement the requirements.
Software design vs. software implementation[52]
Should testing be carried out only at the end or throughout the whole process?
Who watches the watchmen?
The idea is that any form of observation is also an interaction—the act of testing can also affect that which is being tested[53].

[edit] See also

[edit] References

  1. ^ http://www.kaner.com/pdfs/ETatQAI.pdf Exploratory Testing], Cem Kaner, Florida Institute of Technology, Quality Assurance Institute Worldwide Annual Software Testing Conference, Orlando, FL, November 2006
  2. ^ Leitner, A., Ciupa, I., Oriol, M., Meyer, B., Fiva, A., "Contract Driven Development = Test Driven Development - Writing Test Cases", Proceedings of ESEC/FSE'07: European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering 2007, (Dubrovnik, Croatia), September 2007
  3. ^ Software errors cost U.S. economy $59.5 billion annually, NIST report
  4. ^ a b Myers, Glenford J. (1979). The Art of Software Testing. John Wiley and Sons. ISBN0-471-04328-1.
  5. ^ Dr. Dobb's journal of software tools for the professional programmer (M&T Pub) 12 (1-6): 116. 1987. http://books.google.com/books?id=7RoIAAAAIAAJ&q="a+successful+test+is+one+that+finds+a+bug&dq="a+successful+test+is+one+that+finds+a+bug&ei=U44OSsOxBpKSzgSxo4mXAg&pgis=1.
  6. ^ Gelperin, D.; B. Hetzel (1988). "The Growth of Software Testing". CACM 31 (6). ISSN 0001-0782.
  7. ^ until 1956 it was the debugging oriented period, when testing was often associated to debugging: there was no clear difference between testing and debugging. Gelperin, D.; B. Hetzel (1988). "The Growth of Software Testing". CACM 31 (6). ISSN 0001-0782.
  8. ^ From 1957–1978 there was the demonstration oriented period where debugging and testing was distinguished now - in this period it was shown, that software satisfies the requirements. Gelperin, D.; B. Hetzel (1988). "The Growth of Software Testing". CACM 31 (6). ISSN 0001-0782.
  9. ^ The time between 1979–1982 is announced as the destruction oriented period, where the goal was to find errors. Gelperin, D.; B. Hetzel (1988). "The Growth of Software Testing". CACM 31 (6). ISSN 0001-0782.
  10. ^ 1983–1987 is classified as the evaluation oriented period: intention here is that during the software lifecycle a product evaluation is provided and measuring quality. Gelperin, D.; B. Hetzel (1988). "The Growth of Software Testing". CACM 31 (6). ISSN 0001-0782.
  11. ^ From 1988 on it was seen as prevention oriented period where tests were to demonstrate that software satisfies its specification, to detect faults and to prevent faults. Gelperin, D.; B. Hetzel (1988). "The Growth of Software Testing". CACM 31 (6). ISSN 0001-0782.
  12. ^ a b c Kaner, Cem; Falk, Jack and Nguyen, Hung Quoc (1999). Testing Computer Software, 2nd Ed.. New York, et al: John Wiley and Sons, Inc.. pp.480 pages. ISBN0-471-35846-0.
  13. ^ Kolawa, Adam; Huizinga, Dorota (2007). Automated Defect Prevention: Best Practices in Software Management. Wiley-IEEE Computer Society Press. p.41–43. ISBN0470042125. http://www.wiley.com/WileyCDA/WileyTitle/productCd-0470042125.html.
  14. ^ Kolawa, Adam; Huizinga, Dorota (2007). Automated Defect Prevention: Best Practices in Software Management. Wiley-IEEE Computer Society Press. p.86. ISBN0470042125. http://www.wiley.com/WileyCDA/WileyTitle/productCd-0470042125.html.
  15. ^ a b Section 1.1.2, Certified Tester Foundation Level Syllabus, International Software Testing Qualifications Board
  16. ^ Kaner, Cem; James Bach, Bret Pettichord (2001). Lessons Learned in Software Testing: A Context-Driven Approach. Wiley. p.4. ISBN0-471-08112-4.
  17. ^ McConnell, Steve (2004). Code Complete (2nd ed.). Microsoft Press. pp.960. ISBN0-7356-1967-0.
  18. ^ Principle 2, Section 1.3, Certified Tester Foundation Level Syllabus, International Software Testing Qualifications Board
  19. ^ Tran, Eushiuan (1999). "Verification/Validation/Certification". in Koopman, P.. Topics in Dependable Embedded Systems. USA: Carnegie Mellon University. http://www.ece.cmu.edu/~koopman/des_s99/verification/index.html. Retrieved 2008-01-13.
  20. ^ see D. Gelperin and W.C. Hetzel
  21. ^ Laycock, G. T. (1993) (PostScript). The Theory and Practice of Specification Based Software Testing. Dept of Computer Science, Sheffield University, UK. http://www.mcs.le.ac.uk/people/gtl1/thesis.ps.gz. Retrieved 2008-02-13.
  22. ^ Bach, James (June 1999). "Risk and Requirements-Based Testing" (PDF). Computer 32 (6): 113–114. http://www.satisfice.com/articles/requirements_based_testing.pdf. Retrieved 2008-08-19.
  23. ^ Savenkov, Roman (2008). How to Become a Software Tester. Roman Savenkov Consulting. p.168. ISBN978-0-615-23372-7.
  24. ^ Introduction, Code Coverage Analysis, Steve Cornett
  25. ^ Binder, Robert V. (1999). Testing Object-Oriented Systems: Objects, Patterns, and Tools. Addison-Wesley Professional. p.45. ISBN0-201-80938-9.
  26. ^ Beizer, Boris (1990). Software Testing Techniques (Second ed.). New York: Van Nostrand Reinhold. pp.21,430. ISBN0-442-20672-0.
  27. ^ IEEE (1990). IEEE Standard Computer Dictionary: A Compilation of IEEE Standard Computer Glossaries. New York: IEEE. ISBN1559370793.
  28. ^ e)Testing Phase in Software Testing:-
  29. ^ Myers, Glenford J. (1979). The Art of Software Testing. John Wiley and Sons. p.145–146. ISBN0-471-04328-1.
  30. ^ Dustin, Elfriede (2002). Effective Software Testing. Addison Wesley. p.3. ISBN0-20179-429-2.
  31. ^ Marchenko, Artem (November 16, 2007). "XP Practice: Continuous Integration". http://agilesoftwaredevelopment.com/xp/practices/continuous-integration. Retrieved 2009-11-16.
  32. ^ Gurses, Levent (February 19, 2007). "Agile 101: What is Continuous Integration?". http://www.jacoozi.com/blog/?p=18. Retrieved 2009-11-16.
  33. ^ Pan, Jiantao (Spring 1999). "Software Testing (18-849b Dependable Embedded Systems)". Topics in Dependable Embedded Systems. Electrical and Computer Engineering Department, Carnegie Mellon University. http://www.ece.cmu.edu/~koopman/des_s99/sw_testing/.
  34. ^ IEEE (1998). IEEE standard for software test d0cumentation. New York: IEEE. ISBN0-7381-1443-X.
  35. ^ Kaner, Cem (2001). "NSF grant proposal to "lay a foundation for significant improvements in the quality of academic and commercial courses in software testing"" (pdf). http://www.testingeducation.org/general/nsf_grant.pdf.
  36. ^ Kaner, Cem (2003). "Measuring the Effectiveness of Software Testers" (pdf). http://www.testingeducation.org/a/mest.pdf.
  37. ^ Black, Rex (December 2008). Advanced Software Testing- Vol. 2: Guide to the ISTQB Advanced Certification as an Advanced Test Manager. Santa Barbara: Rocky Nook Publisher. ISBN1933952369.
  38. ^ a b c d e Quality Assurance Institute
  39. ^ a b International Institute for Software Testing
  40. ^ K. J. Ross & Associates
  41. ^ a b "ISTQB". http://www.istqb.org/.
  42. ^ a b "ISTQB in the U.S.". http://www.astqb.org/.
  43. ^ EXIN: Examination Institute for Information Science
  44. ^ a b American Society for Quality
  45. ^ context-driven-testing.com
  46. ^ Article on taking agile traits without the agile method.
  47. ^ “We’re all part of the story” by David Strom, July 1, 2009
  48. ^ IEEE article about differences in adoption of agile trends between experienced managers vs. young students of the Project Management Institute. See also Agile adoption study from 2007
  49. ^ Agile software development practices slowly entering the military
  50. ^ IEEE article on Exploratory vs. Non Exploratory testing
  51. ^ An example is Mark Fewster, Dorothy Graham: Software Test Automation. Addison Wesley, 1999, ISBN 0-201-33140-3.
  52. ^ Article referring to other links questioning the necessity of unit testing
  53. ^ Microsoft Development Network Discussion on exactly this topic

'Computer Science' 카테고리의 다른 글

IT 개발을 위한 CMMI  (0) 2010.04.03
CMMI - 개념 요약  (0) 2010.04.03
소프트웨어 테스트 V-모델  (0) 2010.04.03
정보시스템 감리사 Q&A  (0) 2010.03.30
소프트웨어 기술 경력증 (고급) 프린터 출력  (0) 2010.03.15

V-모델

V 모델

V 모델(V-model)소프트웨어 개발 프로세스폭포수 모델의 확장된 형태 중 하나로 볼 수 있다. 아래 방향으로 선형적으로 내려가면서 진행되는 폭포수 모델과 달리, 이 프로세스는 오른쪽 그림과 같이 코딩 단계에서 위쪽으로 꺽여겨 알파벳 V자 모양으로 진행된다. V 모델은 개발 생명주기의 각 단계와 그에 상응하는 소프트웨어 시험 각 단계의 관계를 보여준다.

