当前位置:网站首页>Bug description, rating and life cycle
Bug description, rating and life cycle
2022-06-29 10:37:00 【Xihong Shiwang has many fish】
How to describe a bug
1. Find the problem version
2. The environment in which the problem arises
3. Steps for error recurrence : Describe the shortest steps for problem recurrence
4. A description of the expected behavior
5. Description of the wrong behavior
6. Other requirements ( For example, fault classification, etc )

bug To rank
1.Blocker( collapse )
2. Critical( serious )
3.Major( commonly )
4.Minor( secondary )
bug Life cycle of (open—closed)
New: Newly discovered bug, Decide whether to assign developers to modify without review
Open: Confirmation is bug, And think it needs to be modified , Assign to the appropriate Developer
Fixed: After the developer makes the modification, it is marked as the modification status , To be verified by regression test of testers
Rejected: If not bug, Refuse to modify
Delay: If you think it doesn't need to be modified or can't be modified for the time being , Modify later
Closed: Modify the state of bug The regression verification by the tester passed , Then close bug
Reopen: If verified bug There is still , You need to reopen bug, Revised by the developer group
invalid bug:open->closed open->rejected->closed

边栏推荐
- Linux下Redis安装及集群搭建
- Analyze in detail the PBOT mining virus family behavior and the principle of exploited vulnerabilities, and provide detailed protection suggestions for the blue army
- 查看CSDN的博客排名
- Excel日期及数字格式处理
- 1147 heaps (30 points)
- SQL Server 数据库增删改查语句
- 如何快速完成磁盘分区
- C语言库函数--strstr()
- 全面理解MESI缓存一致性协议
- 《CLR via C#》读书笔记-加载与AppDomain
猜你喜欢
随机推荐
Common usage of LINQ in C #
2019.11.17 training summary
js post下载文件
Win32Exception (0x80004005): 组策略阻止了这个程序。要获取详细信息,请与系统管理员联系。
Analyze in detail the PBOT mining virus family behavior and the principle of exploited vulnerabilities, and provide detailed protection suggestions for the blue army
Attribute in C
打印1000~2000年之间的闰年(C语言)
这个开源项目超哇塞,手写照片在线生成
Design of intelligent test paper generation system
全面理解MESI缓存一致性协议
Seaweedfs security configuration
1-数据库了解
MySQL中的alter table操作之add/modify/drop列
mysql 8.0 一条insert语句的具体执行流程分析(二)
Download control 1 of custom control (downloadview1)
Is it safe to open a stock account with the QR code given by the manager of a securities firm? I want to open an account
520 diamond Championship 2021
2019-11-10 training summary
Findbugs修改总结
Power strings [KMP cycle section]









