Every Software Developer Should Pass This Test!

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Catherine Halcomb
C
Catherine Halcomb
Community Contributor
Quizzes Created: 1452 | Total Attempts: 5,830,558
Questions: 70 | Attempts: 274

SettingsSettingsSettings
Every Software Developer Should Pass This Test! - Quiz

Software development is the process of conceiving, specifying, designing, programming, documenting, testing, and bug fixing involved in creating and maintaining applications, frameworks, or other software components.
If you think you are a smart software developer, you have to pass this test!


Questions and Answers
  • 1. 

    Hannah has stored a list of sports within the following one-dimensional array. The number of comparisons required to find the item ‘kayaking’ using a linear search is

    • A.

      3

    • B.

      5

    • C.

      6

    • D.

      10

    Correct Answer
    C. 6
    Explanation
    The correct answer is 6 because in a linear search, each element of the array is compared with the target element until a match is found or the end of the array is reached. In this case, Hannah would need to compare "kayaking" with each of the 6 elements in the array before finding a match.

    Rate this question:

  • 2. 

    Which one of the following is an advantage of a wireless network over a wired network?

    • A.

      More reliable data transmission

    • B.

      Less expensive set-up costs

    • C.

      Slower data transfer rates

    • D.

      Increased data security

    Correct Answer
    B. Less expensive set-up costs
    Explanation
    A wireless network has the advantage of less expensive set-up costs compared to a wired network. This is because setting up a wired network requires the installation of physical cables, which can be costly and time-consuming. On the other hand, a wireless network only requires the installation of wireless access points, which are generally more affordable and easier to set up. This makes wireless networks a more cost-effective option, particularly for small businesses or individuals who may not have the resources or infrastructure for a wired network installation.

    Rate this question:

  • 3. 

    Which trace table is representative of the algorithm above immediately after the loop is executed for the second time?

    • A.

      Option 1

    • B.

      Option 2

    • C.

      Option 3

    • D.

      Option 4

    Correct Answer
    D. Option 4
    Explanation
    Many students selected the option that displayed the output at
    the end of the second loop. However, the algorithm provided
    only outputs the result of the total once all the values in the
    array have been added.

    Rate this question:

  • 4. 

    When analysing a new software solution, the developers identified the following non-functional requirement: ‘All users of the solution will be using their own mobile device.’ To which characteristic is the non-functional requirement related?

    • A.

      Reliability

    • B.

      Portability

    • C.

      Maintainability

    • D.

      User-friendliness

    Correct Answer
    B. Portability
    Explanation
    The non-functional requirement "All users of the solution will be using their own mobile device" is related to the characteristic of portability. Portability refers to the ability of a software solution to be easily moved or adapted to different environments or platforms. In this case, the requirement indicates that the solution should be able to run on different mobile devices, suggesting that it needs to be portable across various platforms and operating systems.

    Rate this question:

  • 5. 

    Saritha researched the different methods used to calculate whether an individual is within a healthy weight range. She chose to use the body mass index (BMI) method. Instead of entering values into a spreadsheet to calculate an individual’s BMI, she used her programming skills to write an application for mobile phones. Shown below is the user interface for the application that Saritha developed. It shows the BMI displayed when Jim, one of her classmates, entered his details into the application. The values for height and weight to calculate BMI need to be of which data types?

    • A.

      String and integer

    • B.

      Integer and string

    • C.

      Integer and integer

    • D.

      Floating point and floating point

    Correct Answer
    D. Floating point and floating point
    Explanation
    The values for height and weight need to be of floating point data types because BMI calculations involve decimal numbers. Using integer data types would result in inaccurate calculations and potentially incorrect BMI values.

    Rate this question:

  • 6. 

    Which one do you like?

    • A.

      Quick sort

    • B.

      Bubble sort

    • C.

      Linear search

    • D.

      . selection sort

    Correct Answer
    A. Quick sort
    Explanation
    Quick sort is likely the correct answer because it is a popular and efficient sorting algorithm. It works by selecting a pivot element, partitioning the array into two sub-arrays based on the pivot, and then recursively sorting the sub-arrays. Quick sort has an average time complexity of O(n log n), making it faster than bubble sort, linear search, and selection sort in most cases.

    Rate this question:

  • 7. 