V 모델은 소프트웨어 개발 프로세스이다.

V 모델은 소프트웨어 개발의 각 단계마다 상세한 문서화를 통해 작업을 진행하는 잘 짜여진 방법을 사용한다. 또한 테스트 설계와 같은 테스트 활동을 코딩 이후가 아닌 프로젝트 시작 시에 함께 시작하여, 전체적으로 많은 양의 프로젝트 비용과 시간을 감소시킨다.

요구사항 분석

요구사항 분석 단계에서, 개발될 시스템에 대한 요구사항은 시스템 사용자의 필요를 분석함으로써 얻어질 수 있다. 이 단계는 목표로 하는 이상적인 시스템이 수행해야할 기능에 대해 고민하는 단계이다. 그러나 이 단계에서는 소프트웨어가 어떻게 설계되고 구현될 것인지에 대한 사항은 다루지 않는다. 통상적으로 이 단계에서는 사용자를 만나 기능에 대한 의견을 청취하고, 이를 사용자 요구사항 문서로 생성하게 된다.

사용자 요구사항 문서는 일반적으로 사용자가 기대하는 시스템의 기능적 요구사항, 물리적 요구사항, 인터페이스 요구사항, 성능 요구사항, 데이터 요구사항, 보안(security) 요구사항 등을 기록한다. 이 문서는 비스니스 분석가가 시스템에 대해 이해한 바를 사용자와 협의할때 이용되는 문서이기도 하다. 이 문서는 또한 시스템 설계 단계에서 설계자에 대한 지침으로 사용되기 때문에, 사용자는 주의깊이 이 문서를 검토하여야 한다. 통상적으로 사용자 수락시험에 대한 설계는 이 요구사항 분석 단계에서 이루어진다. 참고로 기능적 요구사항비기능적 요구사항 항목을 살펴보라.

시스템 설계

시스템 설계 단계에서 시스템 엔지니어는 사용자 요구사항 문서를 면밀히 검토하는 것을 통해 개발할 시스템에 대해 분석하고 이해한다. 또한 시스템 엔지니어는 사용자 요구사항을 구현 가능성과 필요한 기술들을 파악한다. 그리고 만약 요구사항 중 어느 한가지라도 구현이 불가능할 경우, 이에 대해 사용자에게 알린다. 문제점이 발견되면 해결 가능할 경우, 변경 사항을 반영하여 요구사항 문서를 수정한다.

그러한 과정을 거쳐 개발 단계를 위한 청사진이 될 소프트웨어 기술서(software specification d0cument)가 생성된다. 이 문서는 일반적인 시스템 구성과 메뉴 구조, 자료 구조 등을 기술한다. 또한 기술서는 비즈니스 시나리오에 대한 예나 샘플 윈도우, 이해를 돕기 위한 보고서 등을 추가로 포함할 수 있다. 엔티티 다이어그램(entity diagrams)이나 데이터 목록(data dictionary)과 같은 기술자료 또한 설계 단계에서 산출된다. 그에 더하여 시스템 테스트를 위한 문서도 이 단계에서 준비된다.

아키텍처 설계

컴퓨터 아키텍처소프트웨어 아키텍처 설계 단계를 합쳐서 고수준 설계라 부른다. 아케텍처를 선택함으로써 만들어지는 베이스라인은 일반적으로 모든 구현될 모듈 항목과 그 간략한 기능을 정의하고, 모듈 간의 인터페이스, 관계, 의존성을 기술하며, 필요한 데이터베이스 테이블, 아키텍처 다이어그램, 적용기술 내역을 기술한다. 또한 이 단계에서 통합 테스트에 대한 설계가 이루어진다.

모듈 설계

모듈 설계 단계를 다른 말로 저수준 설계라 부른다. 아키텍처 설계 단계에서 정의된 모듈 항목을 더 세분하여 각각의 모듈에 대한 기술을 작성하며, 이를 이용하여 프로그래머들이 코딩을 시작할 수 있도록 만들어 준다.

이 단계에서 작성될 저수준 설계 문서 또는 프로그램 명세서에서는 각 모듈의 상세한 기능 로직을 의사 코드 (pseudocode)를 이용하여 기술하고, API 명세를 통해 의존성 관련 이슈를 포함하여 각 모듈의 모든 인터페이스 상세 사항을 기술하며, 각 모듈의 에러 코드와 메시지를 기술하며, 각 모듈의 입력과 출력을 기술하며, 필요할 경우 모듈에서 사용하는 데이터 베이스 테이블의 구조와 요소별 타입과 크기또한 기술한다. 또한 이 단계에서는 단위 테스트를 위한 케이스와 절차가 설계된다.

Validation 단계들

단위 테스트

V 모델 방식의 소프트웨어 개발에서 단위 테스트는 테스트 프로세스의 첫 단계이다. 소프트웨어 개발 전문가인 Barry Boehm에 따르면, 단위 시험 단계에서 오류를 수정할 경우, 고객에까지 오류가 전달되었을 때에 비해 수백 배의 수정 비용을 절감할 수 있다.

단위 테스트 시에는 에러를 줄이기 위한 의도로 작성된 코드에 대한 분석을 진행한다. 또한 코드가 효율적으로 작성되었는지, 프로젝트 내에 합의된 코딩 표준을 준수하고 있는지도 검증한다. 대개 이 단계에서의 테스트는 화이트박스 테스트이다. 모듈 설계 단계에서 준비된 테스트 케이스를 이용하며, 코드를 개발한 개발자가 직접 수행한다

통합 테스트

통합 테스트 단계에서는, 각각의 모듈들을 통합하여, 통합된 컴포넌트 간의 인터페이스와 상호작용 상의 오류를 발견하는 작업을 수행한다. 대개 이 단계에서는 테스트는 블랙박스 테스트(Black box testing) 이며, 따라서 코드를 직접 확인하는 형태는 아니다. 아키텍쳐 설계 단계에서 준비된 테스트 케이스를 사용하여 테스트가 진행되며, 일반적으로 개발자가 진행한다.

시스템 테스트

시스템 테스트는 실제 구현된 시스템과 계획된 사양(specifications) 간을 비교하는 작업이다. 이 단계에서 시스템 테스트에 대한 설계가 시스템 설계 문서로부터 도출되어 사용된다. 때로 시스템 테스트는 자동화 도구를 이용하여 자동화된다. 모든 모듈을 통합한 후에, 시스템 레벨의 에러들이 이 테스트 단계를 통해 발견될 수 있다. 개발자와 다른 별도의 테스트팀에 의해 수행된다.

[출처]위키피디아

'Computer Science' 카테고리의 다른 글

CMMI - 개념 요약  (0) 2010.04.03
소프트웨어 테스트  (0) 2010.04.03
정보시스템 감리사 Q&A  (0) 2010.03.30
소프트웨어 기술 경력증 (고급) 프린터 출력  (0) 2010.03.15
정보시스템감리사  (0) 2010.03.14

1. 정보시스템 감리사 시험은 언제 시행하나요?
○년 1회 실시
○2008년의 경우 7월 12일(토)에 실시
*시험주관 기관은 정보사회진흥원이 정통부 산하 기관에서 행안부 산하기관으로 변경이 되었고, 현재 정부 공공기관 통폐합 대상 기관에포함되어 있기 때문에 7월보다 더 늦어질 가능성이 있지만, 7월을 목표로 준비하시면 될 것 같습니다

2. 응시자격은?
① 기술사
② 기사자격을 가진 자로서 정보처리분야의 실무경력 7년 이상인 자
③ 산업기사자격을 가진 자로서 정보처리분야의 실무경력 10년 이상인 자
④ 박사학위를 가진 자(정보처리분야 학위소지자)
⑤ 석사학위를 가진 자로서 정보처리분야의 실무경력 6년 이상인 자
⑥ 학사학위를 가진 자로서 정보처리분야의 실무경력 9년 이상인 자
⑦ 전문대학을 졸업한 자로서 정보처리분야의 실무경력 12년 이상인 자
⑧ 고등학교를 졸업한 자로서 정보처리분야의 실무경력 15년 이상인 자
※ 기술사 자격명 : 정보관리, 전자계산조직응용, 정보통신 기술사
※ 기사 자격명 : 정보처리, 전자계산기조직응용, 정보통신 기사
※ 산업기사 자격명 : 정보처리, 정보기술, 전자계산기조직응용, 사무자동화 (컴퓨터 활용능력 자격은 해당 없음), 정보통신 산업기사
※ 경력은 자격 또는 학위 취득 후부터 산정함.

3. 정보시스템 감리사 시험 과목, 문항 수, 시험시간은?
○시험과목 : 감리 및 사업관리(25문), 소프트웨어 공학(25문), 데이터베이스(25문), 시스템 구조 및 보안(25문)
○문제유형 : 객관식
○문항 수 : 100문제
○시험시간 : 100분
* 문항수가 증가한다든가, 주관식 문제가 출제된다든가 하는 시행 규칙변경에 대해서는 항상 이야기가 나오지만 일단 위 기준으로 준비하시면 됩니다.
실제 시험 방법이나 과목이 변경이 된다면 시험 일자는 연기가 될 것 입니다.
* 마지막 과목은 시스템 구조 및 보안 문제만 나오지 않습니다. 경영기반, 네트워크 등의 문제도 출제되고 있습니다.
* 시험시간은 부족한 편입니다. 특히 OMR카드에 기표를 해야 하는 만큼 실제 시헙 시간은 90분으로 생각하시고 준비하시면 됩니다.

