Notes
![]() ![]() Notes - notes.io |
System analysis in software engineering is:
System analysis in software engineering are the activities that comprise software engineering as the process in the production of software.
NOT the process of analyzing engineering systems for the production of software
The software process in systems analysis involves:
software specification, software design and implementation, software validation, and software evolution
This software process comprises of four main activities. They are software specification, software design and implementation, software validation, and software evolution.
Which of the following processes is not part of the requirements engineering stage?
requirements evolution
Requirements engineering stage comprises of only requirements analysis, requirements validation, and requirements specification.
The four design components in the software design and implementation stage are:
architectural design, interface design, component design, and database design
Software validation in software engineering is important and ensures:
Components designed work accordingly, the system functions properly as a whole, and the process uncovers any requirement shortfalls and omissions.
Software validation is important and ensures components designed work accordingly, the system functions properly as a whole, and the process uncovers any requirement shortfalls and omissions.
The process where we conceptualize a new system, hardware or software or both, from cradle to grave is known as _____.
All of the answers are all used to describe the process for conceptualizing a new information system.
Which would be a task performed during the maintenance phase of the system development life cycle?
A software patch could be applied to the system.
Which phase of the system development life cycle involves using flowcharts to diagram how information flows through the proposed system?
In the design phase, we develop flowcharts to track input, processing, and output of the proposed system.
When you dispose of an obsolete software or hardware system, what's the top concern?
Archiving the data and then destroying the old system so there's no data breach.
In the _____ phase of the system development life cycle, the IT staff talks to end users for details about their requirements for the new system.
The analysis phase is when the requirements gathering from end users takes place.
What is a benefit to systems analysis and design?
Decrease data redundancy
What should not be considered in the planning phase of systems analysis and design in business?
Storage
In business systems analysis and design, _____ are responsible for implementing the system?
Once the system is ready to go, the rollout should be undergone by communicating to all user groups and individuals who will have access to the system. Employees, managers, and executives are all considered to have various parts in this stage. Executives and managers will provide the decisions on training, considering what is needed by the organization. Managers and employees will have constant contact with the system and their transfer of knowledge to the new system is required.
Which is not a step in the process of systems analysis and design in business?
The four steps involved are:
1. Identify business needs
2. Planning and Analysis
3. Design system
4. Implementation and Follow up
It is important to have strategic steps in place before beginning the process to minimize confusion within the organization.
What should be involved in the implementation stage of business systems analysis and design?
All of the answers are correct
Communication with all members of the team, finding out how information relates to other departments, and testing are all crucial to the implementation stage. If, at any part, one of these items is left out this could cause confusion and frustration among all members of the team.
Which of the following is a clear contribution of the PESTLE analysis?
It enables analysis of the political environment
Which of the following can business process modelling software be used for?
Creating process diagrams
Which of the following is a major contribution of the SWOT analysis?
wrongCarrying out intensive business process analysis
The SWOT analysis tool is commonly used to assess and organization against these four components which are strengths, weaknesses, threats, and opportunities
The _____ software can help business analysts develop graphical representations of various concepts.
Mock-up
Which of the following is a notation used in Business Process Modelling?
The most common business process notations are the Business Process Modelling Notation and the Unified Modelling Language.
When writing a program that will do bookkeeping for a small business, the document review step should include going through _____.
a list of documents to be input into the system
When is the Requirements Document finished?
Not until the customer agrees that it accurately describes everything he wants the program to do.
What is the purpose of Requirements Gathering?
To find out what the customer wants the program to do.
Who is responsible for writing the Requirements Document?
The programmer
During the meetings and surveys step, the programmer should:
Examine the customer's business as a whole and how it does things.
Why is the planning phase important?
In the planning phase, it is important to get an understanding of what is needed and the requirements for this software project.
In what phase of the spiral model is risk analyzed?
Risk Analysis
In what phase of the spiral model is testing done?
Testing is completed in the developmental stage of the spiral model.
In the spiral model, at what phase do customers evaluate the project?
Evaluation Phase
How many phases are in the spiral model?
4
The unit testing phase of the V-shaped model for Systems Development Life Cycle does what?
The unit testing is related to the coding phase. It makes sure all the bugs are worked out of the coding instructions.
tests for errors in code
In the V-shaped model for Systems Development Life Cycle, the _____ step is where the engineer spends time with the customer to record their goals and wants accurately.
This is the first verification step. It's important to know exactly what the customer wants before going any further so you have a clear understanding of the kind of software that is required.
Business Requirements Specification
How is the V-shaped model for Systems Development Life Cycle different from the waterfall model?
The waterfall model is a cascading approach, whereas the V-shaped model cascades down and then back up again, with a testing phase to go with each step.
In the V-shaped model each phase has a testing step associated with it
What are the primary phases of V-shaped model for Systems Development Life Cycle?