    Which structural characteristic makes XML files distinguishable from other types of files?

    • A.

      Appropriate indentation

    • B.

      The use of comma or tab delimiters

    • C.

      The use of a standard library of tags

    • D.

      The inclusion of a header, prolog or declaration statement

    Correct Answer
    D. The inclusion of a header, prolog or declaration statement
    Explanation
    XML files are distinguishable from other types of files by the inclusion of a header, prolog, or declaration statement. This statement typically appears at the beginning of an XML file and provides information about the version of XML being used, as well as any character encoding or other specifications. This characteristic helps identify XML files and differentiate them from other file types that do not have this specific structure.

    Rate this question:

  • 8. 

    Which one do you like?

    • A.

      Reduce the number of user interfaces from six to three.

    • B.

      Ensure that contrast is maximised on each user interface.

    • C.

      Add alternative text to icons and images to meet the needs of a wider group of users.

    • D.

      Add a menu item that allows a user to access any section from any other section in the application.

    Correct Answer
    D. Add a menu item that allows a user to access any section from any other section in the application.
    Explanation
    The correct answer is to add a menu item that allows a user to access any section from any other section in the application. This is because it improves the overall usability and navigation of the application by providing a convenient and efficient way for users to move between different sections. It enhances the user experience by reducing the need to backtrack or go through multiple screens to access a specific section.

    Rate this question:

  • 9. 

    To function, the vast range of services that operate over the internet requires a library of technical and communication standards. The term for these technical and communication standards is

    • A.

      HTML.

    • B.

      Malware.

    • C.

      Monitors.

    • D.

      Protocols.

    Correct Answer
    D. Protocols.
    Explanation
    The question asks for the term that refers to the technical and communication standards required for the functioning of various internet services. The correct answer is "protocols." Protocols are a set of rules and guidelines that enable different devices and systems to communicate and interact with each other over the internet. They define how data is transmitted, received, and processed, ensuring seamless communication between different services and devices. HTML, malware, and monitors are not specifically related to the technical and communication standards required for internet services, making them incorrect choices.

    Rate this question:

  • 10. 

    Use the following information to answer Questions 10 and 11. Courtney is designing a new GPS-based traffic monitoring application for smartphones. As part of the design process, she has decided to generate some evaluation criteria and develop an evaluation strategy. Which one of the following is a criterion that Courtney could use to evaluate the efficiency of the GPS application?

    • A.

      The application will allow users to update traffic conditions.

    • B.

      The application will update real-time traffic conditions for users every five minutes.

    • C.

      The application will allow users to request directions between two or more destinations.

    • D.

      The application will generate and display directions within 10 seconds of the request from the user.

    Correct Answer
    D. The application will generate and display directions within 10 seconds of the request from the user.
    Explanation
    Courtney can use the criterion of generating and displaying directions within 10 seconds of the user's request to evaluate the efficiency of the GPS application. This criterion assesses the speed and responsiveness of the application in providing directions, which is an important aspect of efficiency for a GPS-based traffic monitoring application.

    Rate this question:

  • 11. 

    Courtney is researching how to develop an evaluation strategy for her new software solution. Key things that she should consider as she develops an evaluation strategy include

    • A.

      Software solution designs, functionality and usability testing, and how client feedback could be incorporated.

    • B.

      The software requirements specification (SRS), use case diagrams and how client feedback could be incorporated.

    • C.

      Project plan evaluation criteria, how the solution will be evaluated, adjustments to timeframes and why changes occurred.

    • D.

      Software solution evaluation criteria, how the criteria will be measured, appropriate timeframe for evaluation to occur and who will be involved in the evaluation process.

    Correct Answer
    D. Software solution evaluation criteria, how the criteria will be measured, appropriate timeframe for evaluation to occur and who will be involved in the evaluation process.
    Explanation
    Student responses varied considerably for this question.
    Evaluation strategies typically would not contain solution
    designs, testing approaches, use case diagrams or adjustments
    to project plans. Evaluation strategies typically contain criteria,
    how the criteria will be measured, when the evaluation will
    occur and who will be involved.

    Rate this question:

  • 12. 

    A programmer has been asked to improve the processing speed of a software solution. The solution reads data from a text file stored on a USB hard drive into RAM. Why is reading the data from RAM more efficient than reading the data from the file stored on the USB hard drive?