4. 합격기준은?
○합격자 인원 : 40명
○필기전형 과목별 40점 이상자 중 총점결과 순으로 상위 40명 선정
- 필기시험 후, 총점결과 40위 이내인 자와 예비합격자 등 필기시험 합격예정자는 자격을 증빙할 수 있는 증빙서류(경력증명서, 최종학력 증명서, 자격증 사본)를 제출함.
※ 증빙서류 검토결과 불합격자 발생에 대비하여 일정 범위의 예비합격자를 포함하여 필기시험 합격예정자를 공지함.
- 제출된 증빙서류 심사 후, 필기시험 최종합격자 40명을 선정함.
○필기전형 총점의 동일 점수 취득자가 다수인 경우 아래 순으로 순위 부여
- 감리 및 사업관리 과목 우수자→ 소프트웨어공학 과목 우수자 → 데이터베이스 과목 우수자 → 시스템 구조 및 보안 과목 우수자 → 생년월일 연소자
(위 기준은 2008년 기준이기 때문에 2009년의 경우 변경될 수 있습니다)

5. 문제의 난이도는?
○결론부터 말씀 드리면 많이 어렵고, 회가 거듭될 수록 난이도가 높아지고 있습니다.
객관식이니까 예상문제 몇 개 풀어보고 시험 보면 되겠지라고 생각하시면 안됩니다.
문제의 지문이 길어지는 추세며, 계산문제도 많습니다. 특히 데이타베이스 문제는 응용문제들이 출제되고 있기 때문에 더욱더 기본 지식이 충실해야 합니다
○아래에는 역대 응시자 수와 합격 커트라인에 대해서 알고 있는데로 정리를 했습니다.
----------------------------------------
년도 접수자 합격자 합격율 커드라인
----------------------------------------
2004년 277명 40명 14.4% 65점
2005년 323명 40명 12.4% 66점
2006년 615명 80명 13% 68점
2007년 821명 80명 9.7% 71점
2008년 917명 40명 4.3% 69점
(2006~2007년만 한시적으로 80명을 뽑았습니다)
* 상기 자료의 경쟁율은 사실 무의미 합니다. 실질적으로 합격 가능권에 계신분들은 (소위 말하는 일진) 아주 넓게 잡아서150-200명입니다. 나머지 분들은 그냥 시험을 보시는 분들입니다. 따라서 내가 일진에 들어갈 수 있는 수준인지에 대해서지속적인 체크가 필요한데 이것은 학원의 모의 고사를 통해서 가능합니다. 일반적으로 학원 모의고사의 난이도가 본 시험보다 쉽기때문에 모의고사에서 70점 이상을 받으셔야 합니다. 70점이 안되시는 분들은 앞서 말씀드린 '그냥' 시험보시는 분들에 속하게됩니다.

6. 감리원과 수석 감리원의 차이는?
○총괄 감리원(감리수행 시 대표 역할을 하는 감리원)은 수석감리원만 할 수 있습니다.
대부분의 감리의 경우 5명이 나가게 되는데 최근에는 5명 모두 수석 감리원으로 구성되는 경우가 많습니다. 당연히 보수에도 차이가있으나 감리업계에서 대부분이 수석 감리원이기 때문에 목표를 수석 감리원으로 하시는 것이 좋습니다
○아래는 감리원과 수석 감리원증을 받을 수 있는 자격입니다
수석 감리원 : 정보시스템 감리사, 정보관리기술사, 전자계산조직응용기술사
일반 감리원 : 정보통신기술사, 기사 7년, 산업기사 10년, SIS 1급 5년, CISA 5년(CISA의 경우는 ACTIVE자격입니다)

7. 시험 준비 기간은?
○최소 4개월 ~ 12개월 정도의 기간이 필요합니다
시간으로는 300 ~ 400시간 정도입니다
매일 3시간 이상 공부한다고 할때 3개월이 조금 넘는 기간입니다
하지만, 매일 3시간 공부하는 것이 절대 쉬운 일이 아닙니다. 주말포함해서 주당 20시간 정도의 시간인데, 꾸준히 하는 것이 중요합니다
참고로 기술사는 1,000시간 이상 학습해야 한다는 것이 정설입니다.
그럼 우리가 흔히 말하는 어떤 분야의 전문가라고 하는 사람들은 얼마큼의 시간을 투자했을까요?
10,000시간이라고 합니다. 매일 3시간씩 꾸준히 투자해서 약 9 ~ 10년의 시간이 필요한 기간입니다.
○얼마나 집중력 있게 학습하느냐에 따라 학습기간이 줄어 들 수 있구요
거듭 말씀드리지만 매주 20시간씩 꾸준하게 준비하셔야 합니다.
○학원의 경우 8 ~ 12주 정도의 교육 과정을 운영합니다. 교육 과정 이후에는 교육생간의 스터디 모임을 통해 학습 내용을 심화 시키게 됩니다

8. 어떻게 공부해야 하나요?
○첫째는, 모든 학습의 기본은 기출문제의 분석입니다.
현재 시험 문제가 공개된 4 ~ 8 회의 기출문제를 먼저 풀어보시고 꼼곰히 분석하여 어떤 주제의 문제들이 어떤 깊이로출제되었는지 반드시 분석해야 합니다. 특히 반복적으로 출제가 되는 주제들에 대해서는 철저히 학습을 하여야 합니다
○두번째는 기본지식에 충실히 해야 합니다.
대부분이 학원에서 제공하는 각 과목별 정리 자료나 기술사 학습 자료들을 통해서 암기를 하시지만, 개인적으로는 개론서를 정독하시기를 추천합니다. 아래는 개인적으로 추전하는 도서입니다.
감리 - 정보사회진흥원 홈페이지 자료 참조
사업관리 - PMP자격 관련 도서 (이러닝 교육자료 시 제공하는 도서 등)
소프트웨어 공학 - 최은만 교수, 소프트웨어 공학
데이타베이스 - 이석호 교수, 데이타베이스 시스템
시스템 구조 및 보안 등은 범위가 너무 넓어서 추천 도서 없음
*참고로 요즈음 도서관들은 거의 관외대출이 됩니다(2-3주)
대출증을 만드셔서 빌려보시면 됩니다)
○세번째는 모의고사의 풀이입니다. 적어도 1,000문제 이상 1,500문제 정도 풀어보셔야 합니다.

9. 감리사 시험 준비를 위한 학습 요령
○반드시 본인의 학습 내용과 시간을 엑셀로 관리하셔서 학습범위와 학습량을 지속적으로 체크해야 합니다
기록하지 않으면 관리할 수 없습니다. 내가 지금 무슨 공부를 얼마큼 했고, 모의고사를 통해서 점수가 부족한 과목이 어디인지에 대한 분석이 되어야 학습의 전술을 세울 수 있습니다.
시험에 떨어지신 분들은 아마도 학습시간이 300시간이 안될 것입니다. 만약 300시간이 넘는데도 불구하고 불합격했다면 학습내용과 방법의 문제입니다.
즉, 기록되지 않으면 실패했을때 원인이 나오지 않고 따라서 내년에도 또 실패할 가능성이 높습니다.
○시험 1-2주전에 반복적으로 학습할 본인만의 요약 정리집을 만들어야 합니다.
시험전에 시험장에 요약자료 없이 앉아 계신 분들이 있습니다. 3가지중에 한가지 경우입니다. 기술사분이시거나, 3번이상 기술사시험 응시 경험을 가지고 있고 기술사 모의고사에서 55점이상 나오는 일진 예비기술사분, 마지막으로 앞서 말한 '그냥'시험 보시는분
○스터디 그룹을 만들어서 함께 공부해야 합니다. 혼자서 공부하셔서 합격하시는 분들도 있지만, 대부분 스터디를 통해서 합니다. 그 이유는 정보의 습득/공유와 같이 공부하는 사람을 통한 지속적인 자극에 있습니다.
(간혹 스터디 그룹 전체가 악의 구렁텅이로 빠지는 경우도 있습니다. 무서운 경우 입니다. 만약 그럴 징조가 있으면 설사 추가비용이 수반된다 하더라도 스터디 그룹을 옮기셔야 합니다. 감리사나 기술사 공부는 나만의 문제가 아닙니다. 가족의 희생이 따르는만큼 결과에 책임을 지려는 최선의 노력이 필요합니다.)

