Typical use of an software is composed of a human being manipulating a keyboard and mouse to initiate application operations. The human being is claimed to be interacting with the GUI (Graphical Person Interface). Throughout Silk Exam screening, Silk Test interfaces with the GUI to submit operations to the application routinely.
As a result Silk Test can simulate the actions of a person who is working out all the capabilities of an application and verifying the outcomes of just about every procedure. The simulated user (Silk check) is reported to be driving the software. The software less than exam reacts to the simulated user specifically as it would react to a human relaxation. Silk Exam is composed of two unique software program components that execute in separate processes:
The Silk Test host software program
The 4Check Agent software program
Silk Test host computer software
The Silk Exam host computer software is the software you use to acquire, edit, compile, operate and debug your 4Check scripts and test ideas. This manual refers to the program that operates this program as the host machine or the Silk Check equipment.
The 4Take a look at Agent is the software program method that interprets the commands in your 4Exam scripts into GUI-distinct commands. In purchase text, it is the Agent that really drives and monitors the application you are tests. Just one Agent can run domestically on the host device. In a networked ecosystem, any range of Agents can run on distant devices. This manual refers to the devices that operate remote Agents as target devices. This guide refers to the programs that operate remote Agents as goal devices. In a shopper / server ecosystem, Silk Check drives the consumer application by suggests of an agent procedure operating on each and every application's equipment. The application then drives the server just as it generally does. Silk Examination is also capable of driving the GUI belonging to a server or of instantly driving a server database by operating scripts that post SQL statements to the database. These techniques o immediately manipulating the server software are meant to guidance screening in which the client software drives the server.