Software development is the process of conceiving, specifying, designing, programming, documenting, testing, and bug fixing involved in creating and maintaining applications, frameworks, or other software components.
If you think you are a smart software developer, you have to pass this test!
3
5
6
10
Rate this question:
String and integer
Integer and string
Integer and integer
Floating point and floating point
Rate this question:
RAM is more cost-effective than USB hard drives.
RAM has faster read/write speeds than USB hard drives.
RAM generates significantly less heat than USB hard drives.
RAM is not affected by magnetic fields as USB hard drives are.
Rate this question:
Data mining.
Data searching.
Data protection.
Data extensions.
Rate this question:
It can be displayed as a web page.
It provides a common structure for sharing data between applications.
It is difficult to modify, so people will not be able to edit the file or lose data.
It requires the same tags in each record, so the structure will be easy to read and to follow.
Rate this question:
​​​​​​​a one-dimensional array.
An associative array.
​​​​​​​a record.
A string.
Rate this question:
Option 1
Option 2
Option 3
Option 4
Age >= 18 and (hours >= 120 or nightHours >= 20)
(age >= 18 and nightHours >= 20) or hours >= 120
Age >= 18 and hours >= 120 and nightHours >= 20
Age >= 18 or (hours >= 120 and nightHours >= 20)
Rate this question:
Privacy and Data Protection Act 2014.
Privacy Act 1988.
Copyright Act 1968.
Health Records Act 2001.
Rate this question:
VPN
HTML
HTTPS
FTP/IP
Rate this question:
Using arrows
By shading cells.
In the ‘Task’ column.
In the ‘Duration (weeks)’ column.
Rate this question:
A major delay in a project has been avoided.
A major point in a project has been reached.
A dependency in a project has been completed.
No further work can happen until another task is complete.
Rate this question:
Iteration
Selection
Function
Internal documentation
Rate this question:
3
4
7
17
Rate this question:
Data mining.
Source data.
Data validation.
Analysis of primary and secondary data.
Rate this question:
Each stage must be fully completed before continuing to the next stage.
Each stage can only be revisited after evaluation is complete.
Each stage can be revisited once the next stage is complete.
A Gantt chart cannot be used to display a Waterfall model.
Rate this question:
She is making a backup of the old file.
She is implementing version control.
She did not make any changes.
She has a new computer.
Rate this question:
HTML.
Malware.
Monitors.
Protocols.
Rate this question:
A method.
A function.
A calculation
An instruction.
Rate this question:
An iteration.
A statement.
A selection.
An array.
Rate this question:
Archiving.
Efficiency.
File disposal.
Data security.
Rate this question:
Option 1
Option 2
Option 3
Option 4
Rate this question:
Up-to-date virus protection should be enough to keep out unwanted interference.
Encryption does the same job as a firewall, so using both would only slow down network traffic.
The firewall would be enough to protect the home network from intruders reading passwords and data if they gained unauthorised access to the network.
Encryption protects the data traffic in the home network by making it unreadable to unauthorised scanning. The firewall mainly protects the network by scanning incoming packets, so it would be advisable to have both.
Rate this question:
Backup
Archiving
Duplicating
Redundancy
Rate this question:
Contains the data used in the software solution.
Defines all the variables used in the software solution.
Defines each data element, including name, description, type and format.
Shows the mock-up of all data entry screens for a software solution, with data elements identified.
Rate this question:
A virtual private network.
A peer-to-peer network.
The Internet.
An intranet.
Rate this question:
Array = [8, 12, 10, 16, 10]
Array = [2, 2, -4, 0, -6]
​​​​​​​Array = [2, 2, 4, 0, 6]
Array = [5, 7, 7, 8, 8]
Rate this question:
The end of the project
The midpoint of the project
A significant part has just finished
A significant part is about to begin.
Rate this question:
6,15
6,16
5,15
15,5
Rate this question:
An input to the advertising module.
An output from the advertising module
Both an input to and an output from the advertising module
Neither an input to nor an output from the advertising module
Rate this question:
Use case diagrams must be drawn for each function.
Display to the user the number of records in a database.
Online ordering must be available 24 hours a day, seven days a week.
Automated emails should be sent within 12 hours of receiving an online order
Rate this question:
Array = [1, 9, 9, 0, 0]
Array = [2, 7, 14, 0, 0]
Array = [3, 5, 15, 0, 0]
Array = [2, 7, 15, 0, 0]
Rate this question:
More reliable data transmission
Less expensive set-up costs
Slower data transfer rates
Increased data security
Rate this question:
A spam attack.
A phishing attack.
An SQL injection attack.
A cross-site scripting attack.
Rate this question:
The application will allow users to update traffic conditions.
The application will update real-time traffic conditions for users every five minutes.
The application will allow users to request directions between two or more destinations.
The application will generate and display directions within 10 seconds of the request from the user.
Rate this question:
Implementing a firewall
Setting up a honeypot
Auditing network logs
Installing anti-malware protections
Rate this question:
A string.
An array
A record.
A two-dimensional array
Rate this question:
6, 6, 4
7, 5, 8
12, 12, 7
14, 13, 8
Rate this question:
Reduce the number of user interfaces from six to three.
Ensure that contrast is maximised on each user interface.
Add alternative text to icons and images to meet the needs of a wider group of users.
Add a menu item that allows a user to access any section from any other section in the application.
Rate this question:
A Boolean value.
A string value
An associative array
A one-dimensional array.
Rate this question:
Four times
Five times
Six times
Seven times
Rate this question:
Mobile applications
Internet applications
Rich client applications
Peer-to-peer applications
Rate this question:
Annotations and adjustments.
Progress journals.
Change logs.
SRS.
Rate this question:
Spam Act 2003
Privacy Act 1988
Copyright Act 1968
Privacy and Data Protection Act 2014
Rate this question:
Any task whose delay will delay the following task is on the critical path.
Any task whose delay will delay the overall project is on the critical path.
Only tasks with dependencies can be on the critical path.
All tasks in a project are on the critical path.
Rate this question:
ArResult[counter] ß modulus(arOne[counter], arTwo[counter])
ArResult[counter] ß maximum(arOne[counter], arTwo[counter])
ArResult[counter] ß difference(arOne[counter], arTwo[counter])
ArResult[counter] ß absoluteDiff(arOne[counter], arTwo[counter])
Rate this question:
Reliability
Portability
Maintainability
User-friendliness
Rate this question:
Software solution designs, functionality and usability testing, and how client feedback could be incorporated.
The software requirements specification (SRS), use case diagrams and how client feedback could be incorporated.
Project plan evaluation criteria, how the solution will be evaluated, adjustments to timeframes and why changes occurred.
Software solution evaluation criteria, how the criteria will be measured, appropriate timeframe for evaluation to occur and who will be involved in the evaluation process.
Rate this question:
Quiz Review Timeline (Updated): Mar 21, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.