Free Essay

Software Testing Tools Survey

In:

Submitted By gleonard89
Words 1393
Pages 6
Concordion
1. Who (company or individual) developed the tool? What is the cost to the tool user? How do you acquire it?
Concordion was developed by David Peterson, an agile consultant from London, UK. While working at Easynet in 2006, the idea was formed with testers and developers Nat Pryce and Steve Freeman. Concordion was then later ported and improved upon by several developers, specifically Nigel Charman, the designer of the Concordion Extensions API. The Concordion tool is available for free at concordion.org/Download.html.
2. What testing purpose does the tool serve? (i.e., what problem does it attempt to solve? How does it improve productivity?)
Concordion is an open source tool that is used for the automation of Specification by Example. Using simple HTML, developers can create concrete examples in any specifications with certain commands. This allows for Concordion to check the examples against a real-life system. The specifications allow for complete cover of any behavior important to a customer. Based on this, specifications can be used as unit tests. Concordion specifications are also clear and readable so they can also serve as system documentation. This means a project’s specifications can be easy to understand for the development team, as well as anyone outside it. This would ultimately allow for a better maintenance of software quality as the software can be reviewed as a group effort.
5. What do you need to do in order to use the tool?
There is ample documentation provided on the Concordion website to guide you through the install and configuration process. Concordion requires JDK5.0 and the following JARs in the classpath:
• concordion-1.4.7.jar
• junit-4.12.jar (or junit-3.8.2.jar)
• hamcrest-core-1.3.jar (required for JUnit 4.11 or later)
• ognl-2.6.9.jar
• xom-1.2.5.jar
These are all included in the download that Concordion provides. In order to configure Concordion, acceptance tests should be placed in a folder named ‘specs’ and a .html file should be created that shares the same base name as the JUnit test. Finally, a stylesheet named ‘concordion.css’ is a stylesheet to make the specs look nice while you’re writing them.
The Concordion commands use a “concordion” namespace defined at the top of each document. A example of how Concordion would be used is provided.
1. Create a Java package called "example".
2. Create a file "HelloWorld.html" inside the package containing:

Hello World!

3. Now instrument the file as follows:

Hello World!

4. In the same example package, create a Java file "HelloWorldFixture.java" containing: package example; import org.concordion.integration.junit4.ConcordionRunner; import org.junit.runner.RunWith;

@RunWith(ConcordionRunner.class) public class HelloWorldFixture { public String getGreeting() { return "Hello World!"; }
}
5. Now run the HelloWorldFixture class using JUnit.

6. What are the strengths and limitations of the tool?
Tests can become truly useful documentation Concordion specifications are so readable they can double up as system documentation. They are written in HTML, so can be easily hyperlinked into a navigable structure. And, since the automated acceptance tests run against the system, you can be confident the documentation is always up-to-date.
Helps you to separate "what?" from "how?" Tests that include a lot of implementation detail lock you into that implementation. Concordion helps you to document the logic and behaviour of your system in a way that gives you the flexibility to change the implementation later on.
Purposely small command-set is simple to learn Concordion based on specification by example has been designed with a short learning-curve as a top priority. Automated tests are integrated with JUnit, which makes them easy to run and easy to include in an existing project build.
One of the limitations is of Concordion is that because of the small command set there isn’t much versatility in what it does or how it functions. Another limitation is that Concordion is not suitable for testers who don't have access to developers or development skills. The test specs can be written by non-developers, but the instrumentation and fixture code require Java programming ability.

FindBugs
1. Who (company or individual) developed the tool? What is the cost to the tool user? How do you acquire it?
FindBugs was founded by David Hovemeyer who now works as an Associate Professor of CS at York College. Hovemeyer did a Ph.D. thesis on FindBugs at the University of Maryland. However, he is not currently an active member of the development team. The current team consists of Bill Pugh (project lead and primary developer), Andrey Loskutov (worked on Eclipse plugin), and Keith Lea (web cloud). The software is available on its own and as a plugin for free under the terms of the Lesser GNU Public License. It can be downloaded online at findbugs.sourceforge.net/downloads.html.
2. What testing purpose does the tool serve? (i.e., what problem does it attempt to solve? How does it improve productivity?)
The FindBugs tool utilizes static analysis to review Java bytecode and see if any bug patterns occur. Using static program analysis, an analysis of a program can be done without executing the program. Since it analyzes Java bytecode, a program’s source code is not necessary for analysis. FindBugs also implements a plugin architecture which allows for anyone to add new bug detectors. By classifying errors into one of four ranks, FindBugs gives hints to developers about the severity of the errors of their programs. All these features make FindBugs very easy and simple to use.
5. What do you need to do in order to use the tool?
To use FindBugs, you need a runtime environment compatible with Java 2 Standard Edition, version 1.5 or later. FindBugs is platform independent, and is known to run on GNU/Linux, Windows, and MacOS X platforms. The easiest way to install FindBugs is to download a binary distribution. Binary distributions are available in gzipped tar format and zip format. Once you have downloaded a binary distribution, extract it into a directory of your choice.
Extracting a gzipped tar format distribution:
$ gunzip -c findbugs-3.0.0.tar.gz | tar xvf -
Extracting a zip format distribution:
C:\Software>unzip findbugs-3.0.0.zip
Usually, extracting a binary distribution will create a directory ending in findbugs-3.0.0. For example, if you extracted the binary distribution from the C:\Software directory, then the FindBugs software will be extracted into the directory C:\Software\findbugs-3.0.0. This directory is the FindBugs home directory.
If you are running FindBugs on a Windows system, double-click on the file %FINDBUGS_HOME%\lib\findbugs.jar to start the FindBugs GUI.
On a Unix, Linux, or Mac OS X system, run the $FINDBUGS_HOME/bin/findbugs script, or run the command: java -jar $FINDBUGS_HOME/lib/findbugs.jar

to run the FindBugs GUI.
After you have started FindBugs using the findbugs command, choose the File → New Project menu item. Use the "Add" button next to "Classpath to analyze" to select a Java archive file (zip, jar, ear, or war file) or directory containing java classes to analyze for bugs. You may add multiple archives/directories. You can also add the source directories which contain the source code for the Java archives you are analyzing. This will enable FindBugs to highlight the source code which contains a possible error. Once you have added all of the archives, directories, and source directories, click the "Analyze" button to analyze the classes contained in the Jar files.
6. What are the strengths and limitations of the tool?
One of the strengths of FindBugs is that it uses static analysis to inspect Java bytecode for occurrences of bug patterns. Static analysis means that FindBugs can find bugs by simply inspecting a program's code: executing the program is not necessary. This makes FindBugs very easy to use: in general, you should be able to use it to look for bugs in your code within a few minutes of downloading it. FindBugs also supports a plugin architecture allowing anyone to add new bug detectors.
The main weakness of FindBugs is that because its analysis is sometimes imprecise, FindBugs can report false warnings, which are warnings that do not indicate real errors. In practice, the rate of false warnings reported by FindBugs is less than 50%.

Similar Documents

Premium Essay

Metasploit Vulnerability Scanner Executive Proposal

...cyber-attacks on its network and web site, as well as false alegations of unethical practices. ARC’s network is growing, with over two thousand devices currently and reaching from VA to NY. ARC needs to ensure better security of communications, intellectual property (IP) and public image, all of which affect ARC’s reputation with the public and investors. ARC has previously limited information technology (IT) expenditures to desktop computers and network infrastructure hardware such as routers, firewalls and servers. It is imperative that ARC considers information security (IS) and begins to invest in products that will allow the IT department to better protect the network and the information stored and passed through it. Metasploit Pro is a software product that will allow the IT department to assess and analyze vulnerabilities on virtually all parts of the network, to include users. It can assist the IT department in performing audits of all hosts or devices operating on the network, to...

Words: 2593 - Pages: 11

Free Essay

Site Survey

...Wireless Survey Research With wireless systems, it’s very difficult to predict the propagation of radio waves and detect the presence of interfering signals without the use of test equipment. Walls, doors, elevator shafts, people, and other obstacles offer varying degrees of attenuation, causing the RF radiation pattern to be irregular and unpredictable. As a result, it’s absolutely necessary to perform a wireless site survey to fully understand the behavior of radio waves within the operating environment before installing access points. The goal of a wireless site survey is to determine the number and placement of access points that provides adequate signal coverage throughout a facility. A wireless site survey also detects the presence of RF interference coming from other sources that could degrade the performance of the wireless LAN. Also keep in mind that the facility of the WLAN is highly impactful on the whether it requires a survey. For example a small room office may not require a site survey. With the given example a small office might only require an access point or a router located within the office to require adequate coverage. A larger facility is going to require a well scoped survey to be able to provide sufficient coverage to all areas, and if a larger facility isn’t properly surveyed other areas in the facility might be affected by poor coverage or no coverage. Example of these areas would be airports, hospitals, colleges. When conducting a site survey keep in...

Words: 657 - Pages: 3

Premium Essay

Sibm

...com Professional Synopsis ← 7 years of total experience with 2 years of software project management exposure. ← On-site coordination experience from client site based in San Francisco USA. ← Requirement understanding and project initiation activities at on-site location based in New York, Cincinnati and San Francisco, USA. ← Proven abilities in leading complete SDLC entitling analysis, design, development, testing, planning, estimations and delivery. ← An effective communicator with excellent relationship management skills. Strong analytical, problem solving & analytical abilities. Possess a flexible & detail oriented attitude. ← Leading and managing team of size 20+. ← Consistently top performer. Skills Set Technical Operating System : Windows NT/2K/XP/2K3/2K8/Vista/7. Microsoft Tech. : .NET Framework, Visual C# .Net, VB .NET, ASP .Net, ADO .Net, framework 1.0, 1.1, 2.0, 3.5, web services, Windows services, Remoting, Entity framework, Linq, Share point – WSS exposure, Sales Force integration, Dial up USA. Ajax toolkit extender, Enterprise library, Crystal reports, Membership providers,In-home install api, Google api integration API integration : IBM SPSS, Google api federated login and white listing, Lumi , in-home install, Trumpia SMS. Database : RDBMS Concepts, MS SQL (2000, 2005, 2008), Oracle concepts, SQL integration services. Tools & Packages : Visual Studio.Net, FXCop, IBM SPSS, Lyris, Virtual Servers. ...

Words: 2307 - Pages: 10

Premium Essay

Grading System

...computer processing. Every type of job relies upon getting information, using it, managing it, and relaying information to others. Computers enable the efficient processing and storage of information. A grading system plays a key role in the management system of any school. But, such systems do not often relate expectations, outcomes, and performance. As each student desires to achieve a good score for each assignment, exam, project and/or report, the whole process adds heavy workload for teachers in order to make their evaluation fair, comprehensive, and accurate. From the faculty perspective, these are necessary to avoid disagreement from students and parents. A computerized grading system is a highly desirable addition to the educational tool-kit, particularly when it can provide less effort and a more effective and timely outcome. Grading systems are designed to provide incentives for achievement and assist in identifying problem areas of a student. It is the most commonly used means of analyzing student performance, talents and skills. Students’ grades are vital information needed in advancing to the next grade/year level and its accuracy is very important. Many teachers feel that the time they take in recording and computing for the grades of their students is time that could be better spent elsewhere, like preparing lessons, researching or meeting with their students. With the advent of computer technology, more and more schools are taking advantage of a variety of grading...

Words: 2287 - Pages: 10

Premium Essay

Testing Basics

...What is Rational Unified Process? RUP is a Software Engineering Process. It is a disciplined approach to assigning tasks, roles and responsibilities within a development environment. RUP identifies the static and dynamic aspects of an SDLC. The static aspects are called the Workflows and the dynamic aspects are called Phases. The various Phases are Inception, Elaboration, Construction, and Transition. The 9 Workflows defined by RUP are Business Modeling, Requirements, Analysis and Design, Implementation, Test, Deployment, Configuration and Change Management, Project Management, and Environment. When is it appropriate to use RUP? The basic goal of RUP is to ensure productivity of high-quality software that meets the needs of its end users within a predictable schedule and budget. Any project team that aims at producing a software application that is not only meets the quality criteria but also meets the schedule, budget and maintenance criteria. Advantages of RUP? RUP, if implemented as per the guidelines by an organization, can result in producing an application that meets the standards of QA. It contains several tools under its belt that are easy to learn and apply. Disadvantages of RUP? Although RUP has all the benefits, it has its share of drawbacks. In order to implement RUP in an organization - a major re-engineering process of the existing development system has to be performed - Tools needed to implement RUP are extremely expensive and may not...

