A) System Data Life Cycle B) Software Design Life Code C) Software Development Life Cycle
A) Deployment B) Maintenance C) Planning
A) Requirement Analysis B) Implementation / Coding C) Deployment
A) Maintenance B) Testing C) Planning
A) Deployment B) Requirement Analysis C) Maintenance
A) Waterfall B) Agile C) Prototype
A) Waterfall B) Spiral C) Agile
A) Prototype B) Waterfall C) Spiral
A) Agile B) Waterfall C) Prototype
A) Technical Specification B) Functional Specification C) Non-Functional Specification
A) User Interface Specification B) Functional Specification C) Non-Functional Specification
A) Business Requirement Specification B) System Design Document C) Functional Specification
A) Business Requirement Specification B) Software Requirement Specification C) User Manual
A) Security B) Usability C) Performance
A) Performance B) Security C) Reliability
A) Usability B) Scalability C) Security
A) Usability B) Performance C) Scalability
A) Performance B) Reliability C) Scalability
A) Achievable B) Relevant C) Traceable
A) Relevant B) Measurable C) Specific
A) Achievable B) Relevant C) raceable
A) Measurable B) Specific C) Achievable
A) Relevant B) Specific C) Achievable
A) System Analysis B) Deployment C) System Design
A) Deployment B) System Analysis C) System Design
A) Writing the system code B) A systematic way to collect information about system needs C) Deploying the system
A) Observation B) Interview C) Workshop
A) Yes or No questions B) Open-ended questions C) Closed-ended questions
A) Observation B) Interview C) Survey / Questionnaire
A) User Stories B) Survey C) Interview
A) Workshop / Focus Group Discussion B) Observation C) Interview
A) Observation / Shadowing B) Testing C) Interview
A) Testing B) System Architecture Design C) Coding
A) Component Identification B) Requirement Review C) Technology Decision
A) Interface Design B) Component Identification C) Requirement Review
A) Define Interface B) Requirement Review C) System Maintenance
A) Technology Decision B) Component Identification C) Requirement Review
A) How users interact with the system B) How the system is coded C) How the system is deployed
A) Network setup B) Data flow within the system C) System coding
A) UML B) Survey C) Flowchart
A) Data Function Design B) Data File Diagram C) Data Flow Diagram
A) Rectangle B) Circle C) Diamond
A) Parallel Lines B) Rectangle C) Arrow
A) Triangle B) Rounded Rectangle C) Circle
A) Universal Machine Logic B) Unified Modeling Language C) Unified Machine Language
A) Visualize and design system behavior B) Install software C) Write system code
A) Sequence Diagram B) Class Diagram C) Activity Diagram
A) Composite Structure Diagram B) Activity Diagram C) Package Diagram
A) Class Diagram B) Deployment Diagram C) Object Diagram
A) Component Diagram B) Activity Diagram C) Use Case Diagram
A) Deployment Diagram B) Sequence Diagram C) Communication Diagram
A) State Machine Diagram B) Package Diagram C) Object Diagram
A) Package Diagram B) Activity Diagram C) State Machine Diagram
A) Deployment Diagram B) Component Diagram C) Activity Diagram
A) Sequence Diagram B) Use Case Diagram C) Package Diagram
A) Sequence Diagram B) Activity Diagram C) Communication Diagram
A) Deployment Diagram B) Package Diagram C) Communication Diagram (Collaboration Diagram)
A) Timing Diagram B) Component Diagram C) Activity Diagram
A) Activity Diagram B) Interaction Overview Diagram C) Object Diagram
A) High-level structure of a system. B) Low-level coding structure C) User interface design
A) Database management method B) Low-level reusable solution for software design problems C) High-level structure of a system.
A) Layered Architecture B) Pipe-Filter Architecture C) Client-Server Architecture
A) Peer-to-peer Architecture B) Client-Server Architecture C) Client-Server Architecture
A) Master-Slave Architecture B) Layered Architecture C) Event-driven Architecture
A) Microservices Architecture B) Peer-to-peer Architecture C) Microkernel Architecture
A) Broker Architecture B) Microservices Architecture C) Master-Slave Architecture
A) Pipe-filter Architecture B) Space-Based Architecture C) Peer-to-peer Architecture
A) Master-Slave Architecture B) Broker Architecture C) Peer-to-peer Architecture
A) Event-driven Architecture B) Broker Architecture C) Pipe-Filter Architecture
A) Layered Architecture B) Broker Architecture C) Event-driven Architecture
A) Peer-to-Peer Architecture B) Client-server Architecture C) Event-driven Architecture
A) Internet-based computing services using remote servers B) Database management C) Local computer storage
A) Internet connection B) Computer hardware upgrade C) Systems that simulate human intelligence.
A) Networking method B) Hardware processing C) System learning from data without explicit programming
A) Network of connected physical devices sharing data B) Programming language C) Internet websites
A) Centralized database B) Programming method C) Decentralized and tamper-proof digital record system
A) Overlaying digital content in real world. B) Hardware processor C) Fully digital environment
A) AI software B) Computing using quantum mechanics principles C) Networking technology
A) Hardware-free computing B) Cloud computing without managing servers. C) Offline computing
A) Cloud storage B) Blockchain technology C) Processing near data source. |