A) System Data Life Cycle B) Software Development Life Cycle C) Software Design Life Code
A) Maintenance B) Deployment C) Planning
A) Deployment B) Implementation / Coding C) Requirement Analysis
A) Testing B) Maintenance C) Planning
A) Deployment B) Maintenance C) Requirement Analysis
A) Prototype B) Agile C) Waterfall
A) Waterfall B) Agile C) Spiral
A) Spiral B) Waterfall C) Prototype
A) Prototype B) Agile C) Waterfall
A) Non-Functional Specification B) Technical Specification C) Functional Specification
A) Functional Specification B) User Interface Specification C) Non-Functional Specification
A) Business Requirement Specification B) System Design Document C) Functional Specification
A) Business Requirement Specification B) Software Requirement Specification C) User Manual
A) Usability B) Security C) Performance
A) Reliability B) Security C) Performance
A) Usability B) Security C) Scalability
A) Scalability B) Usability C) Performance
A) Performance B) Scalability C) Reliability
A) Achievable B) Traceable C) Relevant
A) Measurable B) Relevant C) Specific
A) Achievable B) Relevant C) raceable
A) Specific B) Achievable C) Measurable
A) Relevant B) Specific C) Achievable
A) System Design B) Deployment C) System Analysis
A) Deployment B) System Analysis C) System Design
A) Writing the system code B) Deploying the system C) A systematic way to collect information about system needs
A) Interview B) Workshop C) Observation
A) Closed-ended questions B) Open-ended questions C) Yes or No questions
A) Observation B) Survey / Questionnaire C) Interview
A) Interview B) Survey C) User Stories
A) Observation B) Interview C) Workshop / Focus Group Discussion
A) Interview B) Observation / Shadowing C) Testing
A) System Architecture Design B) Testing C) Coding
A) Technology Decision B) Component Identification C) Requirement Review
A) Component Identification B) Interface Design C) Requirement Review
A) Requirement Review B) Define Interface C) System Maintenance
A) Requirement Review B) Component Identification C) Technology Decision
A) How the system is deployed B) How the system is coded C) How users interact with the system
A) Data flow within the system B) Network setup C) System coding
A) UML B) Survey C) Flowchart
A) Data Flow Diagram B) Data Function Design C) Data File Diagram
A) Circle B) Diamond C) Rectangle
A) Arrow B) Rectangle C) Parallel Lines
A) Rounded Rectangle B) Triangle C) Circle
A) Unified Machine Language B) Unified Modeling Language C) Universal Machine Logic
A) Visualize and design system behavior B) Install software C) Write system code
A) Activity Diagram B) Class Diagram C) Sequence Diagram
A) Composite Structure Diagram B) Activity Diagram C) Package Diagram
A) Deployment Diagram B) Class Diagram C) Object Diagram
A) Component Diagram B) Use Case Diagram C) Activity Diagram
A) Communication Diagram B) Sequence Diagram C) Deployment Diagram
A) State Machine Diagram B) Package Diagram C) Object Diagram
A) State Machine Diagram B) Package Diagram C) Activity Diagram
A) Component Diagram B) Activity Diagram C) Deployment Diagram
A) Sequence Diagram B) Use Case Diagram C) Package Diagram
A) Sequence Diagram B) Activity Diagram C) Communication Diagram
A) Deployment Diagram B) Package Diagram C) Communication Diagram (Collaboration Diagram)
A) Activity Diagram B) Timing Diagram C) Component Diagram
A) Object Diagram B) Interaction Overview Diagram C) Activity Diagram
A) Low-level coding structure B) User interface design C) High-level structure of a system.
A) Database management method B) High-level structure of a system. C) Low-level reusable solution for software design problems
A) Layered Architecture B) Pipe-Filter Architecture C) Client-Server Architecture
A) Client-Server Architecture B) Peer-to-peer Architecture C) Client-Server Architecture
A) Event-driven Architecture B) Master-Slave Architecture C) Layered Architecture
A) Microkernel Architecture B) Microservices Architecture C) Peer-to-peer Architecture
A) Broker Architecture B) Master-Slave Architecture C) Microservices Architecture
A) Peer-to-peer Architecture B) Space-Based Architecture C) Pipe-filter Architecture
A) Master-Slave Architecture B) Broker Architecture C) Peer-to-peer Architecture
A) Broker Architecture B) Event-driven Architecture C) Pipe-Filter Architecture
A) Event-driven Architecture B) Layered Architecture C) Broker Architecture
A) Peer-to-Peer Architecture B) Event-driven Architecture C) Client-server Architecture
A) Local computer storage B) Database management C) Internet-based computing services using remote servers
A) Computer hardware upgrade B) Systems that simulate human intelligence. C) Internet connection
A) Hardware processing B) Networking method C) System learning from data without explicit programming
A) Network of connected physical devices sharing data B) Internet websites C) Programming language
A) Programming method B) Centralized database C) Decentralized and tamper-proof digital record system
A) Hardware processor B) Overlaying digital content in real world. C) Fully digital environment
A) Computing using quantum mechanics principles B) AI software C) Networking technology
A) Hardware-free computing B) Offline computing C) Cloud computing without managing servers.
A) Cloud storage B) Blockchain technology C) Processing near data source. |