Exam 8: Performing What-If Analyses

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Programmers use compilers to test code in one section, or an entire program, to determine any errors and provide suggestions to fix them.

(True/False)
4.9/5
(26)

An organization intends to purchase the license of a software to provide access to as many users as it wants, either by individual installations or network access or Internet passwords. Which of the following should the organization purchase?

(Multiple Choice)
4.7/5
(40)

Which of the following is a common infringement on copyright where people illegally copy software, movies, music, and other digital materials.

(Multiple Choice)
4.9/5
(22)

Why should we use an uninstaller that comes with an operating system rather than the system's file management program to delete the folder containing the program's files to remove a software or app from a device?

(Multiple Choice)
4.7/5
(40)

In which phase of the SDLC life cycle is the feasibility study done to determine if the project is worth pursuing?

(Multiple Choice)
5.0/5
(34)

During which phase and by whom should the software product be tested for security, hacking, and proper functionality?

(Multiple Choice)
4.7/5
(38)

Which of the following statements is/are true with regard to purchasing programs and applications online?

(Multiple Choice)
4.9/5
(34)

Which of the following translation tools does NOT produce or store object code but translates instructions statement by statement?

(Multiple Choice)
5.0/5
(25)

____________ is the process of setting up the program or app to work with your computer, mobile device, and other hardware.

(Multiple Choice)
4.8/5
(42)

If a software app is identified with a critical error after release, the development team can release a patch to address this single issue only.

(True/False)
4.9/5
(36)

Which of the following could be the disadvantage(s) of installing or running a freeware or a shareware over other paid programs?

(Multiple Choice)
4.9/5
(43)

Connie opened a link that she received in an email. It led to a webpage that congratulated her on winning $1 million. The webpage instructed her to follow a few steps after which she found her laptop functioning erratically. Connie had restricted access to her own folders and the data was encrypted. She was asked to pay for an access key to release them. What kind of malware attack is this?

(Multiple Choice)
4.8/5
(37)

Which type of security software prevents, detects, and removes the malware program that tries to collect personal information or change computer settings without your consent?

(Multiple Choice)
4.7/5
(39)

_________ software creates a personal security zone around your computer by monitoring all incoming and outgoing traffic and blocking suspicious activity.

(Multiple Choice)
4.7/5
(30)

Which of the following show the characteristics of adaptive development methodology?

(Multiple Choice)
4.9/5
(23)

When Russ opened a website on his browser, he saw an error that the site was not compatible with the browser version he was running it on. What tools could Russ use to troubleshoot this issue?

(Multiple Choice)
4.9/5
(38)

A software development team was asked to release a banking app by a certain date. The app is vast with high security access controls and multiple other features. The team could not meet the deadline with all of the features in it. Which of the following options is the best possible way to troubleshoot this scenario?

(Multiple Choice)
4.9/5
(44)

Which of the following is/are true about public domain programs?

(Multiple Choice)
4.9/5
(33)

What is the working procedure of DevOps methodology?

(Multiple Choice)
4.7/5
(37)

Designers use ___________, which are blueprints of different aspects of the program that also indicate how a user gets from one area of the program to another.

(Multiple Choice)
4.8/5
(33)
Showing 21 - 40 of 61
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)