Verification focuses on the development part of the software while validation focuses on the testing part of the software.
Verification and Validation
What is a disadvantage of the V-shaped model for Systems Development Life Cycle?
The phases of the V-shaped model are very rigid with rigorous testing required. Most of the time it is impossible to redo previous phases.
It lacks flexibility as a software development model
What signals the end of an iteration?
The release step
What is the Agile Manifesto?
4 values
What are the five steps of agile iterative cycles?
Define, design, build, test, release
Adopting an agile project management approach improves an organization's ability to _____ project changes.
What is agile?
A blanket term describing several flexible project management approaches
Which of the following is a disadvantage of the agile model in system development life cycle (SDLC)?
Less emphasis on creating documentation, making it difficult for new team members
Which of the following is NOT a characteristic of the agile model of development in system development life cycle (SDLC)?
Detailed planning is completed before the project begins
Which of the following is true of the agile model in system development life cycle (SDLC)?
Since the project team delivers changes frequently, users must complete testing almost continuously. In an agile model, the project team creates documentation, but it must serve a specific purpose. Because it is less detailed than in a traditional model, new team members may have a difficult time figuring out how the system works.
Which of the following is NOT an advantage of the agile model in system development life cycle (SDLC)?
Required project resources are known at the beginning of the project
What are the steps in the agile model in system development life cycle (SDLC)?
Planning, analysis, design, development, testing, implementation
Which projects is SDLC best suited for?
Large IT projects
How are the stages of SDLC implemented?
Sequentially, without overlapping
Which of the following is a software development model, based on SDLC concept?
Waterfall
Which SDLC stage has to be signed off before the Requirements definition stage can commence?
Analysis and planning
Select a true statement from the following:
SDLC follows a predictive approach, with detailed planning and defined user requirements. Agile follows an adaptive approach, based on quick feedback exchange and continuous design improvements.
Which of these roles is responsible for managing JAD sessions?
Your Answer
Facilitator
Watch Correct Answer Read Answer Explanation
One of the major advantages of JAD is:
Your Answer
Time saving
Watch Correct Answer Read Answer Explanation
Disadvantages of JAD include:
Your Answer
Lack of time commitment
Watch Correct Answer Read Answer Explanation
The interactions between one of these groups form the basis of JAD methodology. Which one is it?
The JAD approach involves business and technology stakeholders interacting to define project requirements.
Watch Correct Answer Read Answer Explanation
The method of communication during a JAD session is through:
Your Answer
Face-to-face discussion
Which role has the ultimate decision on project delivery in a joint application development environment?
Project executives as the representatives of the customers with the final authority on project execution.
Joint application development (JAD) methodology is dependent on?
JAD as a methodology is predicated on the stakeholders' collaboration and interactions to gather requirements.
Which of the following software paradigms involve product delivery on a short cycle of iterations?
Agile delivery ensures software products are developed and shipped in short cycle or iterations based on the agreements between the commercial and technical stakeholders on what is known as minimum viable product (MVP)
What role is responsible for ensuring documentation of the JAD session?
scribe
requirement gathering
Modularizable products and awesome software designers
Visual Studio
Prototypes
The first step in any design project, including Rapid Application Development, is to perform a needs analysis to determine what exactly is needed and what need a product will fulfill.
Performing BPM requires the use of a map, drawing, or other graphical representation. The following graphical representation of a business process is called a(n) _____.
The primary intent of BPM is to _____ when performing business processes.
What does business process modeling require?
Why is business process modeling important to both client and vendor?
It optimizes efficiency when performing business processes, and activities associated with producing products and services.
The chart or diagram that shows dependency among events that when viewed will show which events are impacted if a specific event is delayed is the _____.
Gantt Chart
Why is business process modeling important to both client and vendor?
It optimizes efficiency when performing business processes, and activities associated with producing products and services.
The detail analysis of records that may be verbally communicated.
What is a survey review?
Survey review lets us look at possible changes to the business, which may (or may not) affect the programming project. This is done by analyzing the results of surveys given to your customer and/or his customers. These surveys are not necessarily limited to topics about your program. They may include other business-related questions that won't directly affect your code.
What is the purpose of the Requirements Document Review?
To make sure you understand what the customer wants
Which of the following are NOT validation tools?
Code Mapping might be useful, but it does not help you understand directly what your customer wants, therefore it is NOT a validation tool.
Why is prototyping so important?
Because even written explanations reviewed several times can still have holes and misunderstandings.
make the entire work process easier because you got all requests and expectations out in the open early on.
When you decide what is inside and what is outside the context boundary, you are doing what?
Setting scope is the process of declaring what is in or out of the context boundary. Use your experience, good judgment, and an understanding of the situation to make those decisions. Remember, it's your diagram, so it's your call.
