Every Software Developer Should Pass This Test!

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Catherine Halcomb
Catherine Halcomb
Community Contributor
Quizzes Created: 1443 | Total Attempts: 6,714,021
| Attempts: 334 | Questions: 70
Please wait...
Question 1 / 70
0 %
0/100
Score 0/100
1. A Variable is created to hold the possible answer to Question 6. It is named answer6 Initialisation occurs like this: answer6 = [ "A", "B", "C", "D" ] Which of the following statements would return "C"?

Explanation

Zero based array.

Submit
Please wait...
About This Quiz
Every Software Developer Should Pass This Test! - Quiz

Software development is the process of conceiving, specifying, designing, programming, documenting, testing, and bug fixing involved in creating and maintaining applications, frameworks, or other software components.
If you... see morethink you are a smart software developer, you have to pass this test!
see less

2. Hannah has stored a list of sports within the following one-dimensional array. The number of comparisons required to find the item 'kayaking' using a linear search is

Explanation

The correct answer is 6 because in a linear search, each element of the array is compared with the target element until a match is found or the end of the array is reached. In this case, Hannah would need to compare "kayaking" with each of the 6 elements in the array before finding a match.

Submit
3. Saritha researched the different methods used to calculate whether an individual is within a healthy weight range. She chose to use the body mass index (BMI) method. Instead of entering values into a spreadsheet to calculate an individual's BMI, she used her programming skills to write an application for mobile phones. Shown below is the user interface for the application that Saritha developed. It shows the BMI displayed when Jim, one of her classmates, entered his details into the application. The values for height and weight to calculate BMI need to be of which data types?

Explanation

The values for height and weight need to be of floating point data types because BMI calculations involve decimal numbers. Using integer data types would result in inaccurate calculations and potentially incorrect BMI values.

Submit
4. A programmer has been asked to improve the processing speed of a software solution. The solution reads data from a text file stored on a USB hard drive into RAM. Why is reading the data from RAM more efficient than reading the data from the file stored on the USB hard drive?

Explanation

Reading data from RAM is more efficient than reading data from a file stored on a USB hard drive because RAM has faster read/write speeds compared to USB hard drives. RAM allows for quicker access to data, reducing the time it takes for the software solution to process the data. USB hard drives, on the other hand, have slower read/write speeds, which can result in slower data retrieval and processing times.

Submit
5. For the social media platform, tracking user interactions and summarising the data to make changes to the platform is an example of

Explanation

Tracking user interactions and summarizing the data to make changes to the platform is an example of data mining. Data mining involves analyzing large sets of data to discover patterns, relationships, and insights that can be used to make informed decisions and improvements. In this case, the platform is using the data collected from user interactions to gain valuable insights and make changes that enhance the user experience or optimize the platform's performance.

Submit
6. Maddie is setting up a file of records that need to be shared with a range of people with different operating systems and applications. Jono has suggested that she consider setting it up as an XML file. What is the key reason why Jono has suggested that an XML file should be considered?

Explanation

Jono has suggested using an XML file because it provides a common structure for sharing data between applications. XML allows for standardized formatting and organization of data, making it easier for different operating systems and applications to interpret and use the information. This ensures that the data can be easily shared and accessed by a range of people with different systems and applications, promoting interoperability and efficiency.

Submit
7. A program stores the following data in memory:             "Johan", "Symonds", 25, 3.24, FALSE The most appropriate data structure to store it is

Explanation

A record holds data of different data types.

Submit
8. Which of the following functions would return the result 8?

Explanation

not-available-via-ai

Submit
9. To be eligible to attempt a driver's licence test in Victoria, as well as being at least 18 years old, learners must complete at least 120 hours of documented driving practice, including at least 20 hours of driving at night. Which of the following statements would test for these conditions correctly?

Explanation

The correct answer is "age >= 18 and hours >= 120 and nightHours >= 20" because it correctly represents the conditions required to be eligible for a driver's license test in Victoria. The statement checks that the person is at least 18 years old, has completed at least 120 hours of driving practice, and has completed at least 20 hours of driving at night.

Submit
10. The Australian Privacy Principles are guidelines that form part of which legislation?