Words: 2172 - Pages: 9

Free Essay

Developing Health Management Information Systems

...specially designed to assist in the management and planning of health programs, as opposed to delivery of care HMIS: Health management information system Steps in Developing a Health Management Information System (1) Review the existing system (2) Define the data needs of relevant units within the health system (3) Determine the most appropriate and effective data flow (4) Design the data collection and reporting tools (5) Develop the procedures and mechanisms for data processing (6) Develop and implement a training program for data providers and data users (7) Pre-test, and if necessary, redesign the system for data collection, data flow, data processing and data utilization (8) Monitor and evaluate the system (9) Develop effective data dissemination and feedback mechanisms (10) Enhance the HMIS 1. REVIEWING THE EXISTING SYSTEM PRINCIPLE Do not destroy existing systems; build on the strengths and learn from the weaknesses of what already exists. STEPS (1) Make an inventory of the forms, log books and other tools used to record and summarize data at different...

Words: 3454 - Pages: 14

Premium Essay

Software Testing

...Publication House http://www.irphouse.com A Review of Software Testing Techniques Manpreet Kaur1 and Rupinder Singh2 1 Department of CSE CGC, Gharuan Mohali, India 2 CSE CGC, Gharuan Mohali, India Abstract Software testing is important to reduce errors, maintenance and overall software costs. One of the major problems in software testing area is how to get a suitable set of test cases to test a software system. We identify a number of concepts that every software engineering student and faculty should have learned. There are now many testing techniques available for generating test cases. This set should ensure maximum effectiveness with the least possible number of test cases. The main goal of this paper is to analysed and compare the testing technique to find out the best one to find out the error from the software. Keywords: Software testing; process model; testing techniques; 1. Introduction Software testing is a process or a series of processes designed to verify computer code does what it was designed to do. According to ANSI/IEEE 1059 standard [1, 2], Testing can be defined as ―A process of analyzing a software item to detect the differences between existing and required conditions (that is defects/errors/bugs) and to evaluate the features of the software item. Another more appropriate definition is this: [3] Testing is the process of executing a program with the intent of finding errors. The concept of testing is as old as coding and is change along with time. Gelperin...

Words: 4928 - Pages: 20

Premium Essay

Adaptation of Agile Practices: a Systematic Review and Survey

...Master Thesis Software Engineering Thesis no: MSE-2011:64 September 2011 Adaptation of Agile Practices: A Systematic Review and Survey Budsadee Kongyai and Edi Edi School of Computing Blekinge Institute of Technology SE-371 79 Karlskrona Sweden This thesis is submitted to the School of Engineering at Blekinge Institute of Technology in partial fulfillment of the requirements for the degree of Master of Science in Software Engineering. The thesis is equivalent to 40 weeks of full time studies. Contact Information: Author(s): Budsadee Kongyai Address: Kungsmarksvägen 43 Karlskrona 371 44, Sweden E-mail: nune.budsadee@gmail.com Edi Edi Address: Kungsmarksvägen 57 Karlskrona 371 44, Sweden E-mail: edi198@gmail.com University advisor(s): Dr. Jürgen Börstler School of Computing EMSE Co-supervisors: Prof. Dr. Dr. h.c. H. Dieter Rombach (TU Kaiserslautern) Dr. Ove Armbrust (Fraunhofer IESE, Germany) School of Computing Blekinge Institute of Technology SE-371 79 Karlskrona Sweden Internet: www.bth.se/com Phone : +46 455 38 50 00 Fax : +46 455 38 50 57 Abstract Context. Due to the uniqueness of software projects there is no single Agile development approach that ideally fits all project contexts. Each software project is unique, whether in its subject area, development team, or project size. Because of this, adapting Agile practices according to project circumstances is a must. There has been a number of literature published discussing Agile practices...

