{"id":1703,"date":"2019-03-03T08:23:15","date_gmt":"2019-03-03T08:23:15","guid":{"rendered":"https:\/\/www.h2kinfosys.com\/blog\/?p=1703"},"modified":"2019-03-03T19:31:10","modified_gmt":"2019-03-03T19:31:10","slug":"mutation-testing-2","status":"publish","type":"post","link":"https:\/\/www.h2kinfosys.com\/blog\/mutation-testing-2\/","title":{"rendered":"MUTATION TESTING"},"content":{"rendered":"<p>MUTATION TESTING<\/p>\n<p>Following steps are used to execute mutation testing:<\/p>\n<p><a href=\"https:\/\/www.h2kinfosys.com\/blog\/mutation-testing\/\">CLICK HERE TO READ FIRST PART<\/a><\/p>\n<ol>\n<li>Faults are introduced to the actual source code in program called mutants by creating different versions of the program each mutant should contain a single fault and the goal is to fail these mutant versions<\/li>\n<li>Test cases are applied to both original and mutant program, it should be adequate to find the defect or fault in the program.<\/li>\n<li>Comparing the results of both original and mutant program.<\/li>\n<li>If the original and mutant program\u2019s results are different then the mutant is killed.<\/li>\n<li>If both the program generate same output then the mutant is kept alive. In these cases more effective test cases need to be created to kill mutants.<\/li>\n<\/ol>\n<p><b>The advantages of Mutation testing<\/b><\/p>\n<ol>\n<li>It is powerful way to reach the high <a href=\"https:\/\/www.h2kinfosys.com\/blog\/decision-testing\/\">coverage<\/a> of the source program.<\/li>\n<li>This testing is capable of testing the mutant program also.<\/li>\n<li>This testing brings a good level of error detection to the software developer. Those faults can be identified which have missed from the developer\u2019s attention.<\/li>\n<li>This testing has the capacity to detect all the faults in the program and removes all the ambiguities in the source code.<\/li>\n<li>Customers are benefited by getting the most reliable and stable system by this testing.<\/li>\n<\/ol>\n<p><b>The disadvantages of the Mutation Testing<\/b><\/p>\n<ol>\n<li>Mutation testing is very expensive and time consuming as there are mutant programs to be created and tested with the original program.<\/li>\n<li>Testing cannot be done without an <a href=\"https:\/\/www.h2kinfosys.com\/blog\/automation-testing-tools\/\">automation tool<\/a>.<\/li>\n<li>Each mutant program will have the same number of test cases as the original program has which makes the tester to test large number to mutant programs.<\/li>\n<li>It is not well suited for black box testing.<\/li>\n<\/ol>\n<h2><b>Questions<\/b><\/h2>\n<ol>\n<li>What is Mutation Testing?<\/li>\n<li>Explain some examples of mutation testing?<\/li>\n<li>What are the characteristics of mutation testing?<\/li>\n<li>What is the difference between mutation testing and Happy testing?<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>MUTATION TESTING Following steps are used to execute mutation testing: CLICK HERE TO READ FIRST PART Faults are introduced to the actual source code in program called mutants by creating different versions of the program each mutant should contain a single fault and the goal is to fail these mutant versions Test cases are applied [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[249],"class_list":["post-1703","post","type-post","status-publish","format-standard","hentry","category-qa-tutorials","tag-mutation-testing"],"_links":{"self":[{"href":"https:\/\/www.h2kinfosys.com\/blog\/wp-json\/wp\/v2\/posts\/1703","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.h2kinfosys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.h2kinfosys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.h2kinfosys.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.h2kinfosys.com\/blog\/wp-json\/wp\/v2\/comments?post=1703"}],"version-history":[{"count":0,"href":"https:\/\/www.h2kinfosys.com\/blog\/wp-json\/wp\/v2\/posts\/1703\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.h2kinfosys.com\/blog\/wp-json\/wp\/v2\/media?parent=1703"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.h2kinfosys.com\/blog\/wp-json\/wp\/v2\/categories?post=1703"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.h2kinfosys.com\/blog\/wp-json\/wp\/v2\/tags?post=1703"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}