subject

Which stage of the waterfall model is most like the simple model's stage 5: write the code? (select the best answer.)

question 1 options:

maintenance

verification

design

implementation

question 2 (1 point)
saved

which of the following types of client requirements are what the program needs to do with the input it receives? (select the best answer.)

question 2 options:

input requirements

system processing requirements

output requirements

constraining requirements

question 3 (1 point)
saved

which of the following testing methods focuses on how well a program works? (select the best answer.)

question 3 options:

quality assurance

alpha release testing

forking

automated testing

question 4 (1 point)
saved

agile software development and extreme programming are examples of what approach to software development? (select the best answer.)

question 4 options:

iterative and incremental development

the simple model of development

the waterfall model of development

ucd development

question 5 (1 point)
saved

what information does a version control system keep track of? (select the best answer.)

question 5 options:

changes made to a software program's code and who made changes to it

the client requirements that the final project must satisfy

communications between programmers who are working on related features

the features that are currently being developed by programming teams and the status of each feature

question 6 (1 point)
saved

which document describes a chosen solution for a problem and defines the agreement between the client and the group completing the project? (select the best answer.)

question 6 options:

the ucd

the gui

the fdd

the sow

question 7 (1 point)
saved

what is a constraint? (select the best answer.)

question 7 options:

a feature that the programmers want to include in a project

something the client wants included in a project

something that limits your project

a program that only includes basic features

question 8 (1 point)
saved

which of the following types of software hides its code and doesn't let other people change it? (select the best answer.)

question 8 options:

proprietary software

shelfware

forked software

open source software

question 9 (1 point)
saved

a/an is a software program or piece of code that a program needs in order to work. (select the best answer.)

question 9 options:

external factor

dependency

paradigm

sow

question 10 (1 point)
saved

in the simple model of software development, which stage includes interviewing users? (select the best answer.)

question 10 options:

stage 3: select a solution

stage 4: create a plan

stage 2: think of possible solutions

stage 5: write the code

question 11 (1 point)
saved

a/an development method is one in which the development does not follow a predictable or planned course of action. (select the best answer.)

question 11 options:

incremental

informal

waterfall

spiral

question 12 (1 point)

which programming paradigm uses lists of instructions to complete its tasks? (select the best answer.)

question 12 options:

functional programming

reflective programming

object-oriented programming

procedural programming

question 13 (1 point)

specific actions that a user might perform when using the software are called (select the best answer.)

question 13 options:

use cases

usability testing

qa

client requirements

question 14 (1 point)

what is the first phase in which a software program is usable enough to test? (select the best answer.)

question 14 options:

pre-alpha release

alpha release

beta release

feature complete

question 15 (1 point)

what is metaprogramming? (select the best answer.)

question 15 options:

telling a computer what to do, instead of telling the computer how to do it

organizing programmers into small teams who focus on small parts of a program

writing a program that writes or changes other programs

organizing a programming team according to the features a program should have

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 23.06.2019 11:00
What are the possible consequences of computer hacking? what is computer piracy? describe some examples. what are the effects of computer piracy? what are the possible consequences of computer piracy? what is intentional virus setting? describe some examples. what are the effects of intentional virus setting? what are the possible consequences of intentional virus setting? what is invasion of privacy? describe some examples. what are the effects of invasion of privacy? what are the possible consequences of invasion of privacy? what is an acceptable use policy and what is the purpose of the acceptable use policy what is intellectual property and how can you use it?
Answers: 1
question
Computers and Technology, 23.06.2019 14:30
Select the correct answer. andy received a potentially infected email that was advertising products. andy is at risk of which type of security threat? a. spoofing b. sniffing c. spamming d. phishing e. typo-squatting
Answers: 2
question
Computers and Technology, 23.06.2019 18:00
What can a word user do with the customize ribbon dialog box? check all that apply. minimize the ribbon add a new tab to the ribbon remove a group from a tab add a group to a tab choose which styles appear choose which fonts appear choose tools to appear in a group
Answers: 1
question
Computers and Technology, 24.06.2019 06:30
Ineed to know the anwser to all these questions
Answers: 2
You know the right answer?
Which stage of the waterfall model is most like the simple model's stage 5: write the code? (selec...
Questions
Questions on the website: 13722363