What kind of skills do you need to be a software developer?
Software developers need to know programming languages, data structures and algorithms, the software development process, and information security measures
What is the full form of GIU?
Graphical User Interface
What is software development?
Software development is the process of designing, creating, testing, and maintaining software applications.
Which one of the following is NOT a security threat?
Virus
Firewall
Trojan
Irresponsible User Practices
Firewall
You can protect yourself against spam or fraudulent emails by:
- using a spam filter
- never clicking on links that you are suspicious of
- being aware of different types of fraudulent email
- all of these
all of these
What is the software?
The programs and other operating information used by a computer.
What are the components of a GUI?
Visual elements like windows, icons, menus, buttons, and pointers (WIMP) with input controls (text fields, sliders) and navigational tools (scroll bars, toolbars).
Who develops software?
Programmers (coders), software engineers, software developers
What's the name given to the use of electronic messaging systems to send an unsolicited message, usually repeatedly?
Spam
Which of the following is true?
- Viruses cannot be spread via email.
- Viruses can completely destroy all the data on your computer.
- Anti-virus software will always prevent a virus from attacking your computer.
Viruses can completely destroy all the data on your computer.
One kind of software is called .... software, which is normally free to use.
open source
The background of the screen is called the .... , which contains labelled pictures called icons.
Tell the word.
Desktop
Put these stages of the software development process in the best order:
a. The customer checks and approves the final version.
b. Speak with the people who will use the new software and analyse how they will use it.
c. Plan the project, write the specifications and prepare instructions for the programmers.
d. Test and debug the code.
e. Write the code.
b c e d a
What's the name given to harassment using electronic forms of contact?
CyberBullying
What's the name given to tricking a user into revealing confidential information such as an access code or a credit- card number?
Phishing
Sometimes when software stops responding you are forced to manually abort the program yourself by pressing some strange combination of keys such as...
Control-Alt-Delete.
Translate into English: Удобный интерфейс
User-friendly interface
What are the some tools for software development?
Code Editor – The Writing Tool
Compiler – The Translator
Debugger – The Problem Finder
Testing Tools – Make Sure It Works
Which one of the following is NOT a characteristic of a secure password?
- Contains Uppercase letters
- Contains Numbers
- Is random
- Contains Names and Dates
Contains Names and Dates
What's the name given to redirecting anyone trying to visit a certain site elsewher?
Hijacking
Examples of open software include most popular programming languages, operating systemsand thousands of applications.
Cive some examples.
Linux, Mozilla Firefox, Open Office and others
In the context of common computer graphical elements, what does the acronym WIMP represent?
- Window, icon, menu, and pointer.
- Work station, interface, megabyte, and program.
- Wide array, interface, multi array, and path.
Window, icon, menu, and pointer.
Which of the following is an example of programming software?
- Operating Systems
- Integrated Development Environments
- Media Players
- Disk cleanup tools
Integrated Development Environments.
Programming software provides tools for developers to write, test, and debug code.
What is a harmful program disguised as a gift usually in free music or games. The hacker will gain access to the computer when installed.
Trojan
What's the name given to using another person's identification code or using that person's files before he or she has logged off (disconnected from a network account)?
Piggybacking