10. 감리사와 기술사 중 어떤 자격증이 더 좋은 가요?
○두 자격증간에 마땅히 비교기준이 될 만한 척도가 없어서 단순비교에는 무리가 있습니다. 경제적인 측면에서 감리사가 더 좋다고하시는 분들도 있고, 존재이전 범위 측면에서 기술사가 더 좋다고 하시는 분들도 있고 막상막하라고 볼 수 있습니다.
○하지만 시험 준비에 있어서는 확실한 차이가 있습니다. 기술사 공부를 하신 분들은 조금만 준비하시면 감리사 시험에 응시하는데문제가 없지만, 감리사 공부를 하신 분들은 기술사 시험을 위해서는 처음부터 다시 준비를 해야 합니다. 그 이유는 기술사 시험이100% 논술형 시험이라는데 있습니다.
답안지를 작성해야 하기 때문에 같은 주제(토픽)라고 해도 공부해야 하는 내용과 정리해야 하는 내용이 완전히 다르기 때문입니다.
다만 감리사 시험이 7월이 되면서 기술사 시험이랑 가깝기 때문에(2월, 8월) 현실적으로 기술사 시험을 한달 여 앞두고 감리사 시험으로 전환을 해서 준비하는 것은 불가능합니다.
○혹 장기적으로 2가지를 다 고민하시는 분들은 기술사 공부를 쪽으로 방향을 잡으시는 것이 좀 더 효율적입니다

[출처 : 연탄한장의 블로그 (http://blog.naver.com/ytan1988)]

'Computer Science' 카테고리의 다른 글

소프트웨어 테스트  (0) 2010.04.03
소프트웨어 테스트 V-모델  (0) 2010.04.03
소프트웨어 기술 경력증 (고급) 프린터 출력  (0) 2010.03.15
정보시스템감리사  (0) 2010.03.14
MySQL 기본  (0) 2010.03.14

starcraft II 베타 플레이....

조금 무겁네요.....

정발에 최적화가 되어 있을 라나....


월드 어브 워크래프트 (Wow)의 매력적인 아가씨.....

마력이란....














Are you up for some retro gaming on your Windows Mobile phone? We’ve compiled what we think are best top forty free Windows Mobile Games, andincluded the download link for each. Games are in alphabetical orde.

Asteroids –This is a great Windows Mobile version of an equally great classic. If you don’t mind using 200KB of your mobile phone’s memory, this is a must-have.

BeMario – A simple clone of the 8-bit Super Mario game, BeMario offers even the iconic jump and coin-snatching sounds.

BombSquad – This is a cool game which clones an equally cool Windows game, Minesweeper.

Break My Bricks – This game was developed specifically for the HTC Touch Pro, but it works on other Pocket PCs. The game feature various options for sound, vibration and ball speeds and has increasing levels of difficulty.

Buggles - This is the classic plastic bubble game ported to the Windows Mobile phones. It features an authentic ‘pop’ and realistic graphics.

Butterfly – Match sets of three or more bubbles to rescue butterflies in this fun puzzle game.

Crazy Matrix – Try to get as many lights glowing as you can in this addictive puzzle game.

Dope Wars – Buy and sell dope in this strategy classic.

EdgeWay Turbo 21 – If you’re fond of playing cards, you’ll like this game. Exercise your mind to make as many blackjacks as possible. Just a little warning: this game can be pretty addictive.

Egoman- It’s everybody’s favorite retro game star wielding a gun? Replete with ghosts and power pellets, this is one entertaining PacMan-inspired shooter.

GravityBalls - This is a GSensor game about gravity and balls. Users adjust the gravitational force and smack the balls with a paddle. This game works on HTC Touch Diamond and HTC Touch Pro.

Halma Sharp – This is a Windows Mobile phone version of the 19th century board game Halma. To win, move your pieces into the opponent’s corner.

Igrecway Hangman – Here’s hangman designed specifically for Windows Mobile phones. It features large dictionaries, hints and an iPhone-style interface.

Kevtris – Possibly the best Tetris clones ever released – this game features outstanding graphics, three difficulty levels, and high score sharing with other players.

Mu Torere – This is the Windows Mobile version of the all-time favorite Windows game, Reversi.

NetHack – This classic dungeon game has seen versions on DOS, Linux, Mac and Windows. There’s no reason it shouldn’t be on your Windows Mobile phone as well.

Next Element Delux – Here’s another cool logical game featuring 80 mind-twisting levels with interesting graphics and music.

NS Pairs – This is the Windows Mobile take on that the classic matching memory game.

PacMan – If you prefer the real thing, this is it. All the goodness of the classic PacMan game is here. It features full customization to add lives, change difficulty levels, and assigned buttons for control.

Pipes – Here’s a classic puzzle game featuring six difficulty levels. The object is to move around pipes and get water flowing to the flowers.

Pocket Lemmings – This is very similar to the original DOS and Amiga versions of the game.

Pocket Uno – This is a remake of the classic card game. It features multi-language support (English, Russian, Esperanto), three levels of computer play, auto-save, adjustable graphics, and stylus-free gameplay.

Pocketman – If you like PacMan, you’ll love this game. This remake features plenty of exciting levels, adjustable game speed and difficulty, fine sound and music, stylus and keyboard control, and the option to pause the game should you receive a call.

PocketMoku – Complete a continuous line of five stones in this remake of the classic puzzle game.

Project GD – This is a fun top-down shooter in the vein of Space Invaders.

Rawalls v1.4 – This simple, yet quite entertaining, puzzle game looks like a cross between minesweeper and Sudoko.

S3t! – This game was inspired by the classic SET card game. The game mechanics can be complicated unless if you’ve played SET.

Scrobble- This is very similar to Scrabble, outside of some minor differences. There are no challenges and players can only exchange all of their letters at once.

Smartfall – This is another Tetris clone running on Windows Mobile phones.

Snake – Here’s another popular game ported to Windows Mobile Phones. Who hasn’t played this game?

Snake.bizPla.net v1.0 – This is the Windows Mobile version of the classic game Snake. It features keyboard and stylus control as well as adjustable game speed.

Space Invaders – This is a remake of the 1978 classic. The developer made the game as close as possible to the original.

Spin The Bottle – If you have an HTC Diamond or HTC Touch Pro, you’ll enjoy spinning the bottle using your phone’s accelerometer.

Squares – This game offers simple gameplay with simple layout but definitely entertaining. All you have to do is avoid the squares for as long as you can.

Tic Tac Toe game – It’s tic-tac-toe ported for your WinMo-powered phone.

Touchtris – Enjoy the classic game of Tetris just by touching the screen.

VirusChaser- Prevent the virus from escaping by planting a wall. Every time you capture the virus, you have one less wall to prevent the virus from escaping.

Xonix – Move the spider as fast as you can to cut up a field and trap the monsters. This latest take on an arcade classic offers simple and addicting gameplay..

Xtrakt – This is a cool game built to run specifically on Sony Ericsson’s Xperia phone. But it on other Windows Mobile. In the game This game slay monsters while racing around on a motorcycle.

XWords for Pocket PC – Similar to Scrabble, this game features up to four players, move history, save game/open saved game, hints, tile protection and more.

소프트웨어 기술 경력증 고급

- 공부좀 해서 기술사나 되야 할텐데....



소프트웨어 기술 경력증 (고급)


'Computer Science' 카테고리의 다른 글

소프트웨어 테스트 V-모델  (0) 2010.04.03
정보시스템 감리사 Q&A  (0) 2010.03.30
정보시스템감리사  (0) 2010.03.14
MySQL 기본  (0) 2010.03.14
탑10 윈도우 모바일 어플리케이션  (0) 2010.03.14
2009년도 적용 SW기술자 노임단가 공표

소프트웨어산업진흥법 시행령 제16조(SW기술자의 등급별 노임단가)의 규정에 의한 소프트웨어사업의 대가기준에 적용할 소프트웨어기술자 일 노임단가를 통계법 제23조에 의거 다음과 같이 공표합니다.


2009년 SW기술자 등급별 일 노임단가 (단위:명,원,%)

구 분
2009년
조사인원
일 노임단가
전년대비
2007년도
2008년도
2009년도
증가액
증가율
기술사

231

290,938

339,988

356,999

17,011

5.0%

특급기술자

6,734

273,664

300,570

314,773

14,203

4.7%

고급기술자

5,990

215,166

225,306

228,833

3,527

1.6%

중급기술자

5,378

174,432

187,566

190,248

2,682

1.4%

초급기술자

8,254

136,290

140,198

141,761

1,563

1.1%

고급기능사

1,763

112,910

116,845

126,106

9,261

7.9%

중급기능사

1,549

99,834

101,158

109,777

8,619

8.5%

초급기능사

1,143

75,128

80,993

86,961

5,968

7.4%

자료입력원

1,108

48,493

2009년 조사결과는 3σ적용후 산출한 인원가중평균치임.
자료입력원의 노임단가는 2009년 최초 조사로서 ‘기본급여’만을 산정한 수치이며, 기본급여+제수당+상여금을
모두 포함할 경우의 노임단가는 67,032원임.
노임단가는 일 급여 기준이며, 2009년의 월평균 근무일수는 21.6일임.
SW기술자 공인노임단가는 2008년 대비 평균 0.84% 증가함.


<시행일> 2009년 9월 1일부터

2009년 8월 31일


한국소프트웨어산업협회장
정보시스템감리사

정보시스템감리사는 정보시스템 전반을 알아야 하는 고급 기술자다.

정보시스템감리사는 정보시스템의 구축 운영에 관한 사항을 종합적으로 점검 평가하고 개선이 필요한 사항을 감리하여 의뢰인에게 권고하는 직업이다. 건축에서 감리를 통해 잘못된 건축물의 문제점을 개선하고 제대로 된 건축물을 짓도록 하는 것처럼 전산 시스템에서도 감리를 통해 잘못된 시스템을 개선하고 제대로 된 시스템을 구축하도록 하는 것이 정보시스템감리의 목적이다.

정보화시대가 진전되면서 정보시스템은 기업이나 기관의 가장 중요한 자산이 되어가고 있다. 기업의 영업 비밀, 인사 기록, 고객 자료 등 각종 중요 정보가 모두 정보시스템 안에 저장되어 있다. 이런 정보시스템은 매우 편리하지만 보안에 취약성이 있기 때문에 사고가 발생할 경우 큰 손실을 가져온다. 이런 손실을 막기 위해서 정보시스템감리가 필요하다. 실제 정보시스템 구축과 운용에서 만나는 많은 위험 요인을 통제하고 시스템에 맞는 설정과 운영에 대한 적절한 방법론을 확립해야 하며, 이를 적용하는 정보시스템 감리 요원이 필요한 것이다.

정보시스템감리는 정보화 추진 방향을 설정하는 기본 설계부터, 정보시스템개발 및 운영상의 효율성, 자료의 신뢰성 및 안전성 등을 종합적으로 검토해 정보시스템 구축과 운영에서 나타날 수 있는 문제점을 사전에 예방하는 작업이다. 정보화시대를 맞이하여 정보자산의 가치가 기업과 기관에서 차지하는 중요성이 커지면서 정보시스템감리의 필요성도 함께 커지고 있다.

정보시스템감리사는 한국전산원이나 민간 감리법인에서 근무한다. 민간 감리법인은 감리 전문 법인으로 존재하기도 하지만 SI업체나 컨설팅 업체에서 감리 업무를 수행하는 경우도 많다. 꽤 많은 감리사들이 SI 업체나 컨설팅 업체의 직원으로 일하면서 컨설팅과 감리 업무를 수행한다.
일반적으로 국내 정보시스템에 대한 주요 공공 프로젝트에 대해서는 한국전산원에서 국가정보화 감리업무를 수행하고 있다. 기업의 경우에는 최근 정보시스템의 감리를 전문적으로 수행하는 민간법인들이 활동을 하고 있다. 2002년에는 20~30개 사이의 감리법인이 활동했으나 이 수는 점차 증가하고 있다.

특히 국가 정보화사업의 원활한 수행과 부실방지를 위해 일정 규모 이상의 주요 공급 프로젝트에 대한 감리실시가 의무화되면서 정보시스템의 감리 시장은 큰 폭으로 성장하고 있다. 따라서 앞으로 정보시스템감리사의 수요는 계속 증가할 전망이다.

감리 업무는 정보시스템의 기획 개발 운영 및 유지 보수 단계 별로 구분하여 수행한다. 정보시스템감리사는 정보시스템 감리 요청이 들어오면 관련 자료를 제출받아 감리를 실시하고 감리보고서를 작성하여 감리 의뢰인에게 통보한다. 이 과정에서 시스템의 분석, 설계, 개발이 제대로 이루어지고 있는지, 시스템의 설계 원칙과 사양에 준거하여 정보시스템이 구축 이행되는지, 정보 자산을 보호하기 위한 요건을 충족하는지를 평가 확인한다. 물론 이 과정에서 미비한 부분은 지속적으로 수정해 시스템의 완전성을 높여나가도록 유도한다.


정보시스템감리사는 40대, 50대 활동 비중이 더욱 많으며 최고의 보수를 받는 직종이다.

정보시스템감리사 관련자격증으로는 한국산업인력공단에서 시행하는 정보관리기술사, 정보처리기사, 정보처리산업기사, 전자계산조직응용기술사, 전자계산기조직응용기사, 전자계산기조직응용산업기사, 정보기술산업기사 등이 있다. 그러나 이 자격증은 기초적인 자격증으로 이 자격증을 취득한다고 해서 정보시스템감리사가 되는 것은 아니다.

해외에서 발행하는 국제자격증으로는 정보시스템감사통제협회(ISACA :Information Systems Audit and Control Association)에서 시행하는 국제공인정보시스템감사사(CISA :Certified Information Systems Auditor) 자격증이 있다. 이 자격증은 세계적으로 널리 인정되는 자격증으로 희소성이 높지만 취득하기 매우 어려운 자격증이다. CISA를 취득한 사람은 국내에서도 소수에 불과해 개인의 능력 향상에 큰 도움이 되며, CISA를 취득한다면 고액 연봉을 받는 정보시스템감리사로 활동할 수 있다.

그외 한국전산원에서 수여하는 국가공인 정보시스템감리사 자격증이 있는데 아무나 취득할 수 있는 것이 아니다. 정보통신 분야에서 일정 수준 이상의 자격을 갖춘 지원자를 선발하여 교육을 실시한 후에, 정보시스템 감리 관련 전문가로 구성된 정보시스템감리사 평가위원회의 심사를 거쳐 수여한다. 따라서 현장에서 꽤 오랜 기간 근무한 사람이 취득할 수 있는 자격증이다.

정보시스템감리사는 정보 시스템의 모든 것을 감리해야 하므로 상당한 수준의 기술력이 필요하다. 시스템 분석, 설계, 개발, 운영, 보수, 유지에 필요한 모든 지식을 갖추어야만 감리가 가능하기 때문이다. 이 때문에 정보시스템의 감리 활동을 할 수 있으려면 특급 기술자 수준 이상이 되어야 한다.

감리사로 활동하기 배워야 할 내용은 다양하다. 정보시스템의 감사업무 프로세스, 정보시스템의 관리, 계획, 조직, 기술 하부구조, 운영실무, 정보자산의 보호, 재해복구, 응용시스템 개발, 구입, 구현, 유지 보수, 업무 프로세스평가, 위험관리, 프로젝트 관리, 감리보고서 작성법 등을 배우는데 시스템에 대한 전반적인 내용을 배운다고 보면 된다.

요구하는 능력이 크고 매우 중요하고 전문적인 일인 관계로 다른 IT 직종에 비해 보수는 매우 높다. 종사자 평균이 월 345만원으로 IT 직종에서는 매우 높은 보수를 받고 있는 직종이다. 더구나 감리 의무화로 일감은 증가하는 반면 인력은 부족해 정보시스템감리사의 보수는 계속 상승하고 있다.

정보시스템감리사는 고졸 이하가 0%, 전문대졸 이하가 2%로 저학력층이 거의 없는 반면 대학원졸 이상이 34%나 되는 고학력 직종이다. 전공은 컴퓨터/통신이 41%, 경영/경제가 29%를 차지한다. 기본적으로 정보시스템감리사로 활동하기 위해서는 4년제 이상의 대학에서 전산계통관련 전공을 하거나, 관련 자격을 취득하는 것이 기본이다. 하지만 무엇보다 현장에서의 다양한 실무경험이 뒷받침되어야 한다. 다양한 현장 경험이 없다면 감리 활동을 수행하기 어렵다.

다양한 현장경험이 필요하다는 것을 증명하는 것은 연령층 비율이다. 일반적으로 지금까지 소개한 대부분의 IT 직종은 20대와 30대 비율이 거의 100%에 달하고 40대 이상은 거의 없는 반면 정보시스템 감리 직종은 거꾸로 40대 비율이 36%로 가장 높고, 50세 이상 고연령자도 31%나 된다. 반면 20대는 10%에 불과하고 30대도 23%에 불과하다. 즉 정보시스템감리사는 많은 경험이 필요한 분야라는 뜻이다. 이 때문에 개발자, 프로그래머, IT컨설턴트 등의 다양한 직종으로 취업했던 IT 종사자의 상당수가 정보시스템감리사를 목표로 경력을 쌓고 있다.

현재 정보시스템감리사로 종사하는 사람이 대부분은 남자다. 이는 정보시스템감리사라는 직종이 비교적 최근에 개척된 직종인 반면 감리사가 되기 위해서는 오랜 경력이 필요한 분야이기 때문이다. 웹디자인이나 프로그래머처럼 학원에서 몇 달 배우면 취업할 수 있는 분야가 아니라 현업에서 10년 이상 개발자나 엔지니어로 근무했던 사람이 감리사로 전환하는 경우가 많기 때문에 여성 인력의 진출이 거의 없는 것이다. 하지만 정보시스템감리사의 업무는 여성에게도 적합하다. 고학력 여성들이 진출하기에 적합한 분야이므로 현재 현업에서 활동하는 IT 종사자라면 정보시스템감리사라는 직종에 목표를 두고 개인 능력을 개발하는 것이 좋다.

function hrefMark(){ }

MySQL Basics -- A Helpful MySQL Tutorial

Introduction

Welcome. This MySQL tutorial is a guide for new MySQL users, providing a reference of very basic, step by step, instructions on how to get started. This MySQL help page also gives more advanced users assistance in upgrading and running multiple versions of MySQL on a computer at the same time.

MySQL is an SQL based relational database management system (DBMS) that runs under a broad array of operating systems. MySQL is frequently used by PHP and Perl scripts. The SQL commands discussed in this tutorial apply to MySQL operating under all operating systems. Only the installation instructions are Windows specific. The focus is on Windows XP Professional and Windows 2000 Professional machines.

We'll be covering the installation of MySQL versions 5.0.51b, 4.1.16 as well as how to configure everything so they'll all be able to run on your system at the same time. Plus, the data directories will be moved to another location in order to make backups easier. If you only want to install one version of MySQL, ignore the instructions relating to the other versions.

If your operating system or versions of MySQL are different, the instructions should still work, but keep an eye out for slight differences, like which working directory you'll need to be in.

