Aict Quizzes
Aict Quizzes
During this phase, all the relevant information is engineers to model physical processes or situations, Which process outlines a series of phases for
collected from the customer to develop a product which include many, separate, interacting objects. planning, creating, testing, and deploying
as per their expectation. Systems for Modeling and Simulation software?
Requirement Gathering and Analysis The Software Development Life Cycle
It ensures that project requirements, designs, testing
What is the very first model used in SDLC? Waterfall procedures, and outcomes are recorded and easily Enumerate at least 5 Software Development Life
Model accessible to stakeholders. Cycle Models.
Documentation Waterfall Model
V-shaped Model
The application of a systematic, disciplined, The application of a systematic, disciplined, quantifiable Spiral Model
quantifiable approach to the development, approach to the development, operation, and
maintenance of software. Iterative Incremental Model
operation, and maintenance of software.
Software Engineering Bigbang Model
Software Engineering
Agile Model
What model is used for small projects only? Big Bang In software development, we have different kinds of
It is not easy to convert the flowchart into any
Model systems, EXCEPT
programming language code. F
Collaboration and Communication
These are systems that collect data from their
environment using a set of sensors and send that A selection-control statement allows a user to make
These are systems that collect data from their
data to other systems for processing. Data decisions in the code about the current state of the
environment using a set of sensors and send that data
Collection Systems program’s data and then to take one of two alternative
to other systems for processing.
paths to a next statement. T
Data Collection Systems
Software that is commissioned by a specific
Stand-alone systems that are marketed and sold to any
customer to meet their own needs. Customized An If-then statement is used when there is only one
customer who wishes to buy them such as PC Software
Products and CAD Software. option or set of statements related to the condition
Generic Products being evaluated. T
A document describing the design of a software This model divides the product into small chunks.
application. Each iteration goes through phases namely It is a statement terminating the loop, procedure,
Software Design Document Requirement Analysis, Designing, Coding, and try block, or the black from where it is called. Exit
Testing. Iterative Incremental Model Statement
It is a minus operator applied on a single What type of intellectual property protects confidential ________ is a set of practices that aim to protect
operand. Unary Minus Operator business information providing a competitive edge? the confidentiality, integrity, and availability
Trade Secret (known as the CIA triad) of data from
unauthorized access and misuse. Information
It is a symbol used to represent the start and end
Security.
of a flowchart. Oval What is a network of compromised computers used for
malicious activities? Botnet
According to the RA ______, Invasion of privacy is
It is a well-defined procedure that allows a defined as unauthorized access to someone’s
computer to solve a problem. Algorithm What is the term for software that tracks and records
private space or information by an individual or a
keystrokes? Keylogger business. RA 10173
______ are fundamental in programming for What is a cyber-attack that floods a server with
making decisions and executing different blocks internet traffic? DDoS Attack Protect new inventions or discoveries. Patents
of code based on certain conditions. Selection
Control Statements
What legal protection grants exclusive rights to ______ give the creator exclusive rights to use and
an inventor for 20 years? Patent distribute their work, usually for a specific period.
______ symbols or keywords that perform Copyrights
arithmetic operations on numerical values.
Mathematical operations What type of security aims to protect the integrity
and usability of a network? ________ is the primary legislation governing
Network Security intellectual property rights in the Philippines also
Who invented flowchart? known as the Intellectual Property Code of the
Frank And Lillian Gilbreth Philippines. -RA NO. 8293 OF 1997
What is the term for using a computer to trick
individuals into providing personal information?
_____ is used to change the flow of execution. Phishing This would help you to keep your private life as
Loop Control Statement restrictive as possible online, no matter how
many people follow you. Don’t post sensitive
What is the practice of protecting data from data online
What are the 3 types of control structures? unauthorized access, theft, or misuse? Computer
Selection Security
Loop Three Types of Computer:
Sequence McAfee
What type of intellectual property identifies Norton
goods or services produced by a specific Kaspersky Lab
Is a programming language construct or operator company? Trademark
that tests some kind of relation between two
entities? Parallelogram Four Types Of Computer Security:
What security measure is used to browse the Information Security
internet securely? VPN Network Security
Give at least three (3) primary relational operator?
Endpoint Security
Less than
What law protects and secures the exclusive Internet Security
Less than or Equal to
Equal to rights of creators in the Philippines? Republic Act
8293 Give at least 3 Punishments and Fines
_____ it is an operator that used symbol or words to Under RA 8293 Infringement Legal
connect expression. Logical Operator Actions
What type of security protects the confidentiality,
Enforcement
integrity, and availability of data? Information
Penalties or Remedies
_____ a logical operator that inverts its Security
truth value. NOT