Library

How to become an EDITx Author?

Let us show you the magic of creating questions for hundreds of IT lovers

EDITx is an open IT Library of questions to share and gain knowledge. Become an EDITx author because you care: share your knowledge to fit everyone benefit with a quality IT education.

What you get...

As contributor of the IT library, you allow others to use your questions, in the same way you can make use of theirs. Nevertheless, you keep the intellectual property on your work and will be notified any time that an author is using your questions or when someone answers your questions. Moreover, your privileged status allows you to set up private and public tests, to share your questions with your students, friends, colleagues or acquaintances and to get the results in real time.

... is what you give !

To become an EDITx Author, you just need to set up 5 QCM questions, in the field of your choice, and indicate the right answer. If your questions allows a better "Education in IT for X", you will receive the status and advantages of an EDITx Author.

Post date Author Category Question Stats
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
UX/Usability

Some users of a text processing system erroneously believe that all changes since the last save...

376 answers
58 good - 318 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Algorithmic

What is the complexity of the following algorithm expressed in Big-O notation ?

618 answers
132 good - 486 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
UX/Usability

For an internal demonstration one of your colleagues has sketched a new system on a few sheets...

173 answers
164 good - 9 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
UX/Usability

What do wireframes most usefully indicate?

720 answers
454 good - 266 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Database

In relational database schema, aggregation entity set’s primary key is composed of :

64 answers
3 good - 61 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Database

The SQL WHERE clause ...

63 answers
22 good - 41 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Security

Which attack is an electronic monitoring for digital networks designed to find out passwords or...

106 answers
32 good - 74 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Database

In software engineering, the entity-relationship model that establishes the overall scope of...

52 answers
16 good - 36 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
UX/Usability

What is usability?

866 answers
658 good - 208 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Database

In software engineering, the physical data model derives from :

56 answers
17 good - 39 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
UX/Usability

What is the difference between Augmented Reality (AR) and Virtual Reality (VR)?

811 answers
488 good - 323 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
UX/Usability

Which one of the following expressions best describes the UX product below ?

99 answers
17 good - 82 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Database

In relational databases, foreign key (FK), represents a column or multiple columns that :

69 answers
23 good - 46 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Database

The SQL LIKE clause is used to ...

59 answers
22 good - 37 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
UX/Usability

Complete the following sentence with the appropriate expression.

966 answers
858 good - 108 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Database

In relational databases, primary key is used to :

57 answers
35 good - 22 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
UX/Usability

Which one of the following expressions best describes the UX product below ?

95 answers
24 good - 71 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
UX/Usability

Which one of Nielsen’s principles do these three user interfaces most fit?

338 answers
159 good - 179 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Algorithmic

What is the complexity of the following algorithm expressed in Big-O notation ?

185 answers
107 good - 78 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Database

With SQL, how do you select EmployeeName and count the number of projects they are working on...

64 answers
10 good - 54 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Database

In software engineering, which model is normally developed to be instantiated as a database ?

74 answers
8 good - 66 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Database

In relational database schema, weak entity set’s primary key is composed of :

68 answers
8 good - 60 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Algorithmic

Which value will be stored in a variable k after the loop has finished executing ?

845 answers
256 good - 589 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Linux commands

Which Linux command creates a new directory with name path ?

73 answers
34 good - 39 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Algorithmic

Which values will be stored in variables a and b after the execution of the following code ?...

654 answers
586 good - 68 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
UX/Usability

On a certain website users are required to enter their credit card number as 16 consecutive...

363 answers
314 good - 49 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Project Management

What tool can a project manager use to determine whether it is better to make or buy a product...

97 answers
13 good - 84 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
UX/Usability

Which one of the following statements is correct?

499 answers
100 good - 399 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Linux commands

Which Linux command is used to changes the file mode (permission) of each given file, folder,...

74 answers
29 good - 45 bad
 
26.03.2018
Suzanne Kieffer
Research Associate at Université Catholique de Louvain
Database

With SQL, how do you retrieve the Firstname of the user from table Users whose Username is “...

62 answers
22 good - 40 bad