Words: 49494 - Pages: 198

Premium Essay

Service Request Sr-Rm-004, Part 3

...Service Request SR-rm-004, Part 3 “Riordan Manufacturing is a worldwide plastics manufacturer employing 550 persons with projected yearly earnings of $46 million. The company is entirely owned by Riordan Manufacturing Industries, a Fortune 1000 enterprise with revenues in excess of $1 billion.” (Baihaqi, 2009) Numerous facilities exits around the world and mainline developments take place in San Jose, California which is the headquarters of the company. Riordan has served a variety of customers such as automakers, different manufacturers, and the Department of Defense. Current Human Resource Information System The current information system keeps track of all personnel, their information, date of hire, tax exemptions, vacation hours, and organization information. Furthermore, the current system has been partnered with a financial system to aid with payroll functions. Any changes or input that needs to be generated will be requested from an employee’s manager and changes will be applied by payroll personnel. All documented training information is in an Excel worksheet maintained by training personnel. Same procedures go for recruiters with an addition of keeping all resumes and filled application in one centralized location. The Human Resource Department manages workmen’s compensation while following the same procedures as mentioned above. Any complaints or harassments will be handled by an employee relations personnel. Lastly, managers have been task with monitoring the Family...

Words: 2054 - Pages: 9

Free Essay

Rvut Task 1

...TO: Jane Doe, Director Area Office FROM: Daniel Krupka, Division Manager Support Services DATE: November 13, 2011 SUBJECT: Unauthorized Access to Confidential Files It is believed this company is the victim of a deliberate attack from an outside source, with the sole purpose of obtaining access to Confidential Files. On November 11, 2011, a breach of the company’s security measures was detected, and several Confidential Files accessed. An immediate investigation was launched to determine how access was gained. How Access Was Gained It has been determined a combination of Social Engineering, and Malware was used to bypass the company’s security measures. Through the use of dumpster diving, the perpetrator managed to locate files containing client invoices. Posing as a company client, the perpetrator placed a call to the receptionist of the Support Services Division, stating he was trying to send an email to the Supervisor of the Customer Complaints section regarding the upcoming contract renewal. It was further stated the email would not go through. The perpetrator expressed the urgency of the email, and asked the receptionist if she would verify if the address was correct. The receptionist verified the Supervisors company email ending the call. The perpetrator then proceeded to send an email to the Supervisor posing as a client complaining there was an issue with the product list on the Company website. The email contained a hyperlink, which upon clicking redirected...

Words: 921 - Pages: 4

Free Essay

Standardized Survey Tools

...Standardized Survey Tools for Assessment in Archives and Special Collections Yakel, E., & Tibbo, H. (2010). Standardized survey tools for assessment in archives and special collections. Performance Measurement and Metrics, 11(2), 211-222. Retrieved March 11, 2013, from the Emerald database. Abstract: User-based evaluation in archives and special collections is in its fancy, and this paper aims to discuss the conceptualization, development, and testing of Archival Metrics Toolkits. The development and adoption of standardized metrics to support the management of both analog and digital collections is a critical need in archives and manuscript collections. The Archival Metrics Toolkits were created, and comprised five user-based evaluation instruments for archives and special collections in colleges and universities such as researcher, archival web sites, online finding aids, student researchers, and teaching support. The Archival Metrics Toolkits, as developed, represent a first step toward standardized evaluation created specifically for archives. Now it is up to the community to adopt these tools and report their use. These are the first standardized questionnaires to target archives and special collections and take into consideration the unique environment of primary sources and the specific dynamics involved in connecting researches with archival and manuscript collections. Keywords: Archiving, Collections management, Software tools Summary Over the past five...

Words: 1429 - Pages: 6

Premium Essay

Software Development System

...What is the Software Development Life Cycle (SDLC)? July 9, 2013 justin in insight The Software Development Life Cycle is a process that ensures good software is built.  Each phase in the life cycle has its own process and deliverables that feed into the next phase.  There are typically 5 phases starting with the analysis and requirements gathering and ending with the implementation.  Let’s look in greater detail at each phase: Requirements Gathering/Analysis This phase is critical to the success of the project.  Expectations (whether of a client or your team) need to be fleshed out in great detail and documented.  This is an iterative process with much communication taking place between stakeholders, end users and the project team.  The following techniques can be used to gather requirements: * Identify and capture stakeholder requirements using customer interviews and surveys. * Build multiple use cases to describe each action that a user will take in the new system. * Prototypes can be built to show the client what the end product will look like.  Tools like Omnigraffle, HotGloo and Balsalmiq are great for this part of the process. In a corporate setting, this means taking a look at your customers, figuring out what they want, and then designing what a successful outcome would look like in a new bit of software. Design  Technical design requirements are prepared in this phase by lead development staff that can include architects and lead developers.  The...