Usage:
Commands to type in and items that require appropriate substitutions are displayed like this.
Resulting screen text looks like this.
File names appear in this fashion.

Contents

Windows 2000, XP and NT 4.0 Installation

Log in to your computer using an account having Administrator privileges.

If you're not upgrading, just skip down to the next section.

If you are upgrading, there are MANY changes that you HAVE TO be aware of. Carefully read the pages in the MySQL manual that apply to you. If you intend to jump over a release series in your upgrade (e.g.: going straight from 4.0 to 5.0) you are strongly advised NOT to do so. You should do the upgrade process one release series at a time (e.g.: go from 4.0 to 4.1, then to 5.0).

Backup Old Data

Here's a quick rundown of how to save your old MySQL data so it can be used in your new system.

  1. Open up a Command Prompt window. If you don't know how to do that, go to Start | Run, then type in cmd and hit ENTER.
  2. Switch to the drive which has your present mysql\bin directory. Eg: L:\> C:
  3. Move into the MySQL bin directory: cd mysql\bin
  4. Dump all of your data: mysqldump -u root -p -A -r C:\secure\myolddata.sql
  5. Stop the MySQL service: net stop mysql. If your service has a different name, do this net stop service_name.
  6. The ISAM table format has been deprecated in 4.0 and removed from 5.0. If have some tables in that format, you'll need to fix that now. There are several ways to do this. Here are three possibilities:
    1. sed:
      1. ren C:\secure\myolddata.sql C:\secure\myolddataorig.sql
      2. sed 's/^) TYPE=ISAM/) TYPE=MyISAM/' C:\secure\myolddataorig.sql > C:\secure\myolddata.sql
    2. Perl:
      1. ren C:\secure\myolddata.sql C:\secure\myolddataorig.sql
      2. perl -wpe 's;^\) TYPE=ISAM;\) TYPE=MyISAM;i' < C:\secure\myolddataorig.sql > C:\secure\myolddata.sql
    3. Your favorite text editor: open C:\secure\myolddata.sql then do a search and replace on TYPE=ISAM to TYPE=MyISAM.
  7. Remove the existing service by typing in mysqld --remove. If your service has a different name, do this mysqld --remove service_name
  8. Jump up two directory levels: cd ..\..
  9. Rename your old mysql directory as a backup: ren mysql mysqlold

Get and Install a Recent Version

  1. Download the "Windows ZIP/Setup.EXE" file for the versions you want: 5.0, and/or 4.1. For now, do NOT pick the "Windows Essentials (x86)" or "Without installer (unzip in C:\)" downloads.
  2. Find the downloaded file, unzip it and start the setup program:
    • Via Cygwin:
      1. cd /path/to/file
      2. unzip mysql-version.number-win.zip -d temp
      3. chmod 700 temp/*
      4. explorer temp
      5. Double click on Setup.exe.
    • Via Windows XP:
      1. Open up Windows Explorer. If you don't know how to do that, go to Start | Run, type in explorer and hit ENTER.
      2. Find the downloaded file.
      3. Double click on it.
      4. Windows XP has a built in zip file reader.
      5. In the zip viewer, double click on Setup.exe .
    • Via WinZip or PKZIP for Windows, or other such utilities:
      1. Open up Windows Explorer. If you don't know how to do that, go to Start | Run, type in explorer and hit ENTER.
      2. Find the downloaded file.
      3. Double click on it.
      4. Extract the files.
      5. Flip back to Windows Explorer and double click on Setup.exe .
  3. In the Installation Program:
    • MySQL 5.0.x and 4.1.x:
      1. In the "Please select a setup type" step, click the "Custom" radio button, then "Next."
      2. The next step gives you choices of which components to install and where to install it.

        Click the "Change" button at the bottom right of the dialog box and put in C:\program files\mysql50\ then click "OK"

        If you're upgrading, make sure to click on the plus sign next to the "Developer Components" item, then click on "Scripts, Examples" and set it to "This feature will be installed on the local hard drive."

        Adjust the other entries per your desires. Make sure the "MySQL Server" and the "Client Programs" are selected. Once you have everything lined up as you want, click "Next."

      3. Click "Install."
      4. When you get to the "MySQL.com Sign-Up" step, let's cut to the chase... click the "Skip Sign-Up" radio button and go to "Next."
      5. UN-check "Configure the MySQL Server" and click "Finish."
  4. Taking a moment to make Command Prompt shortcuts now will save loads of time later:
    1. Open Windows Explorer (Start | Run, explorer, ENTER).
    2. Navigate to C:\Documents and Settings\All Users\Start Menu directory.
    3. Create a new directory (File | New | Folder). That makes a new folder called, "New Folder" (imagine that!) which is now ready for you to type in a new name for. So, type in Databases and hit ENTER.
    4. Now hit ENTER again to get into that folder.
    5. Open another Windows Explorer window.
    6. In the Address Bar, type in %UserProfile% and hit the ENTER key. If the Address Bar isn't visible, in Windows Explorer's menu: View | Toolbars | Address Bar.
    7. Navigate to the Start Menu\Programs\Accessories directory.
    8. Select the Command Prompt file.
    9. Hit CTRL-C
    10. Now come back to the "Databases" folder window and hit CTRL-V. That should have pasted a copy of the Command Prompt shortcut in your new directory.
    11. Select the Command Prompt file.
    12. What you do here depends on whether you're installing 5.0 and/or 4.1.
      • MySQL 5.0.x:
        Use the follow these steps verbatim.
      • MySQL 4.1.x:
        Use these steps, but change 50 to 41.
      • Multiple versions:
        Do the steps for 50, make a copy of MySQL 50 Prompt and then follow steps I and II, but change 50 to 41.
      1. Hit the F2 key and rename the shortcut MySQL 50 Prompt then hit ENTER.
      2. Open it's properties via File | Properties and go to the "Shortcut" tab, then the "Start In" box and type the following in, including the quotes: "C:\program files\mysql50\bin"
      3. Go to the "Options" tab and check the "QuickEdit mode" and "Insert mode" boxes.
      4. Go to the "Layout" tab and go to the "Height" box in the "Screen buffer size" section and put in a larger number, like 2000.
      5. Click OK
    13. Now, you'll be able to quickly get to either of the Command Prompts by going to Start | Databases | MySQL 50 Prompt.
    14. Plus, you'll be able to paste commands into the the Command Prompt! To do that, copy the command from this tutorial (or wherever) then go to the Command Prompt window and hit the following keys:
      1. ALT-SPACE (to open the menu in the upper left corner of the window)
      2. E (the access key for Edit)
      3. P (the access key for Paste)
    15. For the rest of this lesson, we'll be calling this these the "MySQL 50 Shortcut" and "MySQL 41 Shortcut"
  5. Time to create the data directories. MySQL's data files should be stored on a drive, or a portion thereof, that contains your other data files. This will simplify finding and backup up your information. The M: drive on my machine is dedicated solely to storing actively used data. That's the location we'll use in this tutorial.
    1. Open up a Command Prompt window. If you don't know how to do that, go to Start | Run, then type in cmd and hit ENTER.
    2. Switch to the drive where the data will be placed: C:\> M:
    3. Make the needed directories:
      • MySQL 5.0.x:
        mkdir mysql50mkdir mysql50\datamkdir mysql50\data\mysqlmkdir mysql50\ibdatamkdir mysql50\iblogs
      • MySQL 4.1.x:
        mkdir mysql41mkdir mysql41\datamkdir mysql41\data\mysqlmkdir mysql41\ibdatamkdir mysql41\iblogs
    4. Copy the default mysql database/privileges to the new location:
      • MySQL 5.0.x:
        copy "C:\program files\mysql50\data\mysql" mysql50\data\mysql
      • MySQL 4.1.x:
        copy "C:\program files\mysql41\data\mysql" mysql41\data\mysql
  6. I suggest putting empty my.cnf files in place in order to keep your MySQL servers from being subverted. While this step isn't strictly necessary, it's better to be safe than sorry. We'll do this via the Command Prompt window we were using above.

    Be aware that Windows considers .cnf files to be a "SpeedDial" configuration file and automaticlaly hides the file extension. You can make the extension visible via Windows Explorer's "hide file extensions" option (Tools | Folder Options | View). Also note that Windows Server 2003 hides the extension even if this option is turned off.

    • Just MySQL 5.0.x:
      1. notepad mysql50\data\my.cnf
      2. In notepad, type in [mysqld] , save the file and exit.
      3. copy mysql50\data\my.cnf "C:\program files\mysql50\data"
    • Just MySQL 4.1.x:
      1. notepad mysql41\data\my.cnf
      2. In notepad, type in [mysqld] , save the file and exit.
      3. copy mysql41\data\my.cnf "C:\program files\mysql41\data"
    • All of the above
      1. notepad mysql50\data\my.cnf
      2. In notepad, type in [mysqld] , save the file and exit.
      3. copy mysql50\data\my.cnf "C:\program files\mysql50\data"copy mysql50\data\my.cnf mysql41\datacopy mysql50\data\my.cnf "C:\program files\mysql41\data"
  7. The my.cnf configuration files need to be put in place. First, we'll put blank files in the default locations in order to prevent the server from potential subversion. Do this via the Command Prompt window we were using above.
    1. notepad C:\my.cnf
    2. In notepad, paste in the following, then adjust the the port numbers and drive letters and paths as needed.