    • A.

      RAM is more cost-effective than USB hard drives.

    • B.

      RAM has faster read/write speeds than USB hard drives.

    • C.

      RAM generates significantly less heat than USB hard drives.

    • D.

      RAM is not affected by magnetic fields as USB hard drives are.

    Correct Answer
    B. RAM has faster read/write speeds than USB hard drives.
    Explanation
    Reading data from RAM is more efficient than reading data from a file stored on a USB hard drive because RAM has faster read/write speeds compared to USB hard drives. RAM allows for quicker access to data, reducing the time it takes for the software solution to process the data. USB hard drives, on the other hand, have slower read/write speeds, which can result in slower data retrieval and processing times.

    Rate this question:

  • 13. 

    Each member of an organisation needs a username and password to be able to access the organisation’s local area network (LAN). Each member is allocated a unique username but they can each choose their own password. An appropriate data structure to store the username and password for each member of the organisation is

    • A.

      A Boolean value.

    • B.

      A string value

    • C.

      An associative array

    • D.

      A one-dimensional array.

    Correct Answer
    C. An associative array
    Explanation
    An associative array is the most appropriate data structure to store the username and password for each member of the organization. This is because an associative array allows for a key-value pair relationship, where the username can serve as the key and the password as the corresponding value. This allows for easy retrieval and storage of the username-password pairs for each member.

    Rate this question:

  • 14. 

    What is the output generated by the pseudocode?

    • A.

      6,15

    • B.

      6,16

    • C.

      5,15

    • D.

      15,5

    Correct Answer
    A. 6,15
    Explanation
    Many students did not trace the variables through the algorithm
    correctly when answering this question, seemingly missing the
    second increment of the x-variable.

    Rate this question:

  • 15. 

    Which control structure starts on line 4 and finishes on line 6?

    • A.

      Infinite

    • B.

      Iteration

    • C.

      Selection

    • D.

      Sequence

    Correct Answer
    C. Selection
    Explanation
    Student responses varied considerably between the three main
    processing features of a programming language. Given that the
    algorithm’s ‘if’ statement is on line 4 and the corresponding ‘end
    if’ is on line 6, Option C. is the only possible answer

    Rate this question:

  • 16. 

    Use the following information to answer Questions 16 and 17. A social media platform tracks all user interactions on the platform. This includes user posts, mouse clicks, image and video views, and messages exchanged between users. This data is used to deliver targeted advertising to users and it is summarised to make changes to the platform. For the social media platform, the data used to deliver targeted advertising is considered to be

    • A.

      An input to the advertising module.

    • B.

      An output from the advertising module

    • C.

      Both an input to and an output from the advertising module

    • D.

      Neither an input to nor an output from the advertising module

    Correct Answer
    A. An input to the advertising module.
    Explanation
    The given correct answer is "an input to the advertising module." This means that the data used to deliver targeted advertising on the social media platform is considered as an input to the advertising module. This implies that the advertising module relies on this data to determine which ads to show to users based on their interactions on the platform.

    Rate this question:

  • 17. 

    For the social media platform, tracking user interactions and summarising the data to make changes to the platform is an example of

    • A.

      Data mining.

    • B.

      Data searching.

    • C.

      Data protection.

    • D.

      Data extensions.

    Correct Answer
    A. Data mining.
    Explanation
    Tracking user interactions and summarizing the data to make changes to the platform is an example of data mining. Data mining involves analyzing large sets of data to discover patterns, relationships, and insights that can be used to make informed decisions and improvements. In this case, the platform is using the data collected from user interactions to gain valuable insights and make changes that enhance the user experience or optimize the platform's performance.

    Rate this question:

  • 18. 

    After repeated downtime events, the network administrators of a large supermarket chain have contracted a network security analyst to identify the cause of the downtime events. The analyst starts the investigation by implementing a network monitoring tool that will record network traffic and interactions between users on the network. What is this approach commonly known as?

    • A.

      Implementing a firewall

    • B.

      Setting up a honeypot

    • C.

      Auditing network logs

    • D.