Which of the following is TRUE about external interfaces?
A context diagram of an existing system shows real interfaces. These interfaces represent important system integration points that must be thoroughly tested. An external entity can have both input and output interfaces with a system. Finally, interface data flows provide clues as to how the system internally processes inputs into outputs.
What is information hiding in a system context diagram?
Information hiding is masking the internal structure of a system's operations in order to concentrate on the context bubble and its relation to external entities.
What is a system context diagram?
A high-level map of a system and its surrounding environment
Which one of the following is the BEST reason for NOT showing data flows between external entities on a context diagram?
They are out of scope.
What is a class diagram?
A class diagram in an UML model is used to represent the actual classes that would be coded later in the software development process.
A UML model is a representation of software before the coding phase and may contain symbols, diagrams, text, pseudo-code or anything that describes a software system.
UML model diagrams consist of the following basic elements :
Class, object, interface, collaboration, use case, note, node and package.
Requirements modeling phase
UML is a pictorial language consisting of symbols, diagrams, text, pseudo-code or anything that describes a software system. UML models are particularly used in the requirements modeling phase to model software systems.
A company has created a standard use case format, but its business analysts are having difficulty remembering all of the details of the format. To make it easier to comply with the format, the company creates a _____.
A use case template can help use case authors by providing a starting point for filling in the use case details in a specific format.
What is an actor in a use case?
In a use case, an actor is any human or external system that interacts with the system.
The two most commonly used kinds of UML diagrams for use cases are _____ and _____.
The two most commonly used kinds of UML diagrams for use cases are use case diagrams and sequence diagrams.
Jen wants to create detailed use case diagrams that capture all the requirements. She decides to use a _____.
A sequence diagram is the appropriate choice for capturing detailed use case requirements.
Sarah wants to create a single high-level diagram that capture most or all use cases for the system. She decides to use a _____
A use case diagram is the appropriate choice for capturing a large number of use cases at a high level.
A physical DFD can show data stores, which represent what?
A physical DFD can show data stores, which represent physical files and databases. The process pulls from and/or adds to these data stores.
Both logical and physical DFDs are more complex tools than a _____.
flowchart
It's a good idea to use a logical DFD as the basis for developing the physical DFD because:
It's a good idea to use a logical DFD as the basis for developing a physical DFD, because business processes may outlast the underlying technology. Technology can change over time, but some business processes will always exist.
In a physical DFD, the processes shown represent:
Programs and manual procedures
A _____ data flow diagram focuses on business events and the data they require and produce.
logical
An object is described as an _____ of a given class. Select the best answer
The correct answer to this question is instantiation. Instantiation is described as the process by which an object is generated or the process by which an object occurs. Objects occur from classes and are therefore referred to as instances of classes.
_____ are concrete things that are found in the real world, such as a student, a customer or a product. Select the best answer.
Objects
_____ describe objects into groupings that have some common functions or behaviours.
The correct answer to this question is Classes. A class is a program-code-mold or template that is extensible and can be used for defining and creating objects.
This phase focuses on collecting relevant information from future users of the system in order to establish what software they really need.
The correct answer to this question is Requirements Gathering. This is the phase where a software engineer attempts to fully understand what the final software application needs to deliver to the future user in order for it to be a success.
Which of the following is NOT a use for an object diagram?
Replace object-oriented design
An object diagram is most closely related to a(n) _____ diagram.
Class
An object diagram shows a(n) _____ at a given point in time.
An object is an instance of a class. Therefore, the object diagram shows an instance at a point in time.
Consider the following object diagram. Based on the diagram, which of the following is true of the Maple class?
It is an instance of the Tree class
Which of the following best describes the purpose of an object diagram?
The object diagram shows a point in time view of objects and their interactions or associations.
What is the term used to describe a six-phase process to create a new information technology system?
System Development Life Cycle
When can the design phase begin?
After the customer signs off on the second phase
Combining components to create a finished product is known as what?
How many phases are in SDLC?
6
What is also created during the design phase?
The screen's graphic display area.
By incorporating access and viewing equality into their designs.
Low Physical Effort
Simple and Intuitive Use
When violating the 'Flexibility in Use' principle the web designer performs unwanted changes to the displayed screen. Many times the user is caught off guard and becomes frustrated. The user may become so frustrated that they choose to leave the page entirely.
To see how users interact with a software design, by talking through what they're thinking.
An expert might not offer an objective view because they are too close to the development.
Information architecture is about how information is organized in an app.
User interface design is about making software easy for people to use.
User analysis.
it is platform dependent and prone to system failures and incompatibilities.
Client-Server architecture defines the network of components in which _____.
The architecture is network-based where servers supply or manage resources such as files, printers, networks, and processing power on that given network and clients are PCs or workstations that request resources from servers within their network.
Service-oriented architecture describes _____.
