Pengujian Black Box pada Aplikasi Verifikasi Data Nasabah dengan Menggunakan Metode Boundary Value Analysis
Keywords:
Boundary Value Analysis, Online News, Black Box TestingAbstract
Testing is one level that must be passed in order to produce results from a weighted sistem. If no testing is done on the sistem, the quality of the sistem cannot be known so that if an error occurs it can harm the sistem. By conducting experiments can find the location of defects in a sistem that can be known from the beginning that can be fixed immediately. Testing there are several types of sistem experiments, experiments used are Black Box testing using a limit value analysis method that is effective in trying the functions of a sistem. Testing techniques by making test cases based on limits on lower and upper values can provide good coverage and represent the actual input values. Based on the results of tests conducted with the analysis of boundary values, the application developed has been error free. This gives a guarantee that the application developed has met the requirements and is of high quality.References
Agarwal, B. B., Tayal, S. P., & Gupta, M. (2010). Software Engineering & Testing. An Introduction. Sudbury, Massachusetts: Jones & Bartlett Learning, LLC.
Andriansyah, D. (2018). Pengujian Kotak Hitam Boundary Value Analysis Pada Sistem Informasi Manajemen Konseling Tugas Akhir. Indonesian Journal on Networking and Security - Vol.7 No.1, 13-18.
Arwaz, A. A., Putra, K., Putra, R., Kusumawijaya, T., & Saifudin, A. (2019). Pengujian Black Box pada Aplikasi Sistem Seleksi Pemenang Tender Menggunakan Teknik Equivalence Partitions. Jurnal Teknologi Sistem Informasi dan Aplikasi, 2(4), 130-134. doi:10.32493/jtsi.v2i4.3708
Cholifah, W. N., Yulianingsih, & Sagita, S. M. (2018). Pengujian Black Box Testing pada Aplikasi Action & Strategy Berbasis Android dengan Teknologi Phonegap. Jurnal String, 206-210.
Febrian, V., Ramadhan, M. R., Faisal, M., & Saifudin, A. (2020). Pengujian pada Aplikasi Penggajian Pegawai dengan menggunakan Metode Blackbox. Jurnal Informatika Universitas Pamulang, 5(1), 61-66. doi:10.32493/informatika.v5i1.4340
Irawan, Y. (2017). Pengujian Sistem Informasi Pengelolaan Pelatihan Kerja UPT BLK Kabupaten Kudus. Sentra Penelitian Engineering dan Edukasi, 56-63.
Jaya, T. S. (2018). Pengujian Aplikasi dengan Metode Blackbox Testing Boundary Value Analysis (Studi Kasus: Kantor Digital Politeknik Negeri Lampung). Jurnal Informatika: Jurnal Pengembangan IT, 3(1), 45-48. doi:10.30591/jpit.v3i1.647
Krismadi, A., Lestari, A. F., Pitriyah, A., Mardangga, I. W., Astuti, M., & Saifudin, A. (2019). Pengujian Black Box berbasis Equivalence Partitions pada Aplikasi Seleksi Promosi Kenaikan Jabatan. Jurnal Teknologi Sistem Informasi dan Aplikasi, 2(4), 155-161.
Mustaqbal, M. S., Firdaus, R. F., & Rahmadi, H. (2015). Pengujian Aplikasi Menggunakan Black Box Testing Boundary Value Analysis (Studi Kasus : Apilkasi Prediksi Kelulusan SNMPTN). Jurnal Ilmiah Teknologi Informasi Terapan, 1(3), 31-36. doi:10.33197/jitter.vol1.iss3.2015.62
Rahayuda, I. S., & Santiari, N. L. (2017). Basis Path Testing of Iterative Deepening Search and Held-Karp on Pathfinding Algorithm. Jurnal Ilmiah Kursor, 9(2), 39-48. doi:10.28961/kursor.v9i2.129
Simarmata, J. (2010). Rekayasa Perangkat Lunak. Yogyakarta: Andi.
Sukamto, R. A., & Shalahuddin, M. (2013). Rekayasa Perangkat Lunak Terstruktur dan Berorientasi Objek. Bandung: Informatika.
Zuriati, Widyawati, D. K., Sitanggang, I. S., & Buowo, A. (2018). Teknik Pengujian Boundary Value Analysis pada Aplikasi Learning Management System Polinela. Jurnal TAM (Technology Acceptance Model), 85-92.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2020 Lailan Cipta Hermawan, Moh. Rizki Mubarok, Hidayat Mairudin, Ahmad Mahdiyan, Yulianti Yulianti
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
Jurnal Teknologi Sistem Informasi dan Aplikasi have CC BY-NC or an equivalent license as the optimal license for the publication, distribution, use, and reuse of scholarly work.
In developing strategy and setting priorities, Jurnal Teknologi Sistem Informasi dan Aplikasi recognize that free access is better than priced access, libre access is better than free access, and libre under CC BY-NC or the equivalent is better than libre under more restrictive open licenses. We should achieve what we can when we can. We should not delay achieving free in order to achieve libre, and we should not stop with free when we can achieve libre.
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International (CC BY-NC 4.0) License
YOU ARE FREE TO:
- Share - copy and redistribute the material in any medium or format
- Adapt - remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms