Join Us on Apr 30: Unveiling Parasoft C/C++test CT for Continuous Testing & Compliance Excellence | Register Now

Glossary Hero Background

Glossary

a

Accessibility Testing

Accessibility testing evaluates a software application's usability for individuals with disabilities, ensuring that the interface and functionalities can be easily accessed and used by a diverse user base.

Learn More

Agile

Agile is an iterative and flexible software development approach that emphasizes collaboration, customer feedback, and adaptability.

Learn More

Agile Testing

Agile testing is a software testing approach aligned with Agile development methodologies, focusing on frequent testing, rapid feedback, and continuous improvement.

Learn More

API

An API (application programming interface) defines a set of definitions and protocols that allow different software applications to communicate and interact with each other.

Learn More

API Testing

API testing involves verifying the functionality, performance, and security of an API to ensure it works as intended.

Learn More

Assumption of Use

Assumption of use refers to the expectations or assumptions made about how end users will utilize a software system's features and functions.

Learn More

Automated Testing

Automated testing uses scripts and software tools to automatically execute test cases and compare actual outcomes with expected results, speeding up the testing process.

Learn More

AUTOSAR

AUTOSAR (Automotive Open System Architecture) is a standardized software framework for automotive electronics systems.

Learn More

b

BDD

BDD (behavior-driven development) is a software development approach that focuses on defining the behavior of a system in plain language, facilitating communication between developers, testers, and stakeholders.

Learn More

c

C#

C# (pronounced C-sharp) is a programming language developed by Microsoft, commonly used for building Windows applications and web services.

Learn More

C++

C++ is a programming language that extends the C programming language with features for object-oriented programming.

Learn More

CERT C

CERT C is a set of rules and guidelines for writing safe and secure C code, often used in safety-critical software development.

Learn More

CI/CD Pipeline

CI/CD (continuous integration/continuous deployment) pipeline is an automated software development process that includes continuous testing, integration, and deployment, ensuring rapid and reliable delivery of software changes.

Learn More

Cloud-Based Testing

Cloud-based testing involves using cloud infrastructure and resources to perform software testing tasks, offering scalability and accessibility benefits.

Learn More

Code Coverage

Code coverage is a metric in software testing that measures the extent to which the source code of a program is executed when a particular test suite is run. It’s expressed as a percentage, indicating how much of your code has been tested.

Learn More

Continuous Integration

Continuous integration (CI) is a development practice where automated builds and tests are run when code is pushed into a shared repository, providing rapid feedback on code changes.

Learn More

CVE (Common Vulnerabilities and Exposures)

CVE is a dictionary of publicly known security vulnerabilities and exposures, providing a standardized identifier for each known vulnerability, aiding in the identification and tracking of security issues in software and systems.

Learn More

CWE

CWE (Common Weakness Enumeration) is a list of common software security weaknesses and vulnerabilities.

Learn More

d

DAST

DAST (dynamic application security testing) is a security testing method that analyzes running applications to identify vulnerabilities and security issues.

Learn More

DevOps

DevOps is a cultural and technical movement that emphasizes collaboration between development and IT operations teams to automate and streamline software delivery.

Learn More

Digital Twin

A digital twin is a virtual representation of a physical object or system, used for simulation, analysis, and monitoring.

Learn More

DISA ASD STIG

DISA (Defense Information Systems Agency) is a U.S. Department of Defense agency responsible for providing secure communications and IT support. The ASD (Application Security and Development) STIG (Security Technical Implementation Guide) provides guidelines for secure configuration and operation of computer systems and software.

Learn More

DO-178B

DO-178B (Software Considerations in Airborne Systems and Equipment Certification) is a widely recognized aviation industry standard that outlines the guidelines and requirements for developing and certifying software used in airborne systems, ensuring it meets rigorous safety and reliability standards.

Learn More

DO-178C

DO-178C (Software Considerations in Airborne Systems and Equipment Certification) is an updated version of the DO-178B standard, providing more flexible and modernized guidance for the development and certification of airborne software, with a focus on safety, reliability, and compliance with aviation regulations.

Learn More

Dynamic Analysis

Dynamic analysis involves examining a running program to identify errors, performance issues, and vulnerabilities.

Learn More

e

Embedded Software

Embedded software is compiled code integrated into hardware devices, such as microcontrollers or appliances.

Learn More

EN 50128

EN 50128 is a European standard for software safety and reliability in railway applications.

Learn More

f

Flow Analysis

Flow analysis in software testing refers to the examination and evaluation of data or control flow within a program or system to identify potential issues such as resource leaks, memory corruption, dead code, security vulnerabilities, or performance bottlenecks, helping improve software quality and reliability.

Learn More

Frontend Testing

Frontend testing evaluates the user interface and user experience of a software application.

Learn More

Functional Testing

Functional testing verifies that a software system's functions and features work according to specifications.

Learn More

i

IAST

IAST (interactive application security testing) is a security testing method that combines static and dynamic analysis to identify vulnerabilities.

Learn More

IEC 61508

IEC 61508 is an international standard for functional safety of electrical, electronic, and programmable electronic systems.

Learn More

IEC 62304

IEC 62304 is an international standard published by the International Electrotechnical Commission (IEC) that specifies life cycle requirements for the development of medical software and software within medical devices.

Learn More

IEC 62443

IEC 62443 is an international standard providing guidelines for cybersecurity in industrial automation and control systems, ensuring secure software testing practices within critical infrastructure environments.

Learn More

Integration Testing

Integration testing ensures that different components or modules of a software system work together as expected.

Learn More

ISO 21434

ISO 21434 is a standard for automotive cybersecurity engineering.

Learn More

ISO 26262

ISO 26262 is a standard for functional safety in the automotive industry.

Learn More

j

Java

Java is a widely used programming language known for its platform independence.

Learn More

JUnit

JUnit is a widely used Java testing framework for unit testing, providing annotations and assertions to facilitate the creation and execution of test cases.

Learn More

l

Load Testing

Load testing assesses a software application's performance under expected load conditions.

Learn More

Low-Code Testing

Low-code testing involves use of tools or sets of tools in software testing that require minimal coding knowledge.

Learn More

m

MISRA

MISRA (Motor Industry Software Reliability Association) provides guidelines for developing software in the automotive industry to facilitate code safety, security, portability, and reliability in the context of embedded systems.

Learn More

n

Nonfunctional Testing

Nonfunctional testing assesses aspects of a system beyond its functional requirements, including performance, security, usability, reliability, and scalability, to ensure the software meets quality criteria beyond basic functionality.

Learn More

o

OWASP

OWASP (Open Web Application Security Project) provides resources and best practices for web application security.

Learn More

OWASP Dependency-Check

OWASP Dependency-Check is a tool for identifying known vulnerabilities in project dependencies.

Learn More

p

PCI DSS

PCI DSS (Payment Card Industry Data Security Standard) is a security standard for organizations handling payment card data.

Learn More

Penetration Testing

Penetration testing involves simulating cyberattacks on a software system to identify vulnerabilities and weaknesses, helping organizations strengthen their security measures.

Learn More

Performance Testing

Performance testing evaluates a system's speed, responsiveness, and stability under various conditions.

Learn More

r

Regression Testing

Regression testing ensures that code changes do not introduce new defects into existing functionality.

Learn More

REST API

A REST API (representational state transfer application programming interface) is an architectural style for designing networked applications.

Learn More

s

Safety Critical

Safety-critical software is designed for systems where a failure could result in harm or loss of life, requiring rigorous testing and adherence to safety standards to ensure reliability and risk mitigation.

Learn More

Sandbox

A sandbox is a controlled environment for testing and running software without affecting the production environment.

Learn More

SAST

SAST (static application security testing) analyzes the source code of an application to identify security vulnerabilities.

Learn More

SDLC

SDLC (software development life cycle) is a framework for planning, designing, developing, testing, and maintaining software.

Learn More

Security Critical

Security-critical software is designed for systems where maintaining the confidentiality, integrity, and availability of data is of utmost importance, necessitating robust security testing to identify and address vulnerabilities.

Learn More

Security Testing

Security testing is a process that evaluates a system's resistance to vulnerabilities and potential exploits to ensure the protection of sensitive data and information.

Learn More

SEI

SEI (Software Engineering Institute) is a research and development center that focuses on software engineering and cybersecurity.

Learn More

Selenium

Selenium is a popular open source framework for automating the testing of web applications, typically across different browsers and platforms.

Learn More

Self-Healing

Self-healing refers to a system's ability to automatically detect and recover from errors or failures without human intervention, improving overall system reliability.

Learn More

Service Virtualization

Service virtualization is a method used by development and testing teams that simulates the behavior of dependencies, such as APIs or services, to enable testing in isolation when actual components are unavailable or impractical.

Learn More

Software Automation Testing

Software automation testing uses tools and scripts to automate repetitive testing tasks.

Learn More

Static Analysis

Static analysis examines source code without executing it to identify defects, vulnerabilities, and code quality issues.

Learn More

t

TDD

TDD (test-driven development) is a development approach where tests are written before writing the actual code.

Learn More

Test Data

Test data is the input provided to a software system during testing, encompassing a range of scenarios to validate the system's functionality, performance, and robustness.

Learn More

Test Data Management

Test data management involves the creation, storage, and maintenance of test data sets to support effective and efficient software testing processes.

Learn More

Test Environment

A test environment is a setup where software testing is conducted, simulating the production environment.

Learn More

Test Impact Analysis

Test impact analysis is a technique that identifies the potential impact of code changes on existing tests, enabling efficient software testing by identifying and running specific tests that focus on the affected areas and reducing unnecessary test execution.

Learn More

Testing Framework

A testing framework provides a structured and automated way to perform tests on software applications.

Learn More

Tool Qualification

Tool qualification ensures that software tools used for the development of critical systems meet specific safety and reliability standards and can be used for the development of safety critical systems.

Learn More

u

UL 2900

UL 2900 is a set of standards to define general software cybersecurity requirements for network-connected products, which aim to minimize risks through creation of testable criteria for assessing software vulnerabilities and weaknesses in embedded products and systems.

Learn More

Unit Testing

Unit testing verifies individual components or functions of a software application in isolation.

Learn More

v

Virtual Service

A virtual service is a simulated environment that mimics the behavior of a real service, allowing for testing and development in a controlled setting without relying on the actual service.

Learn More

w

Web UI Testing

Web UI testing involves evaluating the user interface of a web application to ensure its functionality, usability, and compatibility across different browsers, devices, and resolutions, often using automated tools and manual verification.

Learn More