Explanation

The correct answer is the Privacy Act 1988. The Australian Privacy Principles are guidelines that are included in the Privacy Act 1988. This legislation regulates how personal information is handled by entities in the private and public sectors in Australia. It sets out the obligations of organizations to protect individuals' privacy and outlines the rights of individuals in relation to their personal information. The Privacy Act 1988 aims to balance the need for organizations to collect and use personal information with the protection of individuals' privacy rights.

Submit
11. A magazine publisher has some people who work from home. They connect into the publisher's network to upload articles and do research. When they connect to the publisher, which technology do they use?

Explanation

When the magazine publisher's remote workers connect to the publisher's network to upload articles and do research, they use VPN (Virtual Private Network) technology. VPN allows users to securely access and transmit data over a public network by creating a private and encrypted connection. This ensures that the remote workers can connect to the publisher's network securely and privately, protecting the confidentiality and integrity of the data being transmitted.

Submit
12. Dependencies are indicated

Explanation

The correct answer is using arrows because arrows are commonly used to indicate dependencies between tasks in project management. By using arrows, it becomes clear which tasks are dependent on others and in what sequence they need to be completed. This helps in planning and scheduling the project effectively, ensuring that tasks are executed in the correct order to avoid delays or issues.

Submit
13. In a Gantt chart, the completion of hardware installation is often a milestone in a project. A milestone shows that

Explanation

A milestone in a Gantt chart represents a significant point in a project that has been reached. It indicates the completion of a major task or achievement that marks progress in the project. It does not necessarily imply a delay, a dependency, or the need for another task to be completed before further work can happen. Instead, it signifies a significant milestone or accomplishment in the project's timeline.

Submit
14. Which control structure is used in the pseudocode?

Explanation

The correct answer is "iteration" because iteration is a control structure that allows a set of instructions to be repeated multiple times based on a certain condition. It is commonly used in programming to execute a block of code repeatedly until a specific condition is met. In the context of pseudocode, iteration is used to represent loops or repetitive actions in an algorithm or program.

Submit
15. How many comparisons need to occur to find the name 'Vinnie' in the array?

Explanation

To find the name 'Vinnie' in the array, a total of 4 comparisons need to occur. This means that the algorithm will compare 'Vinnie' with 4 other names in the array before finding a match.

Submit
16. A large computer game development company has developed a number of apps. It stores data about users of these apps in a number of databases. The company regularly reviews this data to identify patterns and to make decisions about the next game to develop or what advertising to promote in the apps. This practice is referred to as

Explanation

The practice described in the question involves reviewing data about users of apps in order to identify patterns and make decisions about game development and advertising. This process is commonly known as data mining. Data mining involves analyzing large sets of data to discover patterns, relationships, and insights that can be used for decision-making purposes. In this case, the company is using data mining to inform their decisions about game development and advertising strategies based on the patterns they identify in the data about their app users.

Submit
17. Which of the following statements best describes a Waterfall development model?

Explanation

In a waterfall development model, you do not go back to a previous stage.

Submit
18. Julie has updated the terms and conditions document for her organisation's website. The previous file was called "termsandcond_2019_12.docx". When she saved the file this time, she called it "termsandcond_2020_03.docx". Julie is using a different file name because

Explanation

One simple way of managing different file versions is to record the date in the filename

Submit
19. To function, the vast range of services that operate over the internet requires a library of technical and communication standards. The term for these technical and communication standards is

Explanation

The question asks for the term that refers to the technical and communication standards required for the functioning of various internet services. The correct answer is "protocols." Protocols are a set of rules and guidelines that enable different devices and systems to communicate and interact with each other over the internet. They define how data is transmitted, received, and processed, ensuring seamless communication between different services and devices. HTML, malware, and monitors are not specifically related to the technical and communication standards required for internet services, making them incorrect choices.

Submit
20. Jack is writing a software solution that will produce an invoice. The software solution regularly accesses a section of code that calculates the goods and services tax (GST) payable on each item. This processing feature is referred to as

Explanation

The software solution regularly accesses a section of code that calculates the goods and services tax (GST) payable on each item. This indicates that the processing feature is a specific block of code that performs a specific task, which aligns with the definition of a function in programming. A function is a self-contained block of code that can be called and executed whenever needed, making it the most appropriate choice for this scenario.

Submit
21. Simone is writing a software solution that summarises the daily sales for a food truck store. She must read through the sales file one line at a time. The most appropriate control structure for this process would be

Explanation

Iteration allows looping through code, in this case reading one line from the file at a time.

Submit
22. A company has a twice daily backup routine which is checked every month. Customers who do not contact the company for 6 months are removed from the main database but can still be found in the complete company records database. This is an example of

Explanation

Removed to NOT main database – not just copied.

Submit
23. Which trace table is representative of the algorithm above immediately after the loop is executed for the second time?

Explanation

Many students selected the option that displayed the output at
the end of the second loop. However, the algorithm provided
only outputs the result of the total once all the values in the
array have been added.

Submit
24. A local IT business has installed a home network for Maria. Maria asked the technician if she needed to set up encryption on the wi-fi router or whether the firewall would offer enough protection. Which one of the following would be the most appropriate response from the technician?

Explanation

The technician explains that encryption is necessary to protect the data traffic in the home network by making it unreadable to unauthorized scanning. On the other hand, the firewall primarily protects the network by scanning incoming packets. Therefore, it is advisable to have both encryption and a firewall to ensure comprehensive protection for the home network.

Submit
25. Use the following information to answer Questions 30 and 31. Frankie copies his completed programming folio from a school computer's hard drive onto a USB flash drive. Two days later, Frankie returns to the computer only to find that his folio has been deleted from the hard drive. Which procedure for managing files was Frankie following?

Explanation

Frankie was following the procedure of backup. Backup refers to creating copies of files or data in order to protect against loss or damage. In this case, Frankie copied his programming folio from the computer's hard drive onto a USB flash drive, which serves as a backup copy. This allows Frankie to have a duplicate of his folio in case the original files are lost or deleted from the hard drive.

Submit
26. One method of representing a software design is using a data dictionary, which

Explanation

A data dictionary is a method of representing a software design that defines each data element used in the software solution. It includes important information such as the name, description, type, and format of each data element. This allows developers and other stakeholders to have a clear understanding of the data being used in the software solution, ensuring consistency and accuracy in its implementation.

Submit
27. Many businesses provide a safe and secure way for more people to access work network systems from home. This secure connection is called

Explanation

The internet is usually the pathway through which a VPN would operate, and the VPN allows access to an intranet.
However, it is the VPN which creates the secure connection.

Submit
28. Use the following information to answer Questions 51 and 52 Which array has the correct values after the pseudocode has been executed?

Explanation

The pseudocode likely includes a step that modifies the values in the array. The correct answer indicates that after executing the pseudocode, the values in the array will be [2, 2, 4, 0, 6].

Submit
29. In a Gantt chart, a milestone is used to indicate

Explanation

Milestones are significant.

Submit
30. What is the output generated by the pseudocode?

Explanation

Many students did not trace the variables through the algorithm
correctly when answering this question, seemingly missing the
second increment of the x-variable.

Submit
31. Use the following information to answer Questions 16 and 17. A social media platform tracks all user interactions on the platform. This includes user posts, mouse clicks, image and video views, and messages exchanged between users. This data is used to deliver targeted advertising to users and it is summarised to make changes to the platform. For the social media platform, the data used to deliver targeted advertising is considered to be

Explanation

The given correct answer is "an input to the advertising module." This means that the data used to deliver targeted advertising on the social media platform is considered as an input to the advertising module. This implies that the advertising module relies on this data to determine which ads to show to users based on their interactions on the platform.

Submit
32. Which one of the following is an example of a non-functional requirement for an online ordering system?

Explanation

Many students selected use case diagrams to be
drawn as an example of a non-functional
requirement. However, a non-functional
requirement describes the attributes the solution
should possess. Option C, which states that
online ordering must be available 24 hours a day,
seven days a week, does this.