      Installing anti-malware protections

    Correct Answer
    C. Auditing network logs
    Explanation
    The approach commonly known as auditing network logs involves analyzing and reviewing the recorded network traffic and interactions between users on the network. This process helps identify any anomalies or suspicious activities that may be causing the downtime events. By examining the network logs, the network security analyst can gain insights into the root cause of the downtime events and take appropriate measures to prevent them in the future.

    Rate this question:

  • 19. 

    The progress of this project has been recorded using

    • A.

      Annotations and adjustments.

    • B.

      Progress journals.

    • C.

      Change logs.

    • D.

      SRS.

    Correct Answer
    A. Annotations and adjustments.
    Explanation
    The progress of the project has been recorded using annotations and adjustments. This suggests that the project's progress has been documented by making notes and making necessary changes or modifications as needed. Annotations and adjustments provide a way to track the project's development and ensure that any necessary revisions are made to improve its outcome. This method allows for a dynamic approach to monitoring progress and making necessary modifications along the way.

    Rate this question:

  • 20. 

    Dependencies are indicated

    • A.

      Using arrows

    • B.

      By shading cells.

    • C.

      In the ‘Task’ column.

    • D.

      In the ‘Duration (weeks)’ column.

    Correct Answer
    A. Using arrows
    Explanation
    The correct answer is using arrows because arrows are commonly used to indicate dependencies between tasks in project management. By using arrows, it becomes clear which tasks are dependent on others and in what sequence they need to be completed. This helps in planning and scheduling the project effectively, ensuring that tasks are executed in the correct order to avoid delays or issues.

    Rate this question:

  • 21. 

    In a Gantt chart, the completion of hardware installation is often a milestone in a project. A milestone shows that

    • A.

      A major delay in a project has been avoided.

    • B.

      A major point in a project has been reached.

    • C.

      A dependency in a project has been completed.

    • D.

      No further work can happen until another task is complete.

    Correct Answer
    B. A major point in a project has been reached.
    Explanation
    A milestone in a Gantt chart represents a significant point in a project that has been reached. It indicates the completion of a major task or achievement that marks progress in the project. It does not necessarily imply a delay, a dependency, or the need for another task to be completed before further work can happen. Instead, it signifies a significant milestone or accomplishment in the project's timeline.

    Rate this question:

  • 22. 

    Which one of the following is an example of a non-functional requirement for an online ordering system?

    • A.

      Use case diagrams must be drawn for each function.

    • B.

      Display to the user the number of records in a database.

    • C.

      Online ordering must be available 24 hours a day, seven days a week.

    • D.

      Automated emails should be sent within 12 hours of receiving an online order

    Correct Answer
    C. Online ordering must be available 24 hours a day, seven days a week.
    Explanation
    Many students selected use case diagrams to be
    drawn as an example of a non-functional
    requirement. However, a non-functional
    requirement describes the attributes the solution
    should possess. Option C, which states that
    online ordering must be available 24 hours a day,
    seven days a week, does this.

    Rate this question:

  • 23. 

    Storing client data only on an external hard disk drive at the end of the financial year is a form of

    • A.

      File disposal.

    • B.

      Data security.

    • C.

      Archiving data for future use.

    • D.

      Back up in case the data is corrupted.

    Correct Answer
    C. Archiving data for future use.
    Explanation
    Storing client data only on an external hard disk drive at the end of the financial year is considered archiving data for future use. Archiving involves preserving data in a secure and accessible manner for long-term storage and potential retrieval. By storing the client data on an external hard disk drive, it ensures that the information is safely retained and can be accessed when needed in the future. This practice helps in maintaining historical records and complying with legal or regulatory requirements.

    Rate this question:

  • 24. 

    Jack is writing a software solution that will produce an invoice. The software solution regularly accesses a section of code that calculates the goods and services tax (GST) payable on each item. This processing feature is referred to as

    • A.

      A method.

    • B.

      A function.

    • C.

      A calculation

    • D.

      An instruction.

    Correct Answer
    B. A function.
    Explanation
    The software solution regularly accesses a section of code that calculates the goods and services tax (GST) payable on each item. This indicates that the processing feature is a specific block of code that performs a specific task, which aligns with the definition of a function in programming. A function is a self-contained block of code that can be called and executed whenever needed, making it the most appropriate choice for this scenario.

    Rate this question:

  • 25. 

    How many times is the loop executed?

    • A.

      Four times

    • B.

      Five times

    • C.

      Six times

    • D.

      Seven times

    Correct Answer
    B. Five times
    Explanation
    The loop is executed five times because the given answer states "five times".

    Rate this question:

  • 26. 

    Use the following information to answer Questions 26 and 27. The pseudocode below will take the current values in the array and then write the new values into the array. Begin     Array[] = [3, 5, 0, 0, 0] //Initialise the array, index starts at 1     A = Array[1]     B = Array[2]     While B < 3 * A         C = A * B         A = A - 1         B = B + 2     EndWhile //Write new values into the array     Array[1] = A     Array[2] = B     Array[3] = C End Which array has the correct values after the pseudocode has been executed?

    • A.

      Array = [1, 9, 9, 0, 0]

    • B.

      Array = [2, 7, 14, 0, 0]

    • C.

      Array = [3, 5, 15, 0, 0]

    • D.

      Array = [2, 7, 15, 0, 0]

    Correct Answer
    D. Array = [2, 7, 15, 0, 0]
    Explanation
    The pseudocode initializes the array with the values [3, 5, 0, 0, 0]. It then assigns A as the value at index 1 of the array (which is 3) and B as the value at index 2 of the array (which is 5). The while loop runs as long as B is less than 3 times A. In each iteration of the loop, C is assigned the value of A multiplied by B, A is decremented by 1, and B is incremented by 2. After the loop ends, the new values of A, B, and C are written back into the array at their respective indices. Therefore, the correct array after the pseudocode is executed is [2, 7, 15, 0, 0].

    Rate this question:

  • 27. 

    Which control structure is used in the pseudocode?

    • A.

      Iteration

    • B.

      Selection

    • C.

      Function

    • D.

      Internal documentation

    Correct Answer
    A. Iteration
    Explanation
    The correct answer is "iteration" because iteration is a control structure that allows a set of instructions to be repeated multiple times based on a certain condition. It is commonly used in programming to execute a block of code repeatedly until a specific condition is met. In the context of pseudocode, iteration is used to represent loops or repetitive actions in an algorithm or program.

    Rate this question:

  • 28. 

    Huy is writing a software solution to support administrative staff in a school. The software solution must store details about each student in the school. The most appropriate data structure to store a student’s first name, last name, date of birth, home address and telephone number is

    • A.

      A string.

    • B.

      An array

    • C.

      A record.

    • D.

      A two-dimensional array

    Correct Answer
    C. A record.
    Explanation
    A record is the most appropriate data structure to store a student's first name, last name, date of birth, home address, and telephone number. A record allows for the grouping of related data fields into a single entity, making it easier to manage and access the student's information. It provides a structured way to store and retrieve the different attributes of a student, ensuring that the data is organized and can be easily accessed when needed. A record also allows for efficient searching and sorting of the student's information based on different criteria.

    Rate this question:

  • 29. 

    A local IT business has installed a home network for Maria. Maria asked the technician if she needed to set up encryption on the wi-fi router or whether the firewall would offer enough protection. Which one of the following would be the most appropriate response from the technician?

    • A.

      Up-to-date virus protection should be enough to keep out unwanted interference.

    • B.

      Encryption does the same job as a firewall, so using both would only slow down network traffic.

    • C.

      The firewall would be enough to protect the home network from intruders reading passwords and data if they gained unauthorised access to the network.

    • D.

      Encryption protects the data traffic in the home network by making it unreadable to unauthorised scanning. The firewall mainly protects the network by scanning incoming packets, so it would be advisable to have both.

    Correct Answer
    D. Encryption protects the data traffic in the home network by making it unreadable to unauthorised scanning. The firewall mainly protects the network by scanning incoming packets, so it would be advisable to have both.
    Explanation
    The technician explains that encryption is necessary to protect the data traffic in the home network by making it unreadable to unauthorized scanning. On the other hand, the firewall primarily protects the network by scanning incoming packets. Therefore, it is advisable to have both encryption and a firewall to ensure comprehensive protection for the home network.

    Rate this question:

  • 30. 

    Use the following information to answer Questions 30 and 31. Frankie copies his completed programming folio from a school computer’s hard drive onto a USB flash drive. Two days later, Frankie returns to the computer only to find that his folio has been deleted from the hard drive. Which procedure for managing files was Frankie following?

