Time, Cost, Effort
Read through the list below and try to remember the list for each item. Then reveal the list to see if you were correct.
This works best if you are active. If there is anything you haven't memorised, make sure you have it in your study notes then try writing out the list several times. Come back a bit later and do this again.
Time, Cost, Effort
accessibility, accuracy, attractiveness, clarity, communication of message, completeness, readability, relevance, timeliness, or usability
binary, boolean, character and numeric (integer and floating point)
- Sometimes a question will refer to character and text datatypes, in this case character is for a single character only.
Arrays, associative arrays, classes, fields, hash tables, linked lists, queues, records and stacks
Comma separated values (csv), Plain text (txt), eXtensible Markup Language (XML)
- also maybe binary files such as for music or video
classes, control structures, functions, instructions and methods
interviews, observation, reports and surveys
economic, legal, social, technical, usability
Authentication, data protection
data dictionaries, mock-ups, object descriptions, pseudocode
affordance, interoperability, marketability, security, usability
agile, spiral, waterfall
adjustments to tasks and timeframes, annotations and logs
identification and sequencing of tasks, time allocation, dependencies, milestones and the critical path
existence, type, range
archiving, backing up, disposing of files and security
Meaningful Comments, Syntax
- consider meaningful variable names as well for efficiency, maintainability, avoiding errors
Accuracy, Authenticity, Reasonableness, Relevance, Correctness, Timeliness
- Timeliness refers to being able to access the data when it is needed, not to the data being up to date (this would be currency).
accidental, deliberate and events-based
Social Engineering, Man in the Middle, Data Breaches
cross-site scripting, SQL injections
version control, user authentication, encryption, software updates
usernames and passwords, access logs and audit trails, access restrictions, encryption, firewalls and system protection.
Equipment controls include zoned security strategies, barrier techniques and biometrics.