Metrics

  • November 2019
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Metrics as PDF for free.

More details

  • Words: 777
  • Pages: 6
METRICS 1) Schedule variance = (Actual time taken - Planned time) / Planned time * 100 2) Effort variance = (Actual effort - Planned Effort)/Planned effort * 100 3) Defect unearthing efficiency = 100 * STRs found in pass 1/ ( STRs found in pass 1 + STRs found in pass 2 but existing in pass 1) = Defect unearthing efficiency for pass 1. Thus defect unearthing efficiency can be found for all passes. Also defect unearthing efficiency in terms of field STRs could be found as follows: = 100 * Total STRs found in Polaris for a release/ (Total STRs found in Polaris for a release + Field STRs for that release) 4) Test case efficiency = (Total STRs - STRs not mapped)/Total STRs * 100 5) Test case coverage = (Total Test cases - STRs that cannot be mapped to test cases)/ Total Test Cases * 100 PRODUCTIVITY METRICS 1.

OUTPUT / INPUT OR VALUE OF MATERIAL / COST OF PRODUCTION Eg: Non Commented Software Source (NCSS) Per Engineer Per Month NCSS per Person Month NCSS per Function Point NCSS can also be replaced by KLOC (Kilo Lines of Code)

QUALITY METRICS 1.

DEFECTS PER KLOC

2.

DEFECTS PER FUNCTION POINT

3.

% OF MAINTENANCE / PROJECT EFFORT

4.

POST RELEASE STABILITY

5.

PREDELIVERY DEFECT REMOVAL EFFICIENCY

6.

DELIVERED DEFECTS PER KLOC

7.

(COST OF REWORK / TOTAL COST ) X 100

PROCESS IMPROVEMENT METRICS 1.

PROCESS IMPROVEMENT OR OVERALL EFFICIENCY = RETURN ON INVESTMENT

2.

% OF RECYCYLED CODE

1

3.

% OF CALENDER TIME / PHASE

4.

INCREASED RETURNS / INCREASED COST

5.

% OF DEFECTS IN PHASE OF THIS YEAR / % OF DEFECTS IN PHASE OF LAST YEAR

6.

DIFFICULTY COMPLEXITY = McCABE COMPLEXITY

7.

TOTAL RECORDED PRE-DELIVERY DEFECTS / TOTAL FOUND DURING UAT

8.

POST RELEASE DISCOVERED DEFECTS DENSITY OVER PERIOD

2

OTHERS 1.

TEST COMPLETION CRITERIA = NO. OF HOURS OF TEST WITHOUT BUGS

2.

DEFECTS PER WEEK

3.

% BRANCH COVERAGE BY TEST

4.

MAINTAINABILITY = MEAN TIME TO CORRECT

5.

INTEGRITY =

6.

USABILITY = NET INCREASE IN PRODUCTION OVER EARLIER SYSTEM

7.

CUSTOMER BEHAVIOR = VOLATALITY INDEX

8.

CUSOMER BEHAVIOR = NO OF CHANGES IN REQUIREMENTS OVER A PERIOD

9.

PRODUCTIVITY = $ PER KLOC KLOC PER MONTH MONTHS PER KLOC

Σ ( 1 – THREAT X (1 – SECURITY) )

10. DOCUMENTATION = PAGES PER KLOC PAGES PER PERSOM MONTHS $ PER PAGE 11. QUALITY = ERRORS PER KLOC $ PER ERROR 12. FUNCTIONALITY = FUNCTION POINT PER PROGRAM FUNCTION POINT PER KLOC MAINTAINED 13. CUSTOMER SATISFACTION = NO. OF COMPLAINTS / PERIOD OF TIME 1 / NO. OF COMPLAINTS PREVENTIVE CONTROLS Controls that are designed to prevent an error, omission or malicious act from occurring. 1.

DATA DICTIONARY

2.

STRUCTURED TECHNIQUES

3.

PROGRAMMING STANDARDS

4.

DOCUMENTATION STANDARDS

5.

PROCESSING PARAMETERS

6.

ON-LINE PROMPTING

7.

SELF-HELP FEATURES

8.

DEFAULT OPTIONS

3

9.

GOOD SCREEN DESIGN

10. FIELD HIGHLIGHTS 11. SCREEN DIAGNOSTIC MESSAGES 12. PRE NUMBERED FORMS 13. SYSTEM ASSIGNED NUMBERS 14. PRE-CODED FORMS / SCREENS 15. TURN AROUND DOCUMENTS 16. DATA OWNERSHIP 17. DATA CLASSIFICATION 18. REFERENCE VALUES OR CODE KEPT OUTSIDE THE PROGRAM 19. PASSWORDS TO FUNCTIONS 20. TRANSACTION CANCELLATION 21. DATA ENCRYPTION 22. MANAGEMENT APPROVALS 23. CONCURRENT ACCESS CONTROLS DEFECTIVE CONTROLS Controls that reflect that an error, omission or malicious act has occurred, and reports the occurrence.  Access Violation Log 1.

BATCH CONTROL TOTALS

2.

HASH TOTALS

3.

LIMIT CHECKS

4.

REASONABLENESS TEST

5.

CHECK DIGITS

6.

OVERFLOW CHECKS

7.

FORMAT CHECKS

8.

DATA CHECKS

9.

LABEL CHECKS

4

10. COMPLETENESS TESTS 11. RANGE TESTS 12. RECORD COUNTS 13. SIGN TEST 14. SIZE TEST 15. SEQUENTIAL CHECKS 16. DUPLICATION CHECKS 17. CROSS RECORD EDITING 18. SYSTEM MATCHING 19. FIELD COMBINATION TEST 20. VALIDITY CHECKS 21. RUN-TO-RUN TOTALS 22. SUSPENSE FILES 23. HEAD AND TRAILER RECORD VERIFICATION 24. BALANCE CONTROL 25. SYSTEM LOGGING OF TRANSACTIONS (LOG OFF) COMPARISON TOTALS 1.

COMPUTATION CONTROLS

2.

RATIO TEST

3.

ROUNDING TECHNIQUE

4.

DESCRIPTIVE READ BACK

5.

SYSTEM WALKTHROUGH

6.

DATA CHECK

7.

KEY VERIFICATION

8.

ONE FOR ONE CHECK (MANUAL)

5

CORRECTION CONTROL Controls that correct errors, omissions, or malicious acts one they are detected in future date. 1.

PROGRAM COMMENTS

2.

JOB CONTROL COMMENTS

3.

AUTOMATIC ERROR CORRECTIONS

4.

OVERRIDE BY SUPERVISOR

5.

AUDIT TRAIL REPORTS

6.

CONTROL REPORTS

7.

EXCEPTION REPORTS

8.

PRODUCTIVITY REPORTS

9.

AGING REPORTS

10. ERROR REPORTS 11. BEFORE / AFTER IMAGE RECORD REPORTING FOR FILE MAINTENANCE 12. ERROR TOTALS 13. DOCUMENTATION RECOVERY CONTROLS 1.

AUTOMATIC BACKUP AND RECOVERY

2.

JOURNALIZING

3.

DATA RETENTION YEARS

4.

CHECK POINT CONTROLS

5.

TRANSACTION BACK OUT

6.

RECOVERY LOGGING

7.

FALL BACK PROCEDURE

6

Related Documents

Metrics
November 2019 35
Metrics
November 2019 32
Metrics
November 2019 35
Metrics
November 2019 38
Sqa Metrics
November 2019 10
Excel Metrics
November 2019 16