    • A.

      Backup

    • B.

      Archiving

    • C.

      Duplicating

    • D.

      Redundancy

    Correct Answer
    A. Backup
    Explanation
    Frankie was following the procedure of backup. Backup refers to creating copies of files or data in order to protect against loss or damage. In this case, Frankie copied his programming folio from the computer's hard drive onto a USB flash drive, which serves as a backup copy. This allows Frankie to have a duplicate of his folio in case the original files are lost or deleted from the hard drive.

    Rate this question:

  • 31. 

    Frankie’s teacher reminds him that his folio is to be submitted that day. Which is the most appropriate way for Frankie to submit his folio?

    • A.

      Give the teacher the USB flash drive.

    • B.

      Copy his files back onto the school computer’s hard drive.

    • C.

      Copy his files onto another USB flash drive and submit that USB flash drive.

    • D.

      Copy his files onto the school computer’s hard drive and submit his USB flash drive.

    Correct Answer
    C. Copy his files onto another USB flash drive and submit that USB flash drive.
  • 32. 

    Sophia works at a gym that operates for 24 hours a day, seven days a week. Each gym member is given an identification (ID) number that is used to unlock the gym door between 9 pm and 6 am. Sophia has designed an algorithm that can check each ID against a list of valid numbers. Which one of the following validation techniques has Sophia used?

    • A.

      Type check

    • B.

      Check digit

    • C.

      Range check

    • D.

      Existence check

    Correct Answer
    C. Range check
    Explanation
    Many students selected existence check as the
    validation check. Existence checks are used to
    see if data is entered, not if data exists in a list.
    Option C, range check, is the validation
    technique used to check against a list of valid ID
    numbers.

    Rate this question:

  • 33. 

    In an attempt to help not-for-profit organisations clarify their obligations with regard to privacy legislation, the Australian Government has provided a range of scenarios on its website. Which one of the following organisations would be exempt from the Australian Privacy Principles?

    • A.

      Organisation A earns $120 000 in revenue and collects the names and addresses of team participants for a local fun run.

    • B.

      Organisation B has a turnover below the government threshold. It collects information from homeless youth and provides their contact details to local health services and legal aid centres.

    • C.

      Organisation C has a turnover that is less than $3 million. To maintain its income, the organisation has entered into a sponsorship deal and, as part of that sponsorship deal, it shares its customer list with the sponsor

    • D.

      Organisation D provides childcare services and activities. Its turnover is less than the government’s designated minimum, and it collects, uses and stores information about children’s allergies, disabilities and medical needs. Parental payments are reported to the federal government.

    Correct Answer
    A. Organisation A earns $120 000 in revenue and collects the names and addresses of team participants for a local fun run.
    Explanation
    Option A is the only answer that satisfies the
    collection of solicited personal information. The
    personal information collected is used for, or is
    directly related to, the organisation’s activities.

    Rate this question:

  • 34. 

    A new software solution is being created for handheld devices. The requirements of the solution include that it be easy to use, must be able to work offline, but can occasionally connect for updates, and that any data required is stored on the device. Which type of modern application architecture would be the most appropriate?

    • A.

      Mobile applications

    • B.

      Internet applications

    • C.

      Rich client applications

    • D.

      Peer-to-peer applications

    Correct Answer
    A. Mobile applications
    Explanation
    A mobile application architecture would be the most appropriate for this scenario because it is specifically designed for handheld devices. Mobile applications are developed to be user-friendly, can work offline, and can connect to the internet for updates. Additionally, mobile applications store data on the device, which aligns with the requirement mentioned in the question.

    Rate this question:

  • 35. 

    Maddie is setting up a file of records that need to be shared with a range of people with different operating systems and applications. Jono has suggested that she consider setting it up as an XML file. What is the key reason why Jono has suggested that an XML file should be considered?

    • A.

      It can be displayed as a web page.

    • B.

      It provides a common structure for sharing data between applications.

    • C.

      It is difficult to modify, so people will not be able to edit the file or lose data.

    • D.

      It requires the same tags in each record, so the structure will be easy to read and to follow.

