Library

How to become an EDITx Author?

Let us show you the magic of creating questions for hundreds of IT lovers

EDITx is an open IT Library of questions to share and gain knowledge. Become an EDITx author because you care: share your knowledge to fit everyone benefit with a quality IT education.

What you get...

As contributor of the IT library, you allow others to use your questions, in the same way you can make use of theirs. Nevertheless, you keep the intellectual property on your work and will be notified any time that an author is using your questions or when someone answers your questions. Moreover, your privileged status allows you to set up private and public tests, to share your questions with your students, friends, colleagues or acquaintances and to get the results in real time.

... is what you give !

To become an EDITx Author, you just need to set up 5 QCM questions, in the field of your choice, and indicate the right answer. If your questions allows a better "Education in IT for X", you will receive the status and advantages of an EDITx Author.

Post date Author Category Body Stats
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Database

In relational database schema, aggregation entity set’s primary key is composed of :

64 answers
3 good - 61 bad
 
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
UX/Usability

What is usability?

123 answers
73 good - 50 bad
 
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Database

With SQL, how do you select EmployeeName and count the number of projects they are working on...

64 answers
10 good - 54 bad
 
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Database

The SQL WHERE clause ...

63 answers
22 good - 41 bad
 
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
UX/Usability

How is called an operation performed by one or more user(s) on one or more object(s) in order to...

195 answers
103 good - 92 bad
 
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Database

In relational databases, foreign key (FK), represents a column or multiple columns that :

69 answers
23 good - 46 bad
 
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
UX/Usability

What is the difference between Augmented Reality (AR) and Virtual Reality (VR)?

224 answers
86 good - 138 bad
 
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
UX/Usability

What is formative usability testing?

586 answers
23 good - 563 bad
 
27.09.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
UX/Usability

What is an artifact model?

644 answers
456 good - 188 bad
 
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Algorithmic

Which values will be stored in variables a and b after the execution of the following code ?...

351 answers
253 good - 98 bad
 
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Database

In software engineering, which model is normally developed to be instantiated as a database ?

74 answers
8 good - 66 bad
 
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
UX/Usability

For an internal demonstration one of your colleagues has sketched a new system on a few sheets...

385 answers
81 good - 304 bad
 
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Logic

Which valid conclusion can you infer from the following premise ? Premise : (p ∧ q)

77 answers
18 good - 59 bad
 
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
UX/Usability

Which the temporal operator is used in the task model below?

764 answers
107 good - 657 bad
 
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Database

In relational database schema, weak entity set’s primary key is composed of :

68 answers
8 good - 60 bad
 
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Database

Which SQL keyword is used to delete all values from the table ?

185 answers
64 good - 121 bad
 
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
UX/Usability

Which products should be created during contextual task analysis?

966 answers
470 good - 496 bad
 
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Database

With SQL, how do you retrieve the Firstname of the user from table Users whose Username is “...

62 answers
22 good - 40 bad
 
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
UX/Usability

Which one of the following statements best characterizes a usability test?

455 answers
149 good - 306 bad
 
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Algorithmic

Which value will be stored in a variable k after the loop has finished executing ?

196 answers
37 good - 159 bad
 
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
UX/Usability

What is a post-test questionnaire particularly useful for?

146 answers
24 good - 122 bad
 
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
UX/Usability

For which type of data is it possible to calculate the mean and median?

523 answers
100 good - 423 bad
 
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Security

Which term is used to describe a program that self-replicates after hooking itself onto...

79 answers
14 good - 65 bad
 
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Database

The SQL LIKE clause is used to ...

59 answers
22 good - 37 bad
 
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Database

With SQL, how do you select the column "Firstname" from a table named "Emp" and the associated...

56 answers
25 good - 31 bad
 
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
UX/Usability

Abstract User Interfaces can be generated from the task model.

693 answers
270 good - 423 bad
 
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Security

Which term is used to describe all of the hostile and intrusive program codes that are designed...

89 answers
30 good - 59 bad
 
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Linux commands

Which Linux command allows a permitted user to execute a command as the superuser ?

74 answers
26 good - 48 bad
 
21.08.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
UX/Usability

Here is a list of 9 tips for conducting contextual task analysis.

476 answers
128 good - 348 bad
 
27.09.2019
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
UX/Usability

Which one of Nielsen’s principles do these interactive components most fit?

456 answers
202 good - 254 bad