Glossary OF Technical Terms & Definitions
There are currently 136 Add Term in this directory
A
Agile & DevOps:
Modern software development methodologies and practices that emphasize flexibility, collaboration, and continuous delivery.
Agile Development:
A software development approach that emphasizes flexibility, collaboration, and iterative development, often used in fast-paced, dynamic projects.
AI (Artificial Intelligence):
The field of computer science focused on creating machines capable of intelligent behavior, including applications like self-driving cars and smart homes.
API Testing:
Testing the application's programming interface to insure data exchange and functionality.
Application Program Interface (API):
A means for different applications to communicate with each other using a common language and defined by a contract.
Auto-healing:
The capability of an automation tool to automatically recover and adapt to changes or errors in the application being tested.
Automated Testing:
The process of using software tools and scripts to perform tests on a software application or system, replacing manual testing with automated, repeatable procedures.
B
BDD(Behavior-Driven Development):
An agile software development process that encourages collaboration among developers, QA, and non-technical stakeholders.
Blockchain Security:
Ensuring the security of blockchain technology, particularly protecting transactions and data stored on blockchain networks.
Business Process Test Automation:
The automation of end-to-end business processes, involving multiple applications and systems, to ensure smooth workflow.
C
Cloud Security:
Protecting data, applications, and infrastructure in cloud environments, often using AI for threat detection.
Color Themes:
The use of specific colors or themes in the test report to visually represent different metrics, enhancing readability and interpretation of results.
Compatibility:
Ensuring that the chosen tool works seamlessly with the organization's software development tools and methodologies.
Competency:
Refers to the existing team's skills and abilities, script development, debugging, and script maintenance efforts.
Continuous Delivery (CD):
An extension of CI that automates the deployment process to ensure that code changes are ready for production.
Continuous Integration(CI):
A development practice where code changes are frequently integrated into a shared repository and automatically tested.
Continuous Integration/Continuous Delivery (CI/CD):
A set of practices and tools that automate the building, testing, and deployment of software, allowing for frequent and reliable releases.
Cross-Browser Compatibility:
Ensuring that a web application works consistently across different web browsers.
Cross-Browser Testing:
Testing a web application across different web browsers to ensure compatibility.
Cryptojacking:
Illegally using someone else's computer or device to mine cryptocurrencies without their knowledge or consent.
D
Dashboards:
Visual representations of test status and application health, suitable for sharing with leadership teams interested in specific metrics.
Data Point:
Individual data instances used in validation techniques like Leave One Out Cross Validation.
Defect Status:
Indicates the status of identified defects, such as "Open," "Closed," "Accepted," "Rejected," "Deferred," and "non-reproducible."
Denial of Service (DoS) Attack:
An attack that aims to make a computer or network resource unavailable to its intended users by overwhelming it with excessive traffic or requests.
Desktop Applications:
Software designed to run on personal computers or workstations, providing user interfaces and functionality for various tasks.
DevOps:
DevOps is a software development and operations methodology that emphasizes automation and collaboration to speed up software delivery.
Distributed Playback:
The ability to execute automated tests across multiple machines or environments.
E
Edge Computing:
Refers to the emergence of quantum computing at the cutting edge of technology, offering new capabilities and solutions.
End-to-End Testing:
Comprehensive testing that checks the entire application flow from start to finish.
F
Firewall:
A network security device or software that monitors and filters incoming and outgoing network traffic to allow or block specific data packets based on security rules.
Framework Abstractions:
High-level representations or models that help structure and simplify the design and execution of automated tests.
Framework Design:
A simple visual structure that helps to organize the ideas and information of a problem for effective work.
G
Graphical User Interface (GUI):
Visual way for users to interact with a computer or software, using icons, buttons, and windows.
GUI Testing:
This testing refers to validating UI features & functions of an operation that's visible to the Users.
H
HTTP Request:
A request sent by a client to a server, typically with actions such as GET, POST, PUT, or DELETE for CRUD operations.
I
Inbuilt Framework:
A pre-defined structure or set of tools that provides a foundation for organizing and executing automated tests.
Incomplete Tests:
Test cases that have not been fully executed or have failed, highlighting the need for re-running incomplete tests and analyzing their dependencies in the business process.
Integration Capabilities:
The tool's ability to seamlessly integrate with other software development tools and processes, especially in Agile and DevOps environments.
Interdisciplinary Collaboration:
Collaboration between experts in quantum physics, computer science, mathematics, and engineering to address quantum computing challenges.
Intrusion Detection System (IDS):
A security tool that monitors network or system activities for signs of malicious activities or policy violations and triggers alerts.
Intrusion Prevention System (IPS):
Similar to an IDS, but it can also take action to block or prevent detected intrusion attempts.
J
K
K Fold Cross Validation:
A validation technique that divides the dataset into k subsets, trains the model on k-1 subsets, and validates it on the remaining subset, repeating this process k times.
Karate:
An open-source testing tool for API testing, with a unique name that might humorously lead to testers being called "The Karate Kid."
Keyword-Driven Testing:
A test automation method that uses keywords to represent actions or operations in test scripts.
L
M
Malware:
Short for "malicious software," malware includes viruses, Trojans, worms, and other software designed to harm or exploit computer systems.
Metric:
A measurement or quantitative assessment used to evaluate the performance and effectiveness of automated test suites, such as the number of tests passed and failed.
Mobile Apps (iOS and Android):
Applications specifically designed for mobile devices running on the iOS or Android operating systems.
Model Validation:
The process of evaluating the effectiveness and performance of machine learning models using metrics like accuracy on test data, but it's acknowledged as an incomplete evaluation.
Model's Performance:
The ability of the machine learning model to make accurate predictions and decisions in real-world scenarios.