Submit
33. Use the following information to answer Questions 26 and 27. The pseudocode below will take the current values in the array and then write the new values into the array. Begin     Array[] = [3, 5, 0, 0, 0] //Initialise the array, index starts at 1     A = Array[1]     B = Array[2]     While B < 3 * A         C = A * B         A = A - 1         B = B + 2     EndWhile //Write new values into the array     Array[1] = A     Array[2] = B     Array[3] = C End Which array has the correct values after the pseudocode has been executed?

Explanation

The pseudocode initializes the array with the values [3, 5, 0, 0, 0]. It then assigns A as the value at index 1 of the array (which is 3) and B as the value at index 2 of the array (which is 5). The while loop runs as long as B is less than 3 times A. In each iteration of the loop, C is assigned the value of A multiplied by B, A is decremented by 1, and B is incremented by 2. After the loop ends, the new values of A, B, and C are written back into the array at their respective indices. Therefore, the correct array after the pseudocode is executed is [2, 7, 15, 0, 0].

Submit
34. Which one of the following is an advantage of a wireless network over a wired network?

Explanation

A wireless network has the advantage of less expensive set-up costs compared to a wired network. This is because setting up a wired network requires the installation of physical cables, which can be costly and time-consuming. On the other hand, a wireless network only requires the installation of wireless access points, which are generally more affordable and easier to set up. This makes wireless networks a more cost-effective option, particularly for small businesses or individuals who may not have the resources or infrastructure for a wired network installation.

Submit
35. John received an email that appeared to be from his bank, asking him to log in to his account and confirm his contact details. He clicked a link and it took him to a website that appeared to be his bank's website where he logged in and completed the requested task. It turned out that John was a victim of

Explanation

Phishing is an email attack pretending to be from a legitimate source.

Submit
36. Use the following information to answer Questions 10 and 11. Courtney is designing a new GPS-based traffic monitoring application for smartphones. As part of the design process, she has decided to generate some evaluation criteria and develop an evaluation strategy. Which one of the following is a criterion that Courtney could use to evaluate the efficiency of the GPS application?

Explanation

Courtney can use the criterion of generating and displaying directions within 10 seconds of the user's request to evaluate the efficiency of the GPS application. This criterion assesses the speed and responsiveness of the application in providing directions, which is an important aspect of efficiency for a GPS-based traffic monitoring application.

Submit
37. After repeated downtime events, the network administrators of a large supermarket chain have contracted a network security analyst to identify the cause of the downtime events. The analyst starts the investigation by implementing a network monitoring tool that will record network traffic and interactions between users on the network. What is this approach commonly known as?

Explanation

The approach commonly known as auditing network logs involves analyzing and reviewing the recorded network traffic and interactions between users on the network. This process helps identify any anomalies or suspicious activities that may be causing the downtime events. By examining the network logs, the network security analyst can gain insights into the root cause of the downtime events and take appropriate measures to prevent them in the future.

Submit
38. Huy is writing a software solution to support administrative staff in a school. The software solution must store details about each student in the school. The most appropriate data structure to store a student's first name, last name, date of birth, home address and telephone number is

Explanation

A record is the most appropriate data structure to store a student's first name, last name, date of birth, home address, and telephone number. A record allows for the grouping of related data fields into a single entity, making it easier to manage and access the student's information. It provides a structured way to store and retrieve the different attributes of a student, ensuring that the data is organized and can be easily accessed when needed. A record also allows for efficient searching and sorting of the student's information based on different criteria.

Submit
39. Use the following information to answer Questions 68 and 69 At the end of the procedure the display will show

Explanation

Tricky because zero based.

Submit
40. Which one do you like?

Explanation

The correct answer is to add a menu item that allows a user to access any section from any other section in the application. This is because it improves the overall usability and navigation of the application by providing a convenient and efficient way for users to move between different sections. It enhances the user experience by reducing the need to backtrack or go through multiple screens to access a specific section.

Submit
41. Each member of an organisation needs a username and password to be able to access the organisation's local area network (LAN). Each member is allocated a unique username but they can each choose their own password. An appropriate data structure to store the username and password for each member of the organisation is

Explanation

An associative array is the most appropriate data structure to store the username and password for each member of the organization. This is because an associative array allows for a key-value pair relationship, where the username can serve as the key and the password as the corresponding value. This allows for easy retrieval and storage of the username-password pairs for each member.

Submit
42. How many times is the loop executed?

Explanation

The loop is executed five times because the given answer states "five times".

Submit
43. A new software solution is being created for handheld devices. The requirements of the solution include that it be easy to use, must be able to work offline, but can occasionally connect for updates, and that any data required is stored on the device. Which type of modern application architecture would be the most appropriate?

Explanation

A mobile application architecture would be the most appropriate for this scenario because it is specifically designed for handheld devices. Mobile applications are developed to be user-friendly, can work offline, and can connect to the internet for updates. Additionally, mobile applications store data on the device, which aligns with the requirement mentioned in the question.

Submit
44. The progress of this project has been recorded using

Explanation

The progress of the project has been recorded using annotations and adjustments. This suggests that the project's progress has been documented by making notes and making necessary changes or modifications as needed. Annotations and adjustments provide a way to track the project's development and ensure that any necessary revisions are made to improve its outcome. This method allows for a dynamic approach to monitoring progress and making necessary modifications along the way.

Submit
45. Aditya has a blog that helps gamers with hacks. The blog has over a thousand subscribers. Each subscriber provides general contact details, including email addresses, when they subscribe. Aditya has had a marketing company contact him and request access to his database. The marketing company will identify the interests of the subscribers and provide targeted advertisements that Aditya can add to his emails. He agrees and will be paid for the service. Aditya has been emailing his subscribers once a week and now includes the targeted advertising. Some of his subscribers have started to complain; one even suggested that Aditya was breaking the law. Which legislation is Aditya's subscriber referring to when suggesting that Aditya was breaking the law?

Explanation

Many students selected the Spam Act, however,
as the organisation shared private data it may be
breaching the Privacy Act.

Submit
46. Which of the following statements is true regarding the critical path?

Explanation

Definition.

Submit
47. Which of the following functions could be a replacement for the selection control structure in the pseudocode?

Explanation

The function is always finding the positive difference, which is what absolute value returns.

Submit
48. When analysing a new software solution, the developers identified the following non-functional requirement: 'All users of the solution will be using their own mobile device.' To which characteristic is the non-functional requirement related?

Explanation

The non-functional requirement "All users of the solution will be using their own mobile device" is related to the characteristic of portability. Portability refers to the ability of a software solution to be easily moved or adapted to different environments or platforms. In this case, the requirement indicates that the solution should be able to run on different mobile devices, suggesting that it needs to be portable across various platforms and operating systems.

Submit
49. Courtney is researching how to develop an evaluation strategy for her new software solution. Key things that she should consider as she develops an evaluation strategy include

Explanation

Student responses varied considerably for this question.
Evaluation strategies typically would not contain solution
designs, testing approaches, use case diagrams or adjustments
to project plans. Evaluation strategies typically contain criteria,
how the criteria will be measured, when the evaluation will
occur and who will be involved.

Submit
50. Frankie's teacher reminds him that his folio is to be submitted that day. Which is the most appropriate way for Frankie to submit his folio?

Explanation

not-available-via-ai

Submit
51. Daniel created a new screen for an existing application. Which of the following would allow him to evaluate his solution?

Explanation

Error logs provide valuable data for evaluation.

Submit
52. The purpose of a Use Case Diagram is to show the relationship between

Explanation

The UCD is designed to show how users interact with the system.

Submit
53. Katie, Kamal and Po have been asked to present an idea for a new software solution. They begin by using a large piece of paper and write down as many ideas as they can think of. This is an example of

Explanation

Defined in the glossary.

Submit
54. Which of the following is definitely NOT a non-functional requirement for an app?

Explanation

Keep is a FR verb.

Submit
55. Which control structure starts on line 4 and finishes on line 6?

Explanation

Student responses varied considerably between the three main
processing features of a programming language. Given that the
algorithm’s ‘if’ statement is on line 4 and the corresponding ‘end
if’ is on line 6, Option C. is the only possible answer

Submit
56. In an attempt to help not-for-profit organisations clarify their obligations with regard to privacy legislation, the Australian Government has provided a range of scenarios on its website. Which one of the following organisations would be exempt from the Australian Privacy Principles?

