Describe the process of tracking bugs

Assignment Help Computer Engineering
Reference no: EM132131316

Assignment: Week 5 Bugs vs. Feature Requests

There is no such thing as a bug-free IT project. Because bugs are a fact of IT project life, IT project managers must articulate a process for identifying, tracking, and handling the bugs that will inevitably occur. In addition, because technical and business requirements change frequently, IT project managers must also plan to log and track requests for new features and functionality.

Read the following linked documents:

• "Visual Studio - Manage Bugs": This article describes the process of tracking bugs in Visual Studio, a popular .NET development suite created by Microsoft®.

• "What Is a Bug and Issue Tracking Tool?": This article describes the process of tracking bugs in Jira, a popular bug tracking and project management tool created by Atlassian.

Create a 3-page Microsoft® Word document of a bug tracking process for the project you created in the individual assignments in Weeks 2 and 3. Be sure to differentiate between bugs and feature requests. For this assignment, you will only be tracking bugs.

Your tracking process must include:

• Description of software you propose using for bug tracking (in-house developed or third-party)

• Description of issues that will be considered bugs (vs. feature requests)

• Description of who will use the system to track bugs

• Description of who will monitor the system, follow up with the requestor as necessary, and implement the bug fixes

• Description of bug-related information (such as a unique tracking number, description, assignee, etc.) necessary to identify, fix, and log bugs

Submit your completed document.

Reference no: EM132131316

Questions Cloud

What happens to the debt-gdp ratio : Suppose a country's debt rises by 10% and its GDP rises by 12%. What happens to the debt-GDP ratio
Identify a problematic issue in your community : Identify a problematic issue in your community. Develop a solution or an approach to solving the problem that you have identified.
How much will its new national debt be : Suppose a country has a national debt of $5,000 billion, a GDP of $10,000 billion, How much will its new national debt be
Provide an ethnographic account of your experience : The cultural ethnography project is designed to help you explore an otherwise unfamiliar aspect of religious belief and practice.
Describe the process of tracking bugs : CMGT 410 "Visual Studio - Manage Bugs": This article describes the process of tracking bugs in Visual Studio, a popular .NET development suite created.
The role of motivation in adolescent learning : Prevention or intervention techniques to support and motivate students who might be struggling or facing a challenging situation like a learning disability.
Draw the consumer budget constraint : Suppose that a consumer can earn a higher wage rate for working overtime. Draw the consumer's budget constraint
Compare the mean absolute error of the neural classifiers : COSC2111 Data Mining - Compare the mean absolute error of the neural classifiers with the mean absolute error of Weka M5P and MultiLayerPerceptron
Complete the cos sheet portion of the linked uat plan : CMGT 410 As a group, complete the COS sheet portion of the linked UAT Plan Template. Note: Click the COS tab that appears at the bottom of the spreadsheet.

Reviews

Write a Review

Computer Engineering Questions & Answers

  What follows from requiring calls to be a hierarchy

What follows from requiring CALLS to be a hierarchy? Draw the CALLS graph for your sample program, and check whether the graph is a DAG or not.

  What are the server-side attacks

What are the server-side attacks? What are the techniques a developer can employ to minimize these attacks?

  Find the line midpoint and its tangent vector

Find the parametric equation of the line connecting point (2, 1, 0) to point (-2, -5, 0). Find the line midpoint and its tangent vector.

  Which environment variables are set by reading -etc-passwd

Which environment variables are set by reading /etc/passwd? Why are all environment variables represented in a fixed format regardless of the shell you use?

  Provide a summary of the comparison

Provide a summary of the comparison between the classifier outputs by Naïve Bayes Classifier and J48 - Calculate the probability estimates of these two class

  Write a nonrecursive function int

Write a nonrecursive function int gcd(int x, int y), where x andy are required to be positive integers, that searches through the positive integers until.

  What type of attack did the archeologists use

Some archeologists found a new script written in an unknown language. They were able to read the original script What type of attack did the archeologists use?

  Describe generics in c what are the reasons for using

write a 200- to 300-word short-answer response to the followinga explain generics in c. what are reasons for using

  Explain the main difference between dfa and dfm

Explain the main difference between DFA and DFM. how many axes are available, turning operations, turning cutting tools and speeds.

  Iterate through vector

Iterate through vector A using a for loop and create a new vector B containing logical values. The new vector should contain true for positive values and false for all other values.

  A new column would be added to the table

A table was created, Whse.IStock. This table contains a column, SKU that holds stock numbers. The SKU column was created as a data type char(20) and right-justified the stock numbers with leading blanks.

  Your have been contracted by healthfirst hospital

your have been contracted by healthfirst hospital foundation hhf a charitable organization that provides services to

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd