0% found this document useful (0 votes)
14 views2 pages

Aict Quizzes

Uploaded by

michelleaisison
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views2 pages

Aict Quizzes

Uploaded by

michelleaisison
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

These are systems that are developed by scientists and

During this phase, all the relevant information is engineers to model physical processes or situations, Which process outlines a series of phases for
collected from the customer to develop a product which include many, separate, interacting objects. planning, creating, testing, and deploying
as per their expectation. Systems for Modeling and Simulation software?
Requirement Gathering and Analysis The Software Development Life Cycle
It ensures that project requirements, designs, testing
What is the very first model used in SDLC? Waterfall procedures, and outcomes are recorded and easily Enumerate at least 5 Software Development Life
Model accessible to stakeholders. Cycle Models.
Documentation Waterfall Model
V-shaped Model
The application of a systematic, disciplined, The application of a systematic, disciplined, quantifiable Spiral Model
quantifiable approach to the development, approach to the development, operation, and
maintenance of software. Iterative Incremental Model
operation, and maintenance of software.
Software Engineering Bigbang Model
Software Engineering
Agile Model

What model is used for small projects only? Big Bang In software development, we have different kinds of
It is not easy to convert the flowchart into any
Model systems, EXCEPT
programming language code. F
Collaboration and Communication
These are systems that collect data from their
environment using a set of sensors and send that A selection-control statement allows a user to make
These are systems that collect data from their
data to other systems for processing. Data decisions in the code about the current state of the
environment using a set of sensors and send that data
Collection Systems program’s data and then to take one of two alternative
to other systems for processing.
paths to a next statement. T
Data Collection Systems
Software that is commissioned by a specific
Stand-alone systems that are marketed and sold to any
customer to meet their own needs. Customized An If-then statement is used when there is only one
customer who wishes to buy them such as PC Software
Products and CAD Software. option or set of statements related to the condition
Generic Products being evaluated. T

A document stating what an application must


accomplish. A document that describes what the software will In using the logical operator And (&), if both logical
Software Requirement Specification do and how it will be expected. expressions are true, it returns a value of logical 0 or
Software Requirements Specification true; otherwise, it returns a value of logical 1 or false. F

Is the one doing the actual implementation of


the software, i.e., the coding. As software development methodology evolved, Defining variables is the second step in writing an
Programmer/Developer software design documentation has been the algorithm. T
target of strong skepticism.
Software Design Document
In this phase, the developed software is tested It is a characteristic of an algorithm wherein each
thoroughly and any defects found are assigned to instruction must be clear and unambiguous.
developers to get them fixed. Testing It also serves as a guide for the testing manager
Definiteness
to monitor and control the progress of the testing
activities.Software Test Plan
In this model Verification & Validation goes hand It is a type of control structure in which the statements
in hand i.e. development and testing go parallel. are placed one after the other. Sequence
The SDP provides the acquirer insight and a tool
V-Shaped Model
for monitoring the process to be followed for
software development. It is a flowchart symbol that is used for input or output
This model has limited functional capabilities and Software Development Plan operation. Parallelogram
inefficient performance when compared to the
actual software.
A Software Team Role in a development team
Prototype Model It is a visual representation of a process, system, or
focuses on creating intuitive, efficient, and
algorithm. Flowchart
enjoyable user experiences. UX Designer
Known for promoting teamwork, rapid
functionality development, minimal resource What symbol is used in most programming languages
They follow methodologies like Agile to manage
requirements, and flexibility for changing or fixed as an assignment symbol? =
requirements. project workflows, ensuring timely delivery and
continuous improvement. Development teams
Agile Model
It is a special symbol that performs operations on
Any enhancement or change in the functionality can operands. Operator
This phase involves collecting information from
be done in the next iteration in Spiral Model. True
the customer to understand their needs and
expectations for the software. It is a mathematical operator that performs division but
Divides the product into small chunks. Requirement gathering and Analysis the result is always an integer value. Floor Division
Iterative Incremental Model
It is a type of control structure which allows the
This is a traditional, sequential SDLC model where
statements to be executed repeatedly. Loop
These are application systems that run on a local each development phase (requirements, design,
computer, such as a PC. They include all necessary coding, testing) is completed before moving to
functionality and do not need to be connected to a the next. Waterfall Model It is a type of operator used in programming to
network compare two values and determine their
Stand-alone Applications relationship. Relational Operators
It is performed using the unit test cases that are
designed and is done in the Low-level design
It covers the detailed plan for building, deploying and phase. Unit testing It is a type of loop control statement that
maintaining the software. Software Development Life transfers control unconditionally to a specified
Cycles line in a procedure. Go-to Statement
This model prioritizes user feedback by creating
functional prototypes to gather early insights and
Also referred to as the customers. refine requirements before full- fledged It uses symbols and diagrams to depict the steps,
Stakeholders development. Prototype Model decision, and flow of logic within the process.
Flowchart

