A) Software Development Life Cycle B) System Data Life Cycle C) Software Design Life Code
A) Planning B) Maintenance C) Deployment
A) Requirement Analysis B) Deployment C) Implementation / Coding
A) Maintenance B) Planning C) Testing
A) Deployment B) Requirement Analysis C) Maintenance
A) Prototype B) Waterfall C) Agile
A) Agile B) Spiral C) Waterfall
A) Waterfall B) Prototype C) Spiral
A) Agile B) Prototype C) Waterfall
A) Technical Specification B) Functional Specification C) Non-Functional Specification
A) Functional Specification B) User Interface Specification C) Non-Functional Specification
A) Business Requirement Specification B) Functional Specification C) System Design Document
A) Business Requirement Specification B) User Manual C) Software Requirement Specification
A) Performance B) Usability C) Security
A) Performance B) Reliability C) Security
A) Usability B) Security C) Scalability
A) Performance B) Scalability C) Usability
A) Scalability B) Performance C) Reliability
A) Traceable B) Achievable C) Relevant
A) Specific B) Relevant C) Measurable
A) Relevant B) Achievable C) raceable
A) Measurable B) Achievable C) Specific
A) Relevant B) Achievable C) Specific
A) Deployment B) System Analysis C) System Design
A) Deployment B) System Design C) System Analysis
A) Deploying the system B) Writing the system code C) A systematic way to collect information about system needs
A) Interview B) Observation C) Workshop
A) Open-ended questions B) Closed-ended questions C) Yes or No questions
A) Interview B) Survey / Questionnaire C) Observation
A) Interview B) Survey C) User Stories
A) Observation B) Interview C) Workshop / Focus Group Discussion
A) Observation / Shadowing B) Testing C) Interview
A) Coding B) System Architecture Design C) Testing
A) Component Identification B) Requirement Review C) Technology Decision
A) Interface Design B) Requirement Review C) Component Identification
A) System Maintenance B) Requirement Review C) Define Interface
A) Component Identification B) Requirement Review C) Technology Decision
A) How the system is coded B) How users interact with the system C) How the system is deployed
A) Network setup B) System coding C) Data flow within the system
A) UML B) Survey C) Flowchart
A) Data Flow Diagram B) Data Function Design C) Data File Diagram
A) Diamond B) Circle C) Rectangle
A) Arrow B) Parallel Lines C) Rectangle
A) Circle B) Rounded Rectangle C) Triangle
A) Universal Machine Logic B) Unified Machine Language C) Unified Modeling Language
A) Visualize and design system behavior B) Install software C) Write system code
A) Class Diagram B) Activity Diagram C) Sequence Diagram
A) Composite Structure Diagram B) Activity Diagram C) Package Diagram
A) Object Diagram B) Class Diagram C) Deployment Diagram
A) Component Diagram B) Use Case Diagram C) Activity Diagram
A) Sequence Diagram B) Deployment Diagram C) Communication Diagram
A) State Machine Diagram B) Object Diagram C) Package Diagram
A) Package Diagram B) State Machine Diagram C) Activity Diagram
A) Component Diagram B) Activity Diagram C) Deployment Diagram
A) Use Case Diagram B) Sequence Diagram C) Package Diagram
A) Activity Diagram B) Sequence Diagram C) Communication Diagram
A) Communication Diagram (Collaboration Diagram) B) Package Diagram C) Deployment Diagram
A) Timing Diagram B) Activity Diagram C) Component Diagram
A) Object Diagram B) Interaction Overview Diagram C) Activity Diagram
A) High-level structure of a system. B) User interface design C) Low-level coding structure
A) Low-level reusable solution for software design problems B) High-level structure of a system. C) Database management method
A) Pipe-Filter Architecture B) Client-Server Architecture C) Layered Architecture
A) Client-Server Architecture B) Client-Server Architecture C) Peer-to-peer Architecture
A) Layered Architecture B) Master-Slave Architecture C) Event-driven Architecture
A) Microservices Architecture B) Microkernel Architecture C) Peer-to-peer Architecture
A) Microservices Architecture B) Broker Architecture C) Master-Slave Architecture
A) Peer-to-peer Architecture B) Space-Based Architecture C) Pipe-filter Architecture
A) Broker Architecture B) Peer-to-peer Architecture C) Master-Slave Architecture
A) Broker Architecture B) Event-driven Architecture C) Pipe-Filter Architecture
A) Layered Architecture B) Broker Architecture C) Event-driven Architecture
A) Peer-to-Peer Architecture B) Event-driven Architecture C) Client-server Architecture
A) Database management B) Internet-based computing services using remote servers C) Local computer storage
A) Computer hardware upgrade B) Systems that simulate human intelligence. C) Internet connection
A) Hardware processing B) System learning from data without explicit programming C) Networking method
A) Network of connected physical devices sharing data B) Internet websites C) Programming language
A) Decentralized and tamper-proof digital record system B) Centralized database C) Programming method
A) Fully digital environment B) Overlaying digital content in real world. C) Hardware processor
A) Computing using quantum mechanics principles B) Networking technology C) AI software
A) Offline computing B) Cloud computing without managing servers. C) Hardware-free computing
A) Blockchain technology B) Processing near data source. C) Cloud storage |