If you find bug while testing, and Developer reject your bug, You will try to explain developer this is bug, Please fix it, Still Developer does not listen to you ? What you will do at this situation.
Answer Posted / navrattan singh
We have to report to our test lead and also we need to provide a proper document to developer for confirm that the raised bug is valid.and if the developer is still not agrees that it's a bug,told him to check in SRS....
Is This Answer Correct ? | 1 Yes | 0 No |
Post New Answer View All Answers
A power plant control system?
Can Parrto Principle be used in Quality Assurance and testing?
Mention the different types of software testing?
What is your understanding regarding a test plan?
draft an email to the client asking for clarrification on the conference calling function in a landline phone
Suppose you find a bug in production, how would you make sure that the same bug is not introduced again?
list potential risks that you have identified so far in Banking domain
prepare functional requirements and design test cases for a given business requirement as follows(consider all the implicit requirements): A message portal is given,Login into that, check for any e_mail in inbox-if present reply,if not compose a mail and send it.
Hai Friends I am working as a Software Test Engineer in Bangalore. I am taking Classes at weekends on Testing Concepts. I will teach will all the real time examples and writing the Test cases, Document Management and also about what are all the duties of a real time Test Engineer at a company. Course Fee is very minimal and only in week ends. For who attended the class any time support through phone and job guidence. Intrested Friends mail me at vinodhanandhan@gmail.com
How to know that we have to use which tool for this project?
What is the difference between test case and test data?
Explain stress testing, load testing and volume testing?
What is mr and er?
Define the key challenges faced during software testing?
how to identify metrics, integrity level, identify risks and identify security issues in ieee 829 standard explain with examples??