SOFTWARE TESTING USING BLACK BOX TESTING BOUNDARY VALUE ANALYSIS (CASE STUDY: E-COMMERCE ON BOOKSTORE WALI SONGO MEDAN)
Abstract
Information technology is currently utilized in all aspects such as education, business, marketing
(buying and selling) and also health. One of the activities of these aspects is data processing
activities. following the development of information technology data processing activities are
now using the application of information systems. Information systems can process data quickly
and efficiently and produce accurate information from the data processed. at Wali Songo
Bookstore in processing book data and book marketing using online marketing information
system (e-commerce). to produce a good book marketing information system at Wali Songo
Bookstore requires steps that must be implemented such as analysis, design, implementation and
testing system. after the analysis phase, design and implementation done in this study the author
focus discuss the last stage of system testing. system testing is done by using the Black Box
Technique by way of Boundary Value Analysis (BVA) that is by determining the lower boundary
value and upper limit of data to be tested. the focus of testing information systems online
marketing book (e-commerce) is on the processing of data stock books on field ISBN and year
published. The tested is at the time penginputan data in each field with the grouping in the table.
will be known whether in the process penginputan there anomaly (error). This mistake will be
used as a basis to repair / refine the information system before used at Wali Songo Bookstore.
Downloads
References
Application Development Model
Analysis Study In Information Systems
Development, Journal of Matriks, Vol.
16 No. 2
[2] Mutaqbal, Msidi, Firdaus, Roeri Fajri,
Rahmadi, Hendra, 2015, Application
Testing Using Black Box Testing
Boundary Value Analysis (Case Study:
SNMPTN Graduation Prediction
Application), Scientific Journal of
Applied Information Technology, Vol.
1 No. 3
The authors and co-authors warrant that the article is their original work, does not infringe any copyright, and has not been published elsewhere. By submitting the article to GPH-International Journal of Computer Science and Engineering (GPH-IJCSE), the authors agree that the journal has the right to retract or remove the article in case of proven ethical misconduct.