Test your memory of the Software Development Study Design

Read through the list below and try to remember the list for each item. Then reveal the list to see if you were correct.

This works best if you are active. If there is anything you haven't memorised, make sure you have it in your study notes then try writing out the list several times. Come back a bit later and do this again.

Time, Cost, Effort

accessibility, accuracy, attractiveness, clarity, communication of message, completeness, readability, relevance, timeliness, or usability

binary, boolean, character and numeric (integer and floating point)

- Sometimes a question will refer to character and text datatypes, in this case character is for a single character only.

Arrays, associative arrays, classes, fields, hash tables, linked lists, queues, records and stacks

Comma separated values (csv), Plain text (txt), eXtensible Markup Language (XML)

- also maybe binary files such as for music or video

classes, control structures, functions, instructions and methods

interviews, observation, reports and surveys

economic, legal, social, technical, usability

Authentication, data protection

data dictionaries, mock-ups, object descriptions, pseudocode

affordance, interoperability, marketability, security, usability

agile, spiral, waterfall

adjustments to tasks and timeframes, annotations and logs

identification and sequencing of tasks, time allocation, dependencies, milestones and the critical path

existence, type, range

archiving, backing up, disposing of files and security

Meaningful Comments, Syntax

- consider meaningful variable names as well for efficiency, maintainability, avoiding errors

Accuracy, Authenticity, Reasonableness, Relevance, Correctness, Timeliness

- Timeliness refers to being able to access the data when it is needed, not to the data being up to date (this would be currency).

accidental, deliberate and events-based

Social Engineering, Man in the Middle, Data Breaches

cross-site scripting, SQL injections

version control, user authentication, encryption, software updates

usernames and passwords, access logs and audit trails, access restrictions, encryption, firewalls and system protection.

Equipment controls include zoned security strategies, barrier techniques and biometrics.