A document describing the design of a software This model divides the product into small chunks.
application. Each iteration goes through phases namely It is a statement terminating the loop, procedure,
Software Design Document Requirement Analysis, Designing, Coding, and try block, or the black from where it is called. Exit
Testing. Iterative Incremental Model Statement
It is a minus operator applied on a single What type of intellectual property protects confidential ________ is a set of practices that aim to protect
operand. Unary Minus Operator business information providing a competitive edge? the confidentiality, integrity, and availability
Trade Secret (known as the CIA triad) of data from
unauthorized access and misuse. Information
It is a symbol used to represent the start and end
Security.
of a flowchart. Oval What is a network of compromised computers used for
malicious activities? Botnet
According to the RA ______, Invasion of privacy is
It is a well-defined procedure that allows a defined as unauthorized access to someone’s
computer to solve a problem. Algorithm What is the term for software that tracks and records
private space or information by an individual or a
keystrokes? Keylogger business. RA 10173

______ are fundamental in programming for What is a cyber-attack that floods a server with
making decisions and executing different blocks internet traffic? DDoS Attack Protect new inventions or discoveries. Patents
of code based on certain conditions. Selection
Control Statements
What legal protection grants exclusive rights to ______ give the creator exclusive rights to use and
an inventor for 20 years? Patent distribute their work, usually for a specific period.
______ symbols or keywords that perform Copyrights
arithmetic operations on numerical values.
Mathematical operations What type of security aims to protect the integrity
and usability of a network? ________ is the primary legislation governing
Network Security intellectual property rights in the Philippines also
Who invented flowchart? known as the Intellectual Property Code of the
Frank And Lillian Gilbreth Philippines. -RA NO. 8293 OF 1997
What is the term for using a computer to trick
individuals into providing personal information?
_____ is used to change the flow of execution. Phishing This would help you to keep your private life as
Loop Control Statement restrictive as possible online, no matter how
many people follow you. Don’t post sensitive
What is the practice of protecting data from data online
What are the 3 types of control structures? unauthorized access, theft, or misuse? Computer
Selection Security
Loop Three Types of Computer:
Sequence McAfee
What type of intellectual property identifies Norton
goods or services produced by a specific Kaspersky Lab
Is a programming language construct or operator company? Trademark
that tests some kind of relation between two
entities? Parallelogram Four Types Of Computer Security:
What security measure is used to browse the Information Security
internet securely? VPN Network Security
Give at least three (3) primary relational operator?
Endpoint Security
Less than
What law protects and secures the exclusive Internet Security
Less than or Equal to
Equal to rights of creators in the Philippines? Republic Act
8293 Give at least 3 Punishments and Fines
_____ it is an operator that used symbol or words to Under RA 8293 Infringement Legal
connect expression. Logical Operator Actions
What type of security protects the confidentiality,
Enforcement
integrity, and availability of data? Information
Penalties or Remedies
_____ a logical operator that inverts its Security
truth value. NOT

What type of malware replicates itself and can


Flowchart is easy to convert into any infect all programs and files on a system? Virus
language code. Programming

What do you call a malicious program that can


Flowchart plays the role of a _____ which makes the replicate itself without human interaction? Worm
program development process easier. Blueprint

What is the set of principles governing the use of


_______ is a fundamental skill in computer science and computers? Computer Ethics
problem-solving. WRITING ALGORITHM

What term refers to unequal access to technology


_____ is a high-level description of the algorithm, written between urban and remote areas? Digital Divide
in a way that resembles code but is more readable. It
helps in visualizing the logic without getting bogged
down by syntax. PSEUDOCODE What type of security includes features
introduced during application development to
prevent threats?
It is a type of symbol that is used for input and output Application Security
operation. Parallelogram

Study of ethical issues and decision-making in


He is known as the father of algebra -AL-Kwarizmi computing. Computer Ethics

A step-step procedure for solving a problem or


accomplishing some end. Algorithm ________ of Computer Ethics defined by the Computer
Ethics Institute. Ten Commandments
What term refers to the unauthorized access to
someone's private information? Invasion of Privacy
__________ Is a malicious program that is installed into a
computer without the knowledge of its user. Viruses
What is the malicious software that provides
unauthorized access while hiding its existence? Rootkit
________ is a malicious software designed to provide
unauthorized access to a computer or restricted areas
What is the legal protection for original creative while actively making its existence. Rootkit
works? Copyright

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy