in Technology by
In an application currently in production, one module of code is being modified. Is it necessary to re-test the whole application or is it enough to just test functionality associated with that module?

1 Answer

0 votes
by

Well, the answer is both. You will have to test the functionality of that module as well as the other modules. It also depends on the module you are modifying.

All the modules should be tested because new changes might have an impact on the other modules as well. You can, therefore, differentiate by the stress given on the module which is to be tested.

I think this scenario will explain the answer to your question well.

If Module A is modified, Module B is depending on module A, and Module C is a general module independent of module A.

In this case, you will first test the module A in depth. Your next stress will be on the module B. But what about module C? This module will be tested as well but with less stress, because module C does not depend on module A for its functioning, rather it depends on module B.

If you are a white box tester, you must be knowing which modules are to be tested and which ones can be affected. But in case you are a black box tester, you will be required to do Regression Testing as well.

Regression tests should be carried out on only those modules associated with the modified module.

Related questions

0 votes
    Process scheduling functionality can be achieved in which module of Blue Prism? a)System Module b)Dashboard c)Studio Module d)Control Room...
asked Apr 29, 2021 in Technology by JackTerrance
0 votes
    Explain with reasons whether the following statements are true or false: 1. It is necessary that all the ... -Indian relations are friendly Please answer the above question....
asked Aug 4, 2022 in Education by JackTerrance
0 votes
    12 defective pens are accidently mixed with 132 good ones. It is not possible to just look at pen and tell whether ... out is good one. Select the correct answer from above options...
asked Nov 17, 2021 in Education by JackTerrance
0 votes
    The approach to input validation that simply encodes characters considered "bad" to a format which should not affect the ... weak (1)Encrypt bad (2)Backlisting (3)Encode bad...
asked May 15, 2021 in Technology by JackTerrance
0 votes
    Working on an app with notification via e-mail. I'd like to run test with out sending e-mails to ... JavaScript Questions for Interview, JavaScript MCQ (Multiple Choice Questions)...
asked Mar 10, 2022 in Education by JackTerrance
0 votes
    Working on an app with notification via e-mail. I'd like to run test with out sending e-mails to ... JavaScript Questions for Interview, JavaScript MCQ (Multiple Choice Questions)...
asked Mar 10, 2022 in Education by JackTerrance
0 votes
    clicking the_____button enlarges the application window to fill the whole screen Select the correct answer from above options...
asked Dec 13, 2021 in Education by JackTerrance
0 votes
    A sniffer, on the whole turns your system's NIC to the licentious mode so that it can listen to all ... ,Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    A DDoS with 20 to 40 Gbps is enough for totally shutting down the majority network infrastructures. (a) ... -for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    If A and B are two events associated with a random experiment such that P(A) = 0.25, P(B) = 0.4 and P(A or B) ... ) (ii) P(A and bar B) Select the correct answer from above options...
asked Nov 22, 2021 in Education by JackTerrance
...