Library

How to become an EDITx Author?

Let us show you the magic of creating questions for hundreds of IT lovers

EDITx is an open IT Library of questions to share and gain knowledge. Become an EDITx author because you care: share your knowledge to fit everyone benefit with a quality IT education.

What you get...

As contributor of the IT library, you allow others to use your questions, in the same way you can make use of theirs. Nevertheless, you keep the intellectual property on your work and will be notified any time that an author is using your questions or when someone answers your questions. Moreover, your privileged status allows you to set up private and public tests, to share your questions with your students, friends, colleagues or acquaintances and to get the results in real time.

... is what you give !

To become an EDITx Author, you just need to set up 5 QCM questions, in the field of your choice, and indicate the right answer. If your questions allows a better "Education in IT for X", you will receive the status and advantages of an EDITx Author.

Post date Author Category Body Stats
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
UX/Usability

The figure below shows a CTT task model which describes an Automated Teller Machine (ATM) user...

811 answers
197 good - 614 bad
 
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Project Management

What tool can a project manager use to determine whether it is better to make or buy a product...

97 answers
13 good - 84 bad
 
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Database

In software engineering, a model composed of entity types and relationships that can exist...

68 answers
34 good - 34 bad
 
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Algorithmic

What is the complexity of the following algorithm expressed in Big-O notation ?

516 answers
444 good - 72 bad
 
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Security

Which attack is designed to steal a person’s login and password details so that cyber criminals...

174 answers
120 good - 54 bad
 
27.09.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
UX/Usability

Which one of Nielsen’s principles do these interactive components most fit?

462 answers
289 good - 173 bad
 
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
UX/Usability

Some users of a text processing system erroneously believe that all changes since the last save...

830 answers
490 good - 340 bad
 
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
UX/Usability

In eye tracking, what is the term used to describe when a person looks at an element in the...

685 answers
208 good - 477 bad
 
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Algorithmic

What is the complexity of the following algorithm expressed in Big-O notation ?

650 answers
649 good - 1 bad
 
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Linux commands

Which Linux command is used to changes the file mode (permission) of each given file, folder,...

74 answers
29 good - 45 bad
 
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Database

In relational database schema, aggregation entity set’s primary key is composed of :

64 answers
3 good - 61 bad
 
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Database

In relational database schema, weak entity set’s primary key is composed of :

68 answers
8 good - 60 bad
 
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
UX/Usability

Which one of the following statements is correct?

622 answers
492 good - 130 bad
 
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Database

In relational databases, foreign key (FK), represents a column or multiple columns that :

69 answers
23 good - 46 bad
 
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Linux commands

Which Linux command is used to list the contents of the folder, be it file or folder, from which...

79 answers
48 good - 31 bad
 
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Algorithmic

How many times will the following loop be executed ?

133 answers
103 good - 30 bad
 
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Database

With SQL, how do you insert new values into the table “Persons”, so that the values of...

62 answers
31 good - 31 bad
 
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
UX/Usability

Which one of the following work models is appropriate to help address the three following...

225 answers
159 good - 66 bad
 
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
UX/Usability

Which of the following problems is not likely to be revealed in paper prototype evaluation?

297 answers
61 good - 236 bad
 
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Database

In relational databases, primary key is used to :

57 answers
35 good - 22 bad
 
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Algorithmic

Which value will be stored in a variable k after the loop has finished executing ?

959 answers
870 good - 89 bad
 
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Database

The SQL SELECT clause ...

64 answers
12 good - 52 bad
 
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
UX/Usability

Which one of the following expressions best describes the UX product below ?

95 answers
24 good - 71 bad
 
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
UX/Usability

How is called an operation performed by one or more user(s) on one or more object(s) in order to...

429 answers
136 good - 293 bad
 
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Database

With SQL, how do you select EmployeeName and count the number of projects they are working on...

64 answers
10 good - 54 bad
 
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
UX/Usability

Which one of the following expressions best describes the UX product below ?

87 answers
23 good - 64 bad
 
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
UX/Usability

Which products should be created during contextual task analysis?

125 answers
107 good - 18 bad
 
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
UX/Usability

Which one of Nielsen’s principles do these three user interfaces most fit?

333 answers
129 good - 204 bad
 
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
UX/Usability

In respect to Nielsen's heuristics, what is “Help users recognize, diagnose, and recover from...

463 answers
284 good - 179 bad
 
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Algorithmic

What is the complexity of the following algorithm expressed in Big-O notation ?

374 answers
59 good - 315 bad