Library

How to become an EDITx Author?

Let us show you the magic of creating questions for hundreds of IT lovers

EDITx is an open IT Library of questions to share and gain knowledge. Become an EDITx author because you care: share your knowledge to fit everyone benefit with a quality IT education.

What you get...

As contributor of the IT library, you allow others to use your questions, in the same way you can make use of theirs. Nevertheless, you keep the intellectual property on your work and will be notified any time that an author is using your questions or when someone answers your questions. Moreover, your privileged status allows you to set up private and public tests, to share your questions with your students, friends, colleagues or acquaintances and to get the results in real time.

... is what you give !

To become an EDITx Author, you just need to set up 5 QCM questions, in the field of your choice, and indicate the right answer. If your questions allows a better "Education in IT for X", you will receive the status and advantages of an EDITx Author.

Post date Author Category Question Stats
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
UX/Usability

In eye tracking, what is the term used to describe when a person looks at an element in the...

303 answers
58 good - 245 bad
 
01.10.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Database

Which SQL keyword is used to delete all values from the table ?

185 answers
64 good - 121 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Algorithmic

Which values will be stored in variables i and k after 10 iterations of the following loop ?

802 answers
580 good - 222 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
UX/Usability

Which one of the following expressions best describes the UX product below ?

95 answers
24 good - 71 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Database

In software engineering, the physical data model derives from :

56 answers
17 good - 39 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Database

With SQL, how do you insert new values into the table “Persons”, so that the values of...

62 answers
31 good - 31 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
UX/Usability

Which one of the following expressions best describes the UX product below ?

87 answers
23 good - 64 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
UX/Usability

Complete the following sentence with the appropriate expression.

690 answers
662 good - 28 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Linux commands

Which Linux command allows a permitted user to execute a command as the superuser ?

74 answers
26 good - 48 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Database

The SQL LIKE clause is used to ...

59 answers
22 good - 37 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
UX/Usability

Which one of Nielsen’s principles do these three user interfaces most fit?

841 answers
219 good - 622 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
UX/Usability

Which of the following problems is not likely to be revealed in paper prototype evaluation?

544 answers
315 good - 229 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Security

Which term is used to describe a program that self-replicates after hooking itself onto...

79 answers
14 good - 65 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
UX/Usability

Which one of the following expressions best describes the product below?

933 answers
340 good - 593 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
UX/Usability

How is called an operation performed by one or more user(s) on one or more object(s) in order to...

279 answers
12 good - 267 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Database

With SQL, how do you select the column "Firstname" from a table named "Emp" and the associated...

56 answers
25 good - 31 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Database

The SQL SELECT clause ...

64 answers
12 good - 52 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Algorithmic

Which value will be stored in a variable k after the loop has finished executing ?

137 answers
97 good - 40 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Logic

Which valid conclusion can you infer from the following premise ? Premise : ((p → q) ∧ p)

90 answers
8 good - 82 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Algorithmic

What is the complexity of the following algorithm expressed in Big-O notation ?

441 answers
163 good - 278 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
UX/Usability

What is the purpose of task models?

244 answers
180 good - 64 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Algorithmic

Which values will be stored in variables a and b after the execution of the following code ?...

790 answers
84 good - 706 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
UX/Usability

For an internal demonstration one of your colleagues has sketched a new system on a few sheets...

908 answers
824 good - 84 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Database

In software engineering, which model is normally developed to be instantiated as a database ?

74 answers
8 good - 66 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
UX/Usability

Which products should be created during contextual task analysis?

296 answers
180 good - 116 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Algorithmic

What is the complexity of the following algorithm expressed in Big-O notation ?

676 answers
274 good - 402 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Security

Which term is used to describe all of the hostile and intrusive program codes that are designed...

89 answers
30 good - 59 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Project Management

Risk Management Planning is an example of an iterative planning process.

84 answers
17 good - 67 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Project Management

What tool can a project manager use to determine whether it is better to make or buy a product...

97 answers
13 good - 84 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Database

In relational databases, primary key is used to :

57 answers
35 good - 22 bad