Software development is the process of conceiving, specifying, designing, programming, documenting, testing, and bug fixing involved in creating and maintaining applications, frameworks, or other software components.
If you think you are a smart software developer, you have to pass this test!
More reliable data transmission
Less expensive set-up costs
Slower data transfer rates
Increased data security
Rate this question:
Option 1
Option 2
Option 3
Option 4
Rate this question:
Reliability
Portability
Maintainability
User-friendliness
Rate this question:
String and integer
Integer and string
Integer and integer
Floating point and floating point
Rate this question:
Quick sort
Bubble sort
Linear search
. selection sort
Rate this question:
Appropriate indentation
The use of comma or tab delimiters
The use of a standard library of tags
The inclusion of a header, prolog or declaration statement
Rate this question:
Reduce the number of user interfaces from six to three.
Ensure that contrast is maximised on each user interface.
Add alternative text to icons and images to meet the needs of a wider group of users.
Add a menu item that allows a user to access any section from any other section in the application.
Rate this question:
HTML.
Malware.
Monitors.
Protocols.
Rate this question:
The application will allow users to update traffic conditions.
The application will update real-time traffic conditions for users every five minutes.
The application will allow users to request directions between two or more destinations.
The application will generate and display directions within 10 seconds of the request from the user.
Rate this question:
Software solution designs, functionality and usability testing, and how client feedback could be incorporated.
The software requirements specification (SRS), use case diagrams and how client feedback could be incorporated.
Project plan evaluation criteria, how the solution will be evaluated, adjustments to timeframes and why changes occurred.
Software solution evaluation criteria, how the criteria will be measured, appropriate timeframe for evaluation to occur and who will be involved in the evaluation process.
Rate this question:
RAM is more cost-effective than USB hard drives.
RAM has faster read/write speeds than USB hard drives.
RAM generates significantly less heat than USB hard drives.
RAM is not affected by magnetic fields as USB hard drives are.
Rate this question:
A Boolean value.
A string value
An associative array
A one-dimensional array.
Rate this question:
6,15
6,16
5,15
15,5
Rate this question:
Infinite
Iteration
Selection
Sequence
Rate this question:
An input to the advertising module.
An output from the advertising module
Both an input to and an output from the advertising module
Neither an input to nor an output from the advertising module
Rate this question:
Data mining.
Data searching.
Data protection.
Data extensions.
Rate this question:
Implementing a firewall
Setting up a honeypot
Auditing network logs
Installing anti-malware protections
Rate this question:
Annotations and adjustments.
Progress journals.
Change logs.
SRS.
Rate this question:
Using arrows
By shading cells.
In the ‘Task’ column.
In the ‘Duration (weeks)’ column.
Rate this question:
A major delay in a project has been avoided.
A major point in a project has been reached.
A dependency in a project has been completed.
No further work can happen until another task is complete.
Rate this question:
Use case diagrams must be drawn for each function.
Display to the user the number of records in a database.
Online ordering must be available 24 hours a day, seven days a week.
Automated emails should be sent within 12 hours of receiving an online order
Rate this question:
File disposal.
Data security.
Archiving data for future use.
Back up in case the data is corrupted.
Rate this question:
A method.
A function.
A calculation
An instruction.
Rate this question:
Four times
Five times
Six times
Seven times
Rate this question:
Array = [1, 9, 9, 0, 0]
Array = [2, 7, 14, 0, 0]
Array = [3, 5, 15, 0, 0]
Array = [2, 7, 15, 0, 0]
Rate this question:
Iteration
Selection
Function
Internal documentation
Rate this question:
A string.
An array
A record.
A two-dimensional array
Rate this question:
Up-to-date virus protection should be enough to keep out unwanted interference.
Encryption does the same job as a firewall, so using both would only slow down network traffic.
The firewall would be enough to protect the home network from intruders reading passwords and data if they gained unauthorised access to the network.
Encryption protects the data traffic in the home network by making it unreadable to unauthorised scanning. The firewall mainly protects the network by scanning incoming packets, so it would be advisable to have both.
Rate this question:
Backup
Archiving
Duplicating
Redundancy
Rate this question:
Give the teacher the USB flash drive.
Copy his files back onto the school computer’s hard drive.
Copy his files onto another USB flash drive and submit that USB flash drive.
Copy his files onto the school computer’s hard drive and submit his USB flash drive.
Type check
Check digit
Range check
Existence check
Rate this question:
Organisation A earns $120 000 in revenue and collects the names and addresses of team participants for a local fun run.
Organisation B has a turnover below the government threshold. It collects information from homeless youth and provides their contact details to local health services and legal aid centres.
Organisation C has a turnover that is less than $3 million. To maintain its income, the organisation has entered into a sponsorship deal and, as part of that sponsorship deal, it shares its customer list with the sponsor
Organisation D provides childcare services and activities. Its turnover is less than the government’s designated minimum, and it collects, uses and stores information about children’s allergies, disabilities and medical needs. Parental payments are reported to the federal government.
Rate this question:
Mobile applications
Internet applications
Rich client applications
Peer-to-peer applications
Rate this question:
It can be displayed as a web page.
It provides a common structure for sharing data between applications.
It is difficult to modify, so people will not be able to edit the file or lose data.
It requires the same tags in each record, so the structure will be easy to read and to follow.
Rate this question:
3
4
7
17
Rate this question:
After the software solution is in place, survey the users, identify any concerns and modify the software solution as required.
Construct a testing table with expected results, test the software solution, document the actual results and modify the software solution as required.
Plan a set of tests for users to perform prior to implementation of the software solution, record the results and make any necessary modifications to the software solution after the tests.
Show users two alternative mock-ups and ask them to consider the mock-ups and comment on the mock-ups, then modify the mock-ups as required.
Rate this question:
Data mining.
Source data.
Data validation.
Analysis of primary and secondary data.
Rate this question:
Spam Act 2003
Privacy Act 1988
Copyright Act 1968
Privacy and Data Protection Act 2014
Rate this question:
Contains the data used in the software solution.
Defines all the variables used in the software solution.
Defines each data element, including name, description, type and format.
Shows the mock-up of all data entry screens for a software solution, with data elements identified.
Rate this question:
​​​​​​​a one-dimensional array.
An associative array.
​​​​​​​a record.
A string.
Rate this question:
Prevent users from entering incorrect data in the new screen.
Reviewing the documentation of the old system.
Checking the error logs of the new solution.
Entering dummy data into a new screen.
Rate this question:
A constraint.
An evaluation criterion.
A functional requirement.
An element outside the scope of the project
Rate this question:
Actors always initiate Use Cases.
An Actor must always be a person.
An “extends” Use Case must always be performed when the base case is.
An “includes” Use Case must always be performed when the base case is.
Rate this question:
Each stage must be fully completed before continuing to the next stage.
Each stage can only be revisited after evaluation is complete.
Each stage can be revisited once the next stage is complete.
A Gantt chart cannot be used to display a Waterfall model.
Rate this question:
Any task whose delay will delay the following task is on the critical path.
Any task whose delay will delay the overall project is on the critical path.
Only tasks with dependencies can be on the critical path.
All tasks in a project are on the critical path.
Rate this question:
Different users.
Users and data.
Data and system processes.
Users and system processes.
Rate this question:
Evaluation criteria for the new system.
Non-functional requirements for the new system.
Documentation about how to use the new system.
Tests that should be carried out on the new system.
Rate this question:
A virtual private network.
A peer-to-peer network.
The Internet.
An intranet.
Rate this question:
Quiz Review Timeline (Updated): Mar 21, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.