You are on page 1of 6

METRICS

1) Schedule variance = (Actual time taken - Planned time) / Planned time * 100

2) Effort variance = (Actual effort - Planned Effort)/Planned effort * 100

3) Defect unearthing efficiency = 100 * STRs found in pass 1/ ( STRs found in pass 1 + STRs found in
pass 2 but existing in pass 1) = Defect unearthing efficiency for pass 1.
Thus defect unearthing efficiency can be found for all passes.

Also defect unearthing efficiency in terms of field STRs could be found as follows:

= 100 * Total STRs found in Polaris for a release/ (Total STRs found in Polaris for a release + Field STRs
for that release)

4) Test case efficiency = (Total STRs - STRs not mapped)/Total STRs * 100
5) Test case coverage = (Total Test cases - STRs that cannot be mapped to test cases)/ Total Test Cases *
100

PRODUCTIVITY METRICS

1. OUTPUT / INPUT OR
VALUE OF MATERIAL / COST OF PRODUCTION

Eg: Non Commented Software Source (NCSS) Per Engineer Per Month
NCSS per Person Month
NCSS per Function Point

NCSS can also be replaced by KLOC (Kilo Lines of Code)

QUALITY METRICS

1. DEFECTS PER KLOC

2. DEFECTS PER FUNCTION POINT

3. % OF MAINTENANCE / PROJECT EFFORT

4. POST RELEASE STABILITY

5. PREDELIVERY DEFECT REMOVAL EFFICIENCY

6. DELIVERED DEFECTS PER KLOC

7. (COST OF REWORK / TOTAL COST ) X 100

PROCESS IMPROVEMENT METRICS

1. PROCESS IMPROVEMENT OR OVERALL EFFICIENCY = RETURN ON INVESTMENT

2. % OF RECYCYLED CODE

1
3. % OF CALENDER TIME / PHASE

4. INCREASED RETURNS / INCREASED COST

5. % OF DEFECTS IN PHASE OF THIS YEAR / % OF DEFECTS IN PHASE OF LAST YEAR

6. DIFFICULTY COMPLEXITY = McCABE COMPLEXITY

7. TOTAL RECORDED PRE-DELIVERY DEFECTS / TOTAL FOUND DURING UAT

8. POST RELEASE DISCOVERED DEFECTS DENSITY OVER PERIOD

2
OTHERS

1. TEST COMPLETION CRITERIA = NO. OF HOURS OF TEST WITHOUT BUGS

2. DEFECTS PER WEEK

3. % BRANCH COVERAGE BY TEST

4. MAINTAINABILITY = MEAN TIME TO CORRECT

5. INTEGRITY = Σ ( 1 – THREAT X (1 – SECURITY) )


6. USABILITY = NET INCREASE IN PRODUCTION OVER EARLIER SYSTEM

7. CUSTOMER BEHAVIOR = VOLATALITY INDEX

8. CUSOMER BEHAVIOR = NO OF CHANGES IN REQUIREMENTS OVER A PERIOD

9. PRODUCTIVITY = $ PER KLOC


KLOC PER MONTH
MONTHS PER KLOC

10. DOCUMENTATION = PAGES PER KLOC


PAGES PER PERSOM MONTHS
$ PER PAGE

11. QUALITY = ERRORS PER KLOC


$ PER ERROR

12. FUNCTIONALITY = FUNCTION POINT PER PROGRAM


FUNCTION POINT PER KLOC MAINTAINED

13. CUSTOMER SATISFACTION = NO. OF COMPLAINTS / PERIOD OF TIME


1 / NO. OF COMPLAINTS

PREVENTIVE CONTROLS

Controls that are designed to prevent an error, omission or malicious act from occurring.

1. DATA DICTIONARY

2. STRUCTURED TECHNIQUES

3. PROGRAMMING STANDARDS

4. DOCUMENTATION STANDARDS

5. PROCESSING PARAMETERS

6. ON-LINE PROMPTING

7. SELF-HELP FEATURES

8. DEFAULT OPTIONS

3
9. GOOD SCREEN DESIGN

10. FIELD HIGHLIGHTS

11. SCREEN DIAGNOSTIC MESSAGES

12. PRE NUMBERED FORMS

13. SYSTEM ASSIGNED NUMBERS

14. PRE-CODED FORMS / SCREENS

15. TURN AROUND DOCUMENTS

16. DATA OWNERSHIP

17. DATA CLASSIFICATION

18. REFERENCE VALUES OR CODE KEPT OUTSIDE THE PROGRAM

19. PASSWORDS TO FUNCTIONS

20. TRANSACTION CANCELLATION

21. DATA ENCRYPTION

22. MANAGEMENT APPROVALS

23. CONCURRENT ACCESS CONTROLS

DEFECTIVE CONTROLS

Controls that reflect that an error, omission or malicious act has occurred, and reports the occurrence.
 Access Violation Log

1. BATCH CONTROL TOTALS

2. HASH TOTALS

3. LIMIT CHECKS

4. REASONABLENESS TEST

5. CHECK DIGITS

6. OVERFLOW CHECKS

7. FORMAT CHECKS

8. DATA CHECKS

9. LABEL CHECKS

4
10. COMPLETENESS TESTS

11. RANGE TESTS

12. RECORD COUNTS

13. SIGN TEST

14. SIZE TEST

15. SEQUENTIAL CHECKS

16. DUPLICATION CHECKS

17. CROSS RECORD EDITING

18. SYSTEM MATCHING

19. FIELD COMBINATION TEST

20. VALIDITY CHECKS

21. RUN-TO-RUN TOTALS

22. SUSPENSE FILES

23. HEAD AND TRAILER RECORD VERIFICATION

24. BALANCE CONTROL

25. SYSTEM LOGGING OF TRANSACTIONS (LOG OFF)

COMPARISON TOTALS

1. COMPUTATION CONTROLS

2. RATIO TEST

3. ROUNDING TECHNIQUE

4. DESCRIPTIVE READ BACK

5. SYSTEM WALKTHROUGH

6. DATA CHECK

7. KEY VERIFICATION

8. ONE FOR ONE CHECK (MANUAL)

5
CORRECTION CONTROL

Controls that correct errors, omissions, or malicious acts one they are detected in future date.

1. PROGRAM COMMENTS

2. JOB CONTROL COMMENTS

3. AUTOMATIC ERROR CORRECTIONS

4. OVERRIDE BY SUPERVISOR

5. AUDIT TRAIL REPORTS

6. CONTROL REPORTS

7. EXCEPTION REPORTS

8. PRODUCTIVITY REPORTS

9. AGING REPORTS

10. ERROR REPORTS

11. BEFORE / AFTER IMAGE RECORD REPORTING FOR FILE MAINTENANCE

12. ERROR TOTALS

13. DOCUMENTATION

RECOVERY CONTROLS

1. AUTOMATIC BACKUP AND RECOVERY

2. JOURNALIZING

3. DATA RETENTION YEARS

4. CHECK POINT CONTROLS

5. TRANSACTION BACK OUT

6. RECOVERY LOGGING

7. FALL BACK PROCEDURE

You might also like