Words: 917 - Pages: 4

Premium Essay

List of Major Equipment

...laboratory/workshop Total Area of lab/ workshop sq.m Major equipment Cost in Lacs i) Applied Mechanic ii) Environment Lab. iii) Survey Lab. 1 Civil Engineering iv) Hydraulic or Fluid Mechanics Lab v) Material Testing Lab. 140.00 90.00 75.00 120.00 120.00 1) Compression Testing Machine 2) Tri axial Shear Test Apparatus 3) Direct Shear Test Apparatus 4) Electronic distance meter N1- 450 5) One second theodolite 6) Digital Planimeter 7) Auto level 8) PH Meter 8) Vicat Apparatus. 10) Le-Chatelier Apparatus. 11) Aggregate Impact Testing Machine. 12) Compaction Factor Apparatus. 13) Universal Testing Machine (100T) 14) Universal Testing Machine (20T) 15) Compression Testing Machine (200T) 16) Torsion Testing Machine 17) Hardness Testing Machine 18) Impact Testing Machine 19) Fatigue Testing Machine 20) Timber Testing Machine 21) Concrete Mixer 22) Tile Flexure Testing Machine Distillation Column, Surface Evaporation Equipment, Extraction Equipment Ball Mill, Pulveriser, Sieve Analyser, Plate and Frame Filter, PH Meter 0.59 0.24 1.23 3.95 8.78 2 Chemical Engineering i) Chemistry Lab ii) Mass & Transfer Lab iii) Process Control Lab. iv) Mechanical Operations Lab. 100.00 120.00 90.00 120.00 0.36 1.26 2.80 1.01 Please purchase PDFcamp Printer on http://www.verypdf.com/ to remove this watermark. i) Software Lab-I. ii) Software Lab-II. 3 Computer Technology iii) Project & Hardware Lab. iv) Information Technology Lab-I. 75.00 50.00 75.00 70.00 Computers...

Words: 952 - Pages: 4

Free Essay

Computers in Schools

...This article was downloaded by: [La Trobe University] On: 16 January 2013, At: 18:29 Publisher: Routledge Informa Ltd Registered in England and Wales Registered Number: 1072954 Registered office: Mortimer House, 37-41 Mortimer Street, London W1T 3JH, UK Computers in the Schools Publication details, including instructions for authors and subscription information: http://www.tandfonline.com/loi/wcis20 Instruments for Assessing the Impact of Technology in Education Rhonda Christensen & Gerald Knezek a a b Institute for the Integration of Technology into Teaching and Learning (IITTL), University of North Texas, P.O. Box 311337, Denton, TX, 76203, USA b University of North Texas, P.O. Box 311337, Denton, TX, 76203, USA Version of record first published: 11 Oct 2008. To cite this article: Rhonda Christensen & Gerald Knezek (2001): Instruments for Assessing the Impact of Technology in Education, Computers in the Schools, 18:2-3, 5-25 To link to this article: http://dx.doi.org/10.1300/J025v18n02_02 PLEASE SCROLL DOWN FOR ARTICLE Full terms and conditions of use: http://www.tandfonline.com/page/termsand-conditions This article may be used for research, teaching, and private study purposes. Any substantial or systematic reproduction, redistribution, reselling, loan, sub-licensing, systematic supply, or distribution in any form to anyone is expressly forbidden. The publisher does not give any warranty express or implied or make any representation that the contents will...

Words: 7331 - Pages: 30

Free Essay

Introduction About Enrolment Grading System

...partial documentation for the evaluation of academic achievement. The reader should not construe the report as a working document. Abstract The WPI OfCourse! course management system provides educators with a set of tools to extend their existent course websites. While this toolset offers great functionality, the installation and configuration of the system is complex and difficult. The project team created a two-tiered installation package that is both simplified and easy to use. User testing was conducted and indicated a significant improvement in the installation procedure. In conclusion, the OfCourse! system was improved by the newly created installer. -i- Executive Summary As the web evolves and grows, educational professionals continue to pursue the use of online tools. While a variety of software exists, educators of average computer literacy seek a feature-rich application that is easy to install and use. Educators demand a well-designed user interface and a comprehensive set of features. The OfCourse! course management system is a set of online educational tools that can be integrated into existent websites. While the toolset provided is packed with great modules such as calendars, discussion boards, and grade books, the software suite was difficult to install and configure. Although previous...

Words: 6392 - Pages: 26