      NOTE: This sample file puts 5.0.x on the default port (3306) and 4.1.x on 3341. These port numbers will be used throughout the rest of the tutorial. So, if you change anything in your my.cnf file, you will need to adjust all of our commands accordingly. On the command line, MySQL uses the -P flag to tell the client which port to connect to, for example -P 3341.

      # This config file contains settings for MySQL versions# 5.0.x and 4.1.x.  Be aware that only one server# instance can be on a given port.  This sample puts# version 5.0.x on MySQL's default port, 3306.  Adjust# the port numbers to suit your situation.[mysql]# Displaying the version number in the prompt# helps when running multiple instances.prompt = mysql\\_\v>\\_[mysqld-5.0]port = 3306basedir = C:/Program Files/mysql50/datadir = M:/mysql50/data/innodb_data_home_dir = M:/mysql50/ibdata/innodb_log_group_home_dir = M:/mysql50/iblogs/innodb_data_file_path = ibdata1:10M:autoextend# Make table names case sensitive.# Ensures portability when moving applications to other os's.set-variable = lower_case_table_names=0# Roll back entire transactions that time out,# OPTION AVAILABLE SINCE 5.0.32.innodb_rollback_on_timeout = 1[mysqld-4.1]port = 3341basedir = C:/Program Files/mysql41/datadir = M:/mysql41/data/innodb_data_home_dir = M:/mysql41/ibdata/innodb_log_group_home_dir = M:/mysql41/iblogs/innodb_data_file_path = ibdata1:10M:autoextend# Make table names case sensitive.# Ensures portability when moving applications to other os's.set-variable = lower_case_table_names=0
    3. Save the file and exit.
  8. Next, we need to "install" the appropriate MySQL services.
    • MySQL 5.0: Open the MySQL 50 Shortcut, pick one of the following and type its command into the Command Prompt:
      1. NT/2000/XP. Named pipes.
        mysqld-nt --install mysql50
      2. Transactions.
        mysqld --install mysql50
      3. Support for debugging MySQL crashes.
        mysqld-debug --install mysql50
    • MySQL 4.1: Open the MySQL 41 Shortcut, pick one of the following and type its command into the Command Prompt:
      1. NT/2000/XP. Named pipes.
        mysqld-nt --install mysql41
      2. Transactions.
        mysqld --install mysql41
      3. Support for debugging MySQL crashes.
        mysqld-debug --install mysql50
  9. Good security procedures call for running services as a non-privileged user. So, let's create such a user and configure the MySQL services to use it:
    1. net user mysql * /add /passwordreq:yes /passwordchg:no /comment:"runs MySQL services"
    2. You'll be prompted for the password.
    3. Perform the following steps for each mysql server instance, substituting your version numbers for the underscores (__):
      1. Start up the services manager by typing in services.msc and hitting ENTER.
      2. Locate the "mysql__" service in the right hand pane and double click it.
      3. Go to the "Log On" tab
      4. Click the "This account" radio button
      5. Type mysql into the box.
      6. Enter the password into the "Password" and "Confirm password" inputs.
      7. Hit OK
  10. Let's lock down the file permissions on the directories we created by entering the following commands into a Command Prompt:
    cacls C:\my.cnf /g administrators:f system:r "authenticated users":r

    If you may get the following error message: The cacls command can only be run on disk drives that use the NTFS file system. Don't worry about it (for now). Skip all the cacls commands in the rest of our tutorial.

    Enter each line below separately because some of them require user confirmation.

    • MySQL 5.0.x:
      cacls M:\mysql50 /t /g administrators:f system:f mysql:ccacls M:\mysql50\data\my.cnf /t /g administrators:f system:rcacls "C:\program files\mysql50" /t /g administrators:f system:f mysql:r "authenticated users":rcacls "C:\program files\mysql50\data" /t /g administrators:f
    • MySQL 4.1.x:
      cacls M:\mysql41 /t /g administrators:f system:f mysql:ccacls M:\mysql41\data\my.cnf /t /g administrators:f system:rcacls "C:\program files\mysql41" /t /g administrators:f system:f mysql:r "authenticated users":rcacls "C:\program files\mysql41\data" /t /g administrators:f
  11. Start the services:
    • MySQL 5.0.x: net start mysql50
    • MySQL 4.1.x: net start mysql41

    If System error 1069 has occurred comes up, your passwords didn't match. You can create a new password by typing net user mysql * into the Command Prompt. Then put that new password into the MySQL services' properties' "Log On" tab.

    Getting a System error 5 has occurred indicates problems getting to the directory containing the MySQL executables (for example, insufficient permissions).

    If you get an error saying System error 1067 has occurred it means a configuration directive in C:\my.cnf couldn't be processed. That can be due to a typographical error in the name or value of a setting. Similarly, the path referred to by the setting's value could be inaccessible due to insufficient permissions.

    To help narrow down what's going on, check out the Event Viewer: Start | Run, then type in eventvwr.msc and hit ENTER. Click the "Application" item in the left pane. Now examine the top of the right hand pane for recent MySQL errors. Double click the first item and look at the message in the "Description" box.

    Either of the following mean there's a boo-boo in the path value assigned to the datadir setting in C:\my.cnf:
    Fatal error: Can't open privilege tables: Table 'mysql.host' doesn't exist
    or
    Warning: Can't create test file
    In this situation, make sure the actual path is a case-sensitive match to the path in the configuration file and that the directories in question have the permissions they need to be accessed by the MySQL daemon. Then try the net start command again.

    Along the same lines, error logs showing Can't find messagefile 'C:\Program Files\mysql\share\english\errmsg.sys'
    points to a mismatch between the basedir value and the actual path to the MySQL executables.

    An unknown variable notice is clear enough, no?

    If there are no MySQL related error messages in the Event Log's Application section, you have a major typo in the C:\my.cnf. Perhaps one of the [mysql...] section headings are wrong.

  12. If you're upgrading and followed our instructions at the top of this tutorial, now it's time to import your old data. These steps assume upgrading from 4.1 to 5.0.
    1. C:\Program Files\mysql50\bin> mysql -u root < C:\secure\myolddata.sql
    2. C:\Program Files\mysql50\bin> mysql -u root -f mysql < ..\share\mysql_fix_privilege_tables.sql

      This SQL file was in the scripts directory prior to version 5.0.38.

      You can ignore all of the query error messages (for example Unknown column, Duplicate column name, etc).

    3. Log into the server using the permissions from your old MySQL installation:
      C:\Program Files\mysql50\bin> mysql -u root -p mysql
    4. The upgrade script gives some privilges that you probably don't want most users having. Let's change them back (adjusting the "otherimportantusers..." below as needed for your system):
      mysql 5.0.51b-community-nt> UPDATE user SET Create_tmp_table_priv='N' WHERE user NOT IN ('root', 'otherimportantusers...');
    5. Exit the client and restart the server:
      mysql 5.0.51b-community-nt> exit
      C:\Program Files\mysql50\bin> net stop mysql50
      C:\Program Files\mysql50\bin> net start mysql50
    6. If you've never done this tutorial's "Tighten MySQL's Security" steps, below, check them out now. If you've already done them, you can jump down to the Start the Client section.
  13. Tighten MySQL's Security

    MySQL has good security controls, but the default installation is wide open. So, if you're doing a new installation, let's close things up before we go any further.

    In the following commands, don't forget that if you changed the ports in the my.cnf file, you'll have to adjust the port numbers here.

    • MySQL 5.0.x:

      Activate the "MySQL 50 Shortcut" we created earlier then type in:
      mysql -u root mysql

    • MySQL 4.1.x:

      Activate the "MySQL 41 Shortcut" we created earlier then type in:
      mysql -u root -P 3341 mysql

    (If you get the following error message:
    ERROR 2003 (HY000): Can't connect to MySQL server on 'localhost' (10061)
    That means the servers didn't stay started. The most likely reason is the my.cnf file has errors in it. Go back to the Start the services step and carefully read the section about checking the Event Viewer logs.)

    Once you are logged in, copy the following queries to Notepad and change NewPw to something unique. Now copy that and paste it into the command prompt window(s) you just opened.

    delete from user where Host <> 'localhost' and User <> 'root';delete from db;update user set Password=password('NewPw') where User='root';flush privileges;exit
  14. Tada!

Quick Tips for Other Windows Operating Systems

If you're using Windows 95, 98 or ME do not run mysqld --install. These operating systems don't have the ability to host a "service." So, you need to run MySQL as a standalone application by executing the command mysqld --standalone.

I haven't run MySQL on these systems myself, so, for more information, check out the Starting MySQL on Windows 95, 98 or Me and Running MySQL on Windows sections of the manual or explore the MySQL Win32 Mailing List Archive.

Start the Client and Log In

We'll be using MySQL 5.0.x here. Adjust the shortcut and port as necessary.

Activate the "MySQL 50 Shortcut" we created earlier and type in
mysql -u root -p
then enter your password when prompted. You will then see the following output:

Welcome to the MySQL monitor.  Commands end with ; or \g.Your MySQL connection id is 1 to server version: 5.0.51bType 'help;' or '\h' for help. Type '\c' to clear the buffer.

If your root account doesn't have a password on it, the above command won't work for you. You really need to get on top of security. Log in without the password:

mysql -u root mysql

Then set a password (changing "NewPw", of course):

update user set Password=password('NewPw') where User='root';flush privileges;

If you get an error saying Client does not support authentication protocol requested by server; consider upgrading SQL client when trying to connect, that means your client is from before version 4.1 while the server you are connecting to is using version 4.1 or later. The best solution is to install a current version of the MySQL client.