Explanation

Option A is the only answer that satisfies the
collection of solicited personal information. The
personal information collected is used for, or is
directly related to, the organisation’s activities.

Submit
57. Which of the following statements is correct regarding Use Case Diagrams?

Explanation

Definition.

Submit
58. A developer has been asked to complete a Software Requirements Specification for a new mobile banking application. Which of these should be included in the SRS?

Explanation

C and D part of development.

Submit
59. Which one do you like?

Explanation

Quick sort is likely the correct answer because it is a popular and efficient sorting algorithm. It works by selecting a pivot element, partitioning the array into two sub-arrays based on the pivot, and then recursively sorting the sub-arrays. Quick sort has an average time complexity of O(n log n), making it faster than bubble sort, linear search, and selection sort in most cases.

Submit
60. Pierre has almost finished the development of a software solution for a client and has undertaken a range of tests. He knows he must also conduct usability testing. Which one of the following statements best outlines usability testing?

Explanation

Usability testing involves planning a set of tests for users to perform before implementing the software solution. The results of these tests are recorded, and any necessary modifications to the software solution are made based on the feedback received from the users. This process ensures that the software solution is user-friendly and meets the needs and expectations of the users.

Submit
61. Which structural characteristic makes XML files distinguishable from other types of files?

Explanation

XML files are distinguishable from other types of files by the inclusion of a header, prolog, or declaration statement. This statement typically appears at the beginning of an XML file and provides information about the version of XML being used, as well as any character encoding or other specifications. This characteristic helps identify XML files and differentiate them from other file types that do not have this specific structure.

Submit
62. Storing client data only on an external hard disk drive at the end of the financial year is a form of

Explanation

Storing client data only on an external hard disk drive at the end of the financial year is considered archiving data for future use. Archiving involves preserving data in a secure and accessible manner for long-term storage and potential retrieval. By storing the client data on an external hard disk drive, it ensures that the information is safely retained and can be accessed when needed in the future. This practice helps in maintaining historical records and complying with legal or regulatory requirements.

Submit
63. Sophia works at a gym that operates for 24 hours a day, seven days a week. Each gym member is given an identification (ID) number that is used to unlock the gym door between 9 pm and 6 am. Sophia has designed an algorithm that can check each ID against a list of valid numbers. Which one of the following validation techniques has Sophia used?

Explanation

Many students selected existence check as the
validation check. Existence checks are used to
see if data is entered, not if data exists in a list.
Option C, range check, is the validation
technique used to check against a list of valid ID
numbers.

Submit
64. Kenly is checking the sources used for data in a report produced by one of her team members. Which characteristic of data integrity is she concerned about?

Explanation

While he may have concern about any of these, the fact that he is checking sources implies Kenly is checking the author of the data.

Submit
65. Kerri wrote the following statement: All calculations must be 100% correct. This is an example of

Explanation

This is a statement that can be evaluated.

Submit
66. Which organisations are governed by the Privacy and Data Protection Act 2014?

Explanation

The Privacy and Data Protection Act 2014 governs Victorian Government departments, their agencies, and contractors. This means that these organizations are required to comply with the provisions of the Act regarding the protection and privacy of data and information. The Act does not apply to all Australian companies whose annual turnover exceeds $3 million or to anyone who values privacy of information. Additionally, it is not stated that companies can opt into the Act.

Submit
67. The algorithm contains examples of which programming structures?

Explanation

No selection.

Submit
68. My local medical practice wants to provide WiFi for patients while they wait. Which of the following would be a functional requirement for the system?

Explanation

The functional requirement for the system is that the WiFi must be able to support 50 patients at the same time. This means that the WiFi network should have the capacity to handle the simultaneous connections of 50 patients without any performance issues or disruptions. It is important for the medical practice to ensure that the WiFi can accommodate the expected number of users to provide a satisfactory experience for the patients while they wait.

Submit
69. XML is being used more often to store and transfer data. This is because it

Explanation

XML is being used more often to store and transfer data because it is easy to modify. XML allows for the structure and content of data to be easily changed and updated without affecting the overall format. This flexibility makes it a preferred choice for applications and systems that require frequent modifications to the data. Additionally, XML's use of tags and elements allows for better organization and representation of complex data structures, further enhancing its usability.

