当前位置:网站首页>Bug description, rating and life cycle
Bug description, rating and life cycle
2022-06-29 10:37:00 【Xihong Shiwang has many fish】
How to describe a bug
1. Find the problem version
2. The environment in which the problem arises
3. Steps for error recurrence : Describe the shortest steps for problem recurrence
4. A description of the expected behavior
5. Description of the wrong behavior
6. Other requirements ( For example, fault classification, etc )

bug To rank
1.Blocker( collapse )
2. Critical( serious )
3.Major( commonly )
4.Minor( secondary )
bug Life cycle of (open—closed)
New: Newly discovered bug, Decide whether to assign developers to modify without review
Open: Confirmation is bug, And think it needs to be modified , Assign to the appropriate Developer
Fixed: After the developer makes the modification, it is marked as the modification status , To be verified by regression test of testers
Rejected: If not bug, Refuse to modify
Delay: If you think it doesn't need to be modified or can't be modified for the time being , Modify later
Closed: Modify the state of bug The regression verification by the tester passed , Then close bug
Reopen: If verified bug There is still , You need to reopen bug, Revised by the developer group
invalid bug:open->closed open->rejected->closed

边栏推荐
- 查看CSDN的博客排名
- QGIS mapping
- Hystrix fuse: Service fusing and service degradation
- SQL Server 数据库的连接查询
- Recyclerview sticky (suspended) head
- Vmware的下载与安装(基本思路+详细过程)
- Reading notes of CLR via C -clr boarding and AppDomain
- SQL Server 数据库的统计查询
- AQS之BlockingQueue源码解析
- Ce projet Open source est super wow, des photos manuscrites sont générées en ligne
猜你喜欢

智能组卷系统设计

MySQL innodb每行数据长度的限制

Downloading and installing VMware (basic idea + detailed process)

Basic operations during dev use

Call another interface button through win32API

Download control 1 of custom control (downloadview1)

AQS之ReentrantLock源码解析

给定两个整形变量的值,将两个值的内容进行交换 (C语言)

Beautiful ruins around Kiev -- a safe guide to Chernobyl!

Picture verification code control
随机推荐
Web漏洞手动检测分析
Application of Pgp in encryption technology
全面理解MESI缓存一致性协议
Recyclerview universal adapter package
Analysis of BlockingQueue source code of AQS
F5 big IP Icontrol rest command execution (cve-2022-1388)
Downloading and installing VMware (basic idea + detailed process)
mysql 8.0 一条insert语句的具体执行流程分析(三)
Implementation of iequalitycomparer interface in C #
Substring score - Ultra detailed version - the last programming challenge
MySQL中innodb_page_cleaners详解
攻防世界-Re-insfsay
SQL Server 数据库的连接查询
BUUCTF--reverse1
DevExpress的双击获取单元格数据
Web vulnerability manual detection and analysis
September 29, 2020 non commodity templating code level rapidjson Library
Real time value transfer from C form to another form
Ce projet Open source est super wow, des photos manuscrites sont générées en ligne
QGIS mapping