Creating a Simple Database and Displaying its Structure

Instruct MySQL to setup a new database

mysql 5.0.51b> create database database01;
Database "database01" created.

All that really does is create a new subdirectory in your M:\mysql50\data directory.

Open the database

mysql 5.0.51b> use database01
Database changed

Create a table

mysql 5.0.51b> create table table01 (field01 integer, field02 char(10));
Query OK, 0 rows affected (0.00 sec)

!Enclose entire list of field names between one pair of parentheses.
!Commas are used between each field.
iA space may be used after the comma between fields.
!A comma is not used after last field.
!This, and all SQL statements, are concluded by a semicolon ";".

List the tables

mysql 5.0.51b> show tables;
+----------------------+| Tables in database01 |+----------------------+| table01              || table02              |+----------------------+

List the fields in a table

mysql 5.0.51b> show columns from table01;
+---------+----------+------+-----+---------+-------+| Field   | Type     | Null | Key | Default | Extra |+---------+----------+------+-----+---------+-------+| field01 | int(11)  | YES  |     |         |       || field02 | char(10) | YES  |     |         |       |+---------+----------+------+-----+---------+-------+

Congratulations! Pretty straightforward, eh?

Putting Data into a Table

Insert a record

mysql 5.0.51b> insert into table01 (field01, field02) values (1, 'first');
Query OK, 1 row affected (0.00 sec)

!Enclose entire list of field names between one pair of parentheses.
!Enclose the values to be inserted between another pair of parentheses.
!Commas are used between each field and between each value.
iA space may be used after the comma between fields.

List all the records in a table

mysql 5.0.51b> select * from table01;
+---------+---------+| field01 | field02 |+---------+---------+|       1 | first   |+---------+---------+

Excellent!

Adding Fields

...one field at a time

mysql 5.0.51b> alter table table01 add column field03 char(20);
Query OK, 1 row affected (0.04 sec)Records: 1  Duplicates: 0  Warnings: 0

...more than one at a time

mysql 5.0.51b> alter table table01 add column field04 date, add column field05 time;
Query OK, 1 row affected (0.04 sec)Records: 1  Duplicates: 0  Warnings: 0

!The "add column" must be restated for each column.
!Commas are used between each add column statement.
iA space may be used after these commas.

iThe MySQL Manual fully explains each possible column data type.

Did it work?

mysql 5.0.51b> select * from table01;
+---------+---------+---------+---------+---------+| field01 | field02 | field03 | field04 | field05 |+---------+---------+---------+---------+---------+|       1 | first   | NULL    | NULL    | NULL    |+---------+---------+---------+---------+---------+
Now we're getting somewhere!

Multi-line Command Entry

The MySQL command line interface allows you to put a statement on one line or spread it across multiple lines. There's no difference in syntax between the two. Using multiple lines allows you to break down the SQL statement into steps you may more easily comprehend.

In multiple line mode, the interpreter appends each line to the prior lines. This continues until you enter a semicolon ";" to close out the SQL statement. Once the semicolon is typed in and you hit enter, the statement is executed.

Here's an example of the same exact SQL statement entered both ways:

Single Line Entry

mysql 5.0.51b> create table table33 (field01 integer,field02 char(30));

Multiple Line Entry

mysql 5.0.51b> create table table33
-> (field01
-> integer,
-> field02
-> char(30));

!Don't break up words:

ValidInvalid
mysql 5.0.51b> create table table33
-> (field01
-> integer,
-> field02
-> char(30));
mysql 5.0.51b> create table table33
-> (field01 inte
-> ger,
-> field02
-> char(30));

!When inserting or updating records, do not spread a field's string across multiple lines, otherwise the line breaks are stored in the record:

Standard Operation

mysql 5.0.51b> insert into table33 (field02)
-> values
-> ('Who thought of foo?');

Line Break Stored in Record

mysql 5.0.51b> insert into table33 (field02)
-> values
-> ('Pooh thought
-> of foo.');

Results

mysql 5.0.51b> select * from table33;
+---------+---------------------+| field01 | field02             |+---------+---------------------+|    NULL | Who thought of foo? ||    NULL | Pooh thoughtof foo. |+---------+---------------------+

Insert Some More Records into the Table

Add this record

mysql 5.0.51b> insert into table01 (field01,field02,field03,field04,field05) values
-> (2, 'second', 'another', '1999-10-23', '10:30:00');
Query OK, 1 row affected (0.00 sec)

!Quotes must go around text values.

iStandard date format is "yyyy-mm-dd".
iStandard time format is "hh:mm:ss".
!Quotes are required around the standard date and time formats, noted above.
iDates may also be entered as "yyyymmdd" and times as "hhmmss". If entered in this format, values don't need to be quoted.

iNumeric values do not need to be quoted. This holds true regardless of the data type a column is formatted to contain (e.g. text, date, time, integer).

iMySQL has a useful command buffer. The buffer stores the SQL statements you've entered thus far. Using it keeps you from having to retype the same commands over and over. Let's use this next step as an example.

Add another record using the command buffer (and optional date and time formats)

  1. Hit the up arrow key twice.
  2. Hit the ENTER key.
  3. Type in the new values between a pair parentheses and stick a closing semicolon on the end.
    (3, 'a third', 'more foo for you', 19991024, 103004);
  4. Hit the ENTER key.

Voilà!

Is it in there?

mysql 5.0.51b> select * from table01;
+---------+-----------+------------------+------------+----------+| field01 | field02   | field03          | field04    | field05  |+---------+-----------+------------------+------------+----------+|       1 | first     | NULL             | NULL       | NULL     ||       2 | second    | another          | 1999-10-23 | 10:30:00 ||       3 | a third   | more foo for you | 1999-10-24 | 10:30:01 |+---------+-----------+------------------+------------+----------+

It's in there!

Now, we're almost done...

Updating Existing Records

Modify one field at a time

!Again, be careful with syntax. Quote marks need to go around text but not around numbers.

mysql 5.0.51b> update table01 set field03='new info' where field01=1;
Query OK, 1 row affected (0.00 sec)

Change multiple fields at once

!Remember to put commas between each field you're updating.

mysql 5.0.51b> update table01 set field04=19991022, field05=062218 where field01=1;
Query OK, 1 row affected (0.00 sec)

So, what's up with our data?

mysql 5.0.51b> select * from table01;
+---------+-----------+------------------+------------+----------+| field01 | field02   | field03          | field04    | field05  |+---------+-----------+------------------+------------+----------+|       1 | first     | new info         | 1999-10-22 | 06:22:18 ||       2 | second    | another          | 1999-10-23 | 10:30:00 ||       3 | third one | more foo for you | 1999-10-24 | 10:30:01 |+---------+-----------+------------------+------------+----------+

Update multiple records in one stroke

mysql 5.0.51b> update table01 set field05=152901 where field04>19990101;
Query OK, 3 rows affected (0.00 sec)

Survey says...

mysql 5.0.51b> select * from table01;
+---------+-----------+------------------+------------+----------+| field01 | field02   | field03          | field04    | field05  |+---------+-----------+------------------+------------+----------+|       1 | first     | new info         | 1999-10-22 | 15:29:01 ||       2 | second    | another          | 1999-10-23 | 15:29:01 ||       3 | third one | more foo for you | 1999-10-24 | 15:29:01 |+---------+-----------+------------------+------------+----------+

Wee haw!

Deleting Records

The delete command

mysql 5.0.51b> delete from table01 where field01=3;
Query OK, 1 row affected (0.01 sec)
mysql 5.0.51b> select * from table01;
+---------+---------+----------+------------+----------+| field01 | field02 | field03  | field04    | field05  |+---------+---------+----------+------------+----------+|       1 | first   | new info | 1999-10-22 | 15:29:01 ||       2 | second  | another  | 1999-10-23 | 15:29:01 |+---------+---------+----------+------------+----------+

Time to Call it Quits

mysql 5.0.51b> quit
Bye

In Closing

Now you know some rudimentary commands for running a database in MySQL. Since MySQL is operated by executing SQL calls, you have a broad array of very powerful tools at your disposal. For instance, you're able to display data from several tables at once by joining related fields.

Similarly, SQL permits complex displays, updates or deletions of multiple records which fit specific criteria. So, your next step toward mastery is learning all about SQL.

James Hoffman has put a tutorial page up on the web entitled Introduction to Structured Query Language.

Another thing to note is MySQL offers good security features you'll need to use when operating on networks.

To learn more about MySQL and how to use it, the manual should be your first stop. Also, Paul DuBois' book, MySQL, comes highly recommended. In addition, the archives of the main list and the Win32 list are tremendous resources. The NYPHP user group has started a MySQL interest group you may find helpful.

If you're curious about database portability, you may find the Building Truly Portable Database Applications in PHP presentation interesting.

If you'll be developing hypertext interfaces to your databases using PHP, check out our SQL Solution™. It's a powerful, user friendly, platform independent API that will make your job a snap! Similarly, you might want to examine PEAR DB, a popular open source database abstraction layer (of which I'm the lead developer).

Also, if your scripts accept user input, the Form Solution™ is a handy tool for cleaning user input, generating HTML / XHTML compliant date/time form elements, validating and formatting date/time inputs and holding all variables submitted by a form. The result is improved security and data quality.

+ Recent posts