A) Software Design Life Code B) Software Development Life Cycle C) System Data Life Cycle
A) Maintenance B) Planning C) Deployment
A) Requirement Analysis B) Deployment C) Implementation / Coding
A) Testing B) Maintenance C) Planning
A) Requirement Analysis B) Deployment C) Maintenance
A) Prototype B) Waterfall C) Agile
A) Agile B) Spiral C) Waterfall
A) Spiral B) Waterfall C) Prototype
A) Agile B) Prototype C) Waterfall
A) Technical Specification B) Non-Functional Specification C) Functional Specification
A) Non-Functional Specification B) User Interface Specification C) Functional Specification
A) Functional Specification B) System Design Document C) Business Requirement Specification
A) User Manual B) Business Requirement Specification C) Software Requirement Specification
A) Security B) Usability C) Performance
A) Security B) Performance C) Reliability
A) Usability B) Security C) Scalability
A) Scalability B) Usability C) Performance
A) Scalability B) Reliability C) Performance
A) Achievable B) Relevant C) Traceable
A) Specific B) Relevant C) Measurable
A) Relevant B) Achievable C) raceable
A) Achievable B) Specific C) Measurable
A) Specific B) Achievable C) Relevant
A) System Analysis B) Deployment C) System Design
A) Deployment B) System Design C) System Analysis
A) A systematic way to collect information about system needs B) Deploying the system C) Writing the system code
A) Workshop B) Interview C) Observation
A) Open-ended questions B) Closed-ended questions C) Yes or No questions
A) Survey / Questionnaire B) Observation C) Interview
A) Survey B) User Stories C) Interview
A) Observation B) Workshop / Focus Group Discussion C) Interview
A) Interview B) Testing C) Observation / Shadowing
A) Testing B) System Architecture Design C) Coding
A) Technology Decision B) Component Identification C) Requirement Review
A) Component Identification B) Interface Design C) Requirement Review
A) System Maintenance B) Requirement Review C) Define Interface
A) Component Identification B) Requirement Review C) Technology Decision
A) How the system is coded B) How users interact with the system C) How the system is deployed
A) System coding B) Network setup C) Data flow within the system
A) Survey B) UML C) Flowchart
A) Data Function Design B) Data File Diagram C) Data Flow Diagram
A) Circle B) Rectangle C) Diamond
A) Parallel Lines B) Arrow C) Rectangle
A) Rounded Rectangle B) Circle C) Triangle
A) Unified Modeling Language B) Universal Machine Logic C) Unified Machine Language
A) Write system code B) Visualize and design system behavior C) Install software
A) Sequence Diagram B) Activity Diagram C) Class Diagram
A) Package Diagram B) Activity Diagram C) Composite Structure Diagram
A) Deployment Diagram B) Object Diagram C) Class Diagram
A) Use Case Diagram B) Activity Diagram C) Component Diagram
A) Sequence Diagram B) Deployment Diagram C) Communication Diagram
A) Object Diagram B) State Machine Diagram C) Package Diagram
A) Package Diagram B) State Machine Diagram C) Activity Diagram
A) Component Diagram B) Deployment Diagram C) Activity Diagram
A) Package Diagram B) Sequence Diagram C) Use Case Diagram
A) Activity Diagram B) Sequence Diagram C) Communication Diagram
A) Communication Diagram (Collaboration Diagram) B) Deployment Diagram C) Package Diagram
A) Activity Diagram B) Timing Diagram C) Component Diagram
A) Object Diagram B) Interaction Overview Diagram C) Activity Diagram
A) Low-level coding structure B) User interface design C) High-level structure of a system.
A) High-level structure of a system. B) Database management method C) Low-level reusable solution for software design problems
A) Layered Architecture B) Pipe-Filter Architecture C) Client-Server Architecture
A) Client-Server Architecture B) Peer-to-peer Architecture C) Client-Server Architecture
A) Event-driven Architecture B) Master-Slave Architecture C) Layered Architecture
A) Peer-to-peer Architecture B) Microservices Architecture C) Microkernel Architecture
A) Broker Architecture B) Master-Slave Architecture C) Microservices Architecture
A) Peer-to-peer Architecture B) Space-Based Architecture C) Pipe-filter Architecture
A) Broker Architecture B) Peer-to-peer Architecture C) Master-Slave Architecture
A) Event-driven Architecture B) Broker Architecture C) Pipe-Filter Architecture
A) Broker Architecture B) Layered Architecture C) Event-driven Architecture
A) Client-server Architecture B) Event-driven Architecture C) Peer-to-Peer Architecture
A) Local computer storage B) Database management C) Internet-based computing services using remote servers
A) Computer hardware upgrade B) Systems that simulate human intelligence. C) Internet connection
A) System learning from data without explicit programming B) Hardware processing C) Networking method
A) Internet websites B) Network of connected physical devices sharing data C) Programming language
A) Decentralized and tamper-proof digital record system B) Centralized database C) Programming method
A) Overlaying digital content in real world. B) Hardware processor C) Fully digital environment
A) Computing using quantum mechanics principles B) AI software C) Networking technology
A) Cloud computing without managing servers. B) Hardware-free computing C) Offline computing
A) Processing near data source. B) Cloud storage C) Blockchain technology |