Submit
70. A video streaming service uses 0.7MB per second (0.7MBps) to show a medium quality film. The service will not start showing the film until at least 15 seconds of video is downloaded (as a buffer). Peter has a low-quality Internet connection. On a wet Saturday his connection is only running at 9 megabits per second (9Mbps). How long must he wait until the film starts showing?

Explanation

0.7MB=5.6Mbps x15 sec 84Mbits @9Mbps =9.3333 sec.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 29, 2021
    Quiz Created by
    Catherine Halcomb
Cancel
  • All
    All (70)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
A Variable is created to hold the possible answer to Question 6. It is...
Hannah has stored a list of sports within the following...
Saritha researched the different methods used to calculate whether an...
A programmer has been asked to improve the processing speed of a...
For the social media platform, tracking user interactions and...
Maddie is setting up a file of records that need to be shared with a...
A program stores the following data in memory: ...
Which of the following functions would return the result 8?
To be eligible to attempt a driver's licence test in Victoria, as well...
The Australian Privacy Principles are guidelines that form part of...
A magazine publisher has some people who work from home. They connect...
Dependencies are indicated
In a Gantt chart, the completion of hardware installation is often a...
Which control structure is used in the pseudocode?
How many comparisons need to occur to find the name 'Vinnie' in the...
A large computer game development company has developed a number of...
Which of the following statements best describes a Waterfall...
Julie has updated the terms and conditions document for her...
To function, the vast range of services that operate over the internet...
Jack is writing a software solution that will produce an invoice. The...
Simone is writing a software solution that summarises the daily sales...
A company has a twice daily backup routine which is checked every...
Which trace table is representative of the algorithm above immediately...
A local IT business has installed a home network for Maria. Maria...
Use the following information to answer Questions 30 and 31. ...
One method of representing a software design is using a data...
Many businesses provide a safe and secure way for more people to...
Use the following information to answer Questions 51 and 52 ...
In a Gantt chart, a milestone is used to indicate
What is the output generated by the pseudocode?
Use the following information to answer Questions 16 and 17. ...
Which one of the following is an example of a non-functional...
Use the following information to answer Questions 26 and 27. ...
Which one of the following is an advantage of a wireless network over...
John received an email that appeared to be from his bank, asking him...
Use the following information to answer Questions 10 and 11. ...
After repeated downtime events, the network administrators of a large...
Huy is writing a software solution to support administrative staff in...
Use the following information to answer Questions 68 and 69 ...
Which one do you like?
Each member of an organisation needs a username and password to be...
How many times is the loop executed?
A new software solution is being created for handheld devices. The...
The progress of this project has been recorded using
Aditya has a blog that helps gamers with hacks. The blog has over a...
Which of the following statements is true regarding the critical path?
Which of the following functions could be a replacement for the...
When analysing a new software solution, the developers identified the...
Courtney is researching how to develop an evaluation strategy for her...
Frankie's teacher reminds him that his folio is to be submitted that...
Daniel created a new screen for an existing application. Which of the...
The purpose of a Use Case Diagram is to show the relationship between
Katie, Kamal and Po have been asked to present an idea for a new...
Which of the following is definitely NOT a non-functional requirement...
Which control structure starts on line 4 and finishes on line 6?
In an attempt to help not-for-profit organisations clarify their...
Which of the following statements is correct regarding Use Case...
A developer has been asked to complete a Software Requirements...
Which one do you like?
Pierre has almost finished the development of a software solution for...
Which structural characteristic makes XML files distinguishable from...
Storing client data only on an external hard disk drive at the end of...
Sophia works at a gym that operates for 24 hours a day, seven days a...
Kenly is checking the sources used for data in a report produced by...
Kerri wrote the following statement: All calculations must be 100%...
Which organisations are governed by the Privacy and Data Protection...
The algorithm contains examples of which programming structures?
My local medical practice wants to provide WiFi for patients while...
XML is being used more often to store and transfer data. ...
A video streaming service uses 0.7MB per second (0.7MBps) to show a...
Alert!

Advertisement