    Correct Answer
    B. It provides a common structure for sharing data between applications.
    Explanation
    Jono has suggested using an XML file because it provides a common structure for sharing data between applications. XML allows for standardized formatting and organization of data, making it easier for different operating systems and applications to interpret and use the information. This ensures that the data can be easily shared and accessed by a range of people with different systems and applications, promoting interoperability and efficiency.

    Rate this question:

  • 36. 

    How many comparisons need to occur to find the name ‘Vinnie’ in the array?

    • A.

      3

    • B.

      4

    • C.

      7

    • D.

      17

    Correct Answer
    B. 4
    Explanation
    To find the name 'Vinnie' in the array, a total of 4 comparisons need to occur. This means that the algorithm will compare 'Vinnie' with 4 other names in the array before finding a match.

    Rate this question:

  • 37. 

    Pierre has almost finished the development of a software solution for a client and has undertaken a range of tests. He knows he must also conduct usability testing. Which one of the following statements best outlines usability testing?

    • A.

      After the software solution is in place, survey the users, identify any concerns and modify the software solution as required.

    • B.

      Construct a testing table with expected results, test the software solution, document the actual results and modify the software solution as required.

    • C.

      Plan a set of tests for users to perform prior to implementation of the software solution, record the results and make any necessary modifications to the software solution after the tests.

    • D.

      Show users two alternative mock-ups and ask them to consider the mock-ups and comment on the mock-ups, then modify the mock-ups as required.

    Correct Answer
    C. Plan a set of tests for users to perform prior to implementation of the software solution, record the results and make any necessary modifications to the software solution after the tests.
    Explanation
    Usability testing involves planning a set of tests for users to perform before implementing the software solution. The results of these tests are recorded, and any necessary modifications to the software solution are made based on the feedback received from the users. This process ensures that the software solution is user-friendly and meets the needs and expectations of the users.

    Rate this question:

  • 38. 

    A large computer game development company has developed a number of apps. It stores data about users of these apps in a number of databases. The company regularly reviews this data to identify patterns and to make decisions about the next game to develop or what advertising to promote in the apps. This practice is referred to as

    • A.

      Data mining.

    • B.

      Source data.

    • C.

      Data validation.

    • D.

      Analysis of primary and secondary data.

    Correct Answer
    A. Data mining.
    Explanation
    The practice described in the question involves reviewing data about users of apps in order to identify patterns and make decisions about game development and advertising. This process is commonly known as data mining. Data mining involves analyzing large sets of data to discover patterns, relationships, and insights that can be used for decision-making purposes. In this case, the company is using data mining to inform their decisions about game development and advertising strategies based on the patterns they identify in the data about their app users.

    Rate this question:

  • 39. 

    Aditya has a blog that helps gamers with hacks. The blog has over a thousand subscribers. Each subscriber provides general contact details, including email addresses, when they subscribe. Aditya has had a marketing company contact him and request access to his database. The marketing company will identify the interests of the subscribers and provide targeted advertisements that Aditya can add to his emails. He agrees and will be paid for the service. Aditya has been emailing his subscribers once a week and now includes the targeted advertising. Some of his subscribers have started to complain; one even suggested that Aditya was breaking the law. Which legislation is Aditya’s subscriber referring to when suggesting that Aditya was breaking the law?

    • A.

      Spam Act 2003

    • B.

      Privacy Act 1988

    • C.

      Copyright Act 1968

    • D.

      Privacy and Data Protection Act 2014

    Correct Answer
    B. Privacy Act 1988
    Explanation
    Many students selected the Spam Act, however,
    as the organisation shared private data it may be
    breaching the Privacy Act.

    Rate this question:

  • 40. 

    One method of representing a software design is using a data dictionary, which

    • A.

      Contains the data used in the software solution.

    • B.

      Defines all the variables used in the software solution.

    • C.

      Defines each data element, including name, description, type and format.

    • D.

      Shows the mock-up of all data entry screens for a software solution, with data elements identified.

    Correct Answer
    C. Defines each data element, including name, description, type and format.
    Explanation
    A data dictionary is a method of representing a software design that defines each data element used in the software solution. It includes important information such as the name, description, type, and format of each data element. This allows developers and other stakeholders to have a clear understanding of the data being used in the software solution, ensuring consistency and accuracy in its implementation.

    Rate this question:

  • 41. 

    A program stores the following data in memory:             “Johan”, “Symonds”, 25, 3.24, FALSE The most appropriate data structure to store it is

    • A.