N
NISQ Devices:
Noisy Intermediate-Scale Quantum devices, referring to quantum computers with a limited number of qubits and a higher susceptibility to errors.
O
Object Identification APIs:
Application Programming Interfaces used to identify and interact with specific elements or objects within a software application's user interface.
Object Storage:
A repository or database for storing information about the objects and elements within a software application's user interface, used for automation and testing purposes.
Open-Source Testing Tool:
Testing tools developed and made available to the public for free, often by the open-source community.
P
Page Object Model (POM):
A design pattern for creating reusable and maintainable test automation scripts for web applications.
Parallel Test Execution:
The simultaneous execution of multiple automated tests, often used to save time and increase test coverage.
Penetration Testing:
Simulating real-world attacks to locate software vulnerabilities, using manual or automated techniques.
Performance Testing
Assessing the software's speed, scalability, and stability under various conditions.
Phishing:
A type of cyberattack where attackers use deceptive emails or websites to trick individuals into revealing sensitive information, such as passwords or financial details.
Plugin Architecture:
A system that allows extending the functionality of a software tool through plugins or extensions.
Pugh Matrix:
A decision-making tool used to rank and compare automation tool options based on weighted selection criteria.
Q
Quality Assurance (QA):
The process of ensuring the reliability and correctness of quantum algorithms, hardware, and applications.
Quantum Computing
The field of computing that harnesses the principles of quantum mechanics to perform advanced computations, using qubits instead of classical bits.
Quantum Computing:
An emerging technology with security opportunities and vulnerabilities, requiring new encryption methods.
Quantum Entanglement:
The phenomenon where the state of one quantum particle is correlated with the state of another, even when separated by great distances.
Quantum Noise:
Errors and disruptions in quantum computations caused by external factors like thermal noise, electromagnetic radiation, and cosmic rays.
Quantum Software Testing:
The process of testing quantum software, including quantum circuits, gates, and algorithms, while considering the probabilistic nature of quantum computing.
R
Ransomware:
A type of malware that encrypts a victim's data and demands a ransom to provide the decryption key.
Recorder:
A tool or component that captures user interactions and generates scripts or code for automated testing.
Regression Testing
Regression testing is done to insure that recent law changes do not unintentionally break being features in a software operation.
Reusability Support:
The ability to reuse and share test components or scripts across different tests, reducing duplication and maintenance efforts.
Reusability:
Ability to use the same test scripts, components, or code modules across multiple test cases or scenarios.
S
SAP GUI:
The graphical user interface of the SAP software, used for interacting with SAP applications in enterprise environments.
Scope Analysis:
The detailed examination of the automation project's scope, including applications/products to be automated, budget, team composition, existing tools/platforms, and the company's IT strategy.
Screenshots:
Captured images that provide visual information about both test failures and successful steps, enhancing the understanding of the application and the business process.
Security Auditing:
Assessing security and compliance with standards, involving code reviews and penetration tests.
Security Information and Event Management (SIEM)
: A system that aggregates and analyzes security data from various sources to identify and respond to security incidents.
Service Level Agreement (SLA’s):
SLAs set clear expectations regarding uptime, response times, and other critical service parameters to ensure customer satisfaction and accountability.
Shift-Left Ideology:
A software development approach that promotes early testing and quality assurance.
Software Quality:
The measure of the overall quality and reliability of software, which impacts customer satisfaction and retention.
Stakeholder-friendly Test Report:
A test report designed to be easily understood and valuable for non-technical stakeholders.
Stakeholders:
The key individuals involved in the tool selection process, including test engineers, tech architects, test managers, project managers, business unit leaders, and representatives from the sourcing team.
Stress Testing:
Testing the software's limits by applying extreme conditions to identify failure points.
Superposition:
A fundamental quantum mechanical property that allows qubits to exist in multiple states simultaneously.
Swagger Document:
A documentation format for RESTful services that describes the API's capabilities and expectations.
T
Technology Coverage:
The range of technologies or platforms that an automation tool or framework can effectively test.
Test Automation Challenges:
Common obstacles faced in test automation, such as flakiness and test data management.
Test Automation ROI:
Test Automation ROI, or Return on Investment, is all about understanding how much money you make from the money you spend on automation.
Test Case:
A set of conditions, inputs, or conduct designed to determine whether a specific point or function of a software operation is working rightly.
Test Coverage/Traceability Matrix:
A table or matrix that correlates test cases with corresponding requirements, offering insights into the success of regression testing and validating the extent of test coverage.
Test Development:
The process of creating, maintaining, and improving test scripts or cases for automated testing.
Test Framework:
A set of guidelines, stylish practices, and applicable factors that give a structured way to produce and manage automated tests.
Test Management:
The organization and control of test activities, including planning, monitoring, and reporting.
Test plan:
A document outlining the compass, objects, coffers, schedule, and approach for testing conditioning.
Test Report:
Documentation that summarizes test results, including pass/fail status and issues found.
Test Types:
Considering the tool's suitability for various testing types, such as functional, performance, security, or usability testing.
TestNG:
A testing frame inspired by JUnit and NUnit, designed for test configuration and parallel test execution.
Two-Factor Authentication (2FA):
A security process in which a user must provide two different authentication factors (e.g., a password and a one-time code) to access an account or system.
V
Vulnerability Scanning:
Automated identification of potential security flaws in software or networks to suggest remediation, focusing on known risks.
W
Web Application Security Testing:
Focusing on web-based application vulnerabilities, using methods like SQL injection and cross-site scripting testing.
Web Services:
Software systems designed to allow interaction between different applications over a network, typically using standard internet protocols like HTTP.
Submit a Term Name