      ​​​​​​​a one-dimensional array.

    • B.

      An associative array.

    • C.

      ​​​​​​​a record.

    • D.

      A string.

    Correct Answer
    C. ​​​​​​​a record.
    Explanation
    A record holds data of different data types.

    Rate this question:

  • 42. 

    Daniel created a new screen for an existing application. Which of the following would allow him to evaluate his solution?

    • A.

      Prevent users from entering incorrect data in the new screen.

    • B.

      Reviewing the documentation of the old system.

    • C.

      Checking the error logs of the new solution.

    • D.

      Entering dummy data into a new screen.

    Correct Answer
    C. Checking the error logs of the new solution.
    Explanation
    Error logs provide valuable data for evaluation.

    Rate this question:

  • 43. 

    Kerri wrote the following statement: All calculations must be 100% correct. This is an example of

    • A.

      A constraint.

    • B.

      An evaluation criterion.

    • C.

      A functional requirement.

    • D.

      An element outside the scope of the project

    Correct Answer
    B. An evaluation criterion.
    Explanation
    This is a statement that can be evaluated.

    Rate this question:

  • 44. 

    Which of the following statements is correct regarding Use Case Diagrams?

    • A.

      Actors always initiate Use Cases.

    • B.

      An Actor must always be a person.

    • C.

      An “extends” Use Case must always be performed when the base case is.

    • D.

      An “includes” Use Case must always be performed when the base case is.

    Correct Answer
    D. An “includes” Use Case must always be performed when the base case is.
    Explanation
    Definition.

    Rate this question:

  • 45. 

    Which of the following statements best describes a Waterfall development model?

    • A.

      Each stage must be fully completed before continuing to the next stage.

    • B.

      Each stage can only be revisited after evaluation is complete.

    • C.

      Each stage can be revisited once the next stage is complete.

    • D.

      A Gantt chart cannot be used to display a Waterfall model.

    Correct Answer
    A. Each stage must be fully completed before continuing to the next stage.
    Explanation
    In a waterfall development model, you do not go back to a previous stage.

    Rate this question:

  • 46. 

    Which of the following statements is true regarding the critical path?

    • A.

      Any task whose delay will delay the following task is on the critical path.

    • B.

      Any task whose delay will delay the overall project is on the critical path.

    • C.

      Only tasks with dependencies can be on the critical path.

    • D.

      All tasks in a project are on the critical path.

    Correct Answer
    B. Any task whose delay will delay the overall project is on the critical path.
    Explanation
    Definition.

    Rate this question:

  • 47. 

    The purpose of a Use Case Diagram is to show the relationship between

    • A.

      Different users.

    • B.

      Users and data.

    • C.

      Data and system processes.

    • D.

      Users and system processes.

    Correct Answer
    D. Users and system processes.
    Explanation
    The UCD is designed to show how users interact with the system.

    Rate this question:

  • 48. 

    A developer has been asked to complete a Software Requirements Specification for a new mobile banking application. Which of these should be included in the SRS?

    • A.

      Evaluation criteria for the new system.

    • B.

      Non-functional requirements for the new system.

    • C.

      Documentation about how to use the new system.

    • D.

      Tests that should be carried out on the new system.

    Correct Answer
    B. Non-functional requirements for the new system.
    Explanation
    C and D part of development.

    Rate this question:

  • 49. 

    Many businesses provide a safe and secure way for more people to access work network systems from home. This secure connection is called

    • A.

      A virtual private network.

    • B.

      A peer-to-peer network.

    • C.

      The Internet.

    • D.

      An intranet.

    Correct Answer
    A. A virtual private network.
    Explanation
    The internet is usually the pathway through which a VPN would operate, and the VPN allows access to an intranet.
    However, it is the VPN which creates the secure connection.

    Rate this question:

  • 50. 

    Simone is writing a software solution that summarises the daily sales for a food truck store. She must read through the sales file one line at a time. The most appropriate control structure for this process would be

    • A.

      An iteration.

    • B.

      A statement.

    • C.

      A selection.

    • D.

      An array.

    Correct Answer
    A. An iteration.
    Explanation
    Iteration allows looping through code, in this case reading one line from the file at a time.

    Rate this question:

Related Topics

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.