Service-oriented architecture is the approach in which components on the network are arranged according to the services they offer.
Service-oriented architecture does not make use of 3GLs and 4GLs because _____.
it's a platform independent architecture
Service-oriented architecture relies on _____ for its security.
SOA relies on WS (Web services) security framework.
The coding phase provides the operational component for the product. If the product isn't coded correctly, it won't work according to customer specifications and will need to be reprogrammed.
Requirements/analysis specification and design documents
The product doesn't exist until it's built. Therefore, it can only be coded after it's built.
The actual product is created, and coding of the product gives it operational capability.
Requirements gathering and analysis, design, implementation and coding
The testing phase of the software development lifecycle is the investigation and discovery phase. During the testing phase, developers uncover whether coding and programming work according to customer requirements.
Instructions each tester uses to test the software
There are several types of testing during the test phase, which include quality assurance testing (QA), system integration testing (SIT), and user acceptance testing (UAT).
During the UAT process, developers test whether the software or system works for the end user. The people who will use the software now have an opportunity to test their new product. User testing gives the customer the ability to provide feedback on software functionality.
A plan that includes the types of testing, resources for testing and how the software is tested and test scripts
Maybe an error message is the expected result or the system is not expected to write to a database. A failed test is one where the actual results do not match the expected results.
Business Analysts and/or testers
Unit Testing
Once the product is accepted by the customer, it is ready to go. The next step is to deploy.
Formal Acceptance Testing
System Testing
Risk reduction does not necessarily prevent the event from happening, but it does attempt to reduce the loss caused by the event.
Adding risks
Risk transference
A loss that will occur or will almost certainly occur is not insurable. Additionally, if you cannot quantify the loss, you cannot insure against it because there is no way for an insurance company to determine the compensation for the loss.
Risk assumption
Security analytics attempts to prevent access to a server before it is ever attempted.
Open access
A man trap is an example of a positive control system that is employed to ensure that only one person enters a location at once.
Windows should not be used in a data facility.
Biometrics uses a unique identifier that is attached to only one individual such as a fingerprint to grant access.
Project management specific software application that provides full life cycle project management
A means of managing a project by planning, organizing, and managing aspects
Software that is used for a broad variety of tasks
The most commonly used general software application project management system are spreadsheets, which are easily updated and shared.
A general software application project management system is a good choice when a project is short-term, low risk, and simple. Projects that are long-term, complex, high risk or require customer invoices are better managed using project management specific software applications.
Once the company has decided what project they'll work on, they need to decide who will do what tasks. The second step determines all of the details of the project, which includes assigning responsibilities.
Before a project can even begin, it needs to be identified. This means the project manager needs to decide what they'll be doing, what benefits the company will see, and/or what problem needs to be solved.
The project manager
A fishbone diagram looks like an arrow with lines spurring off of it. Those lines list important parts of the project like resources and materials used. When it's completed, it looks like the skeleton of a fish.
Gantt charts
To develop a project schedule, the necessary steps are:
1. Understand the scope
2. Break down the project into tasks using a Work Breakdown Structure
3. Estimate the time to complete each task
4. Assign resources to each task
5. Assign start and completion dates to each task
A chart depicting all the tasks required to complete a project
Both a task list and a Gantt chart provide a listing of the tasks required to complete the project and the ability to assign start dates, completion dates, and resources. However, a task list doesn't provide a visual representation of the schedule; a Gantt chart does.A visual representation of the project schedule
WBS stands for work breakdown structure, a chart depicting all the tasks required to complete the project.
Because the scope determines what is and is not included in the project and will ultimately determine what tasks are included in the schedule, the first step in developing a schedule is to understand the scope.
Why do projects need a project feasibility study?
What is the technical feasibility of a project?
A project is technically feasible if you have all requisite technical skills, resources and logistical requirements.
What are the steps involved in a project feasibility study?
Technical feasibility, market feasibility, organizational/managerial feasibility, financial/economic feasibility
Why should the project feasibility study include a project timeline?
Why does project feasibility include a project cost estimate?
In order to ensure that the project will not exceed budget and possibly result in failure.
Everyone works on different tasks
Brainstorming ideas for new projects.
A project represents an ongoing activity.
This table can also be used as the source information for a Gantt chart. PERT is like a modern version of the original Gantt chart.
The Critical Path Method (CPM) examines all those activities that, if delayed, would delay the entire project. While the shareholders resigning would be a problem, it occurs after the project has already ended and thus does not obstruct the CPM.
Quality Control
g Quality requirements and quality control measurements
Prior to starting the project, all requirements including quality are created during planning stage
If quality assurance is not succesful then it means the product or system is not doing what its requirements are. Hence it needs to be sent back to the execution stage
g Quality Control
Cathy has decided to increase her firm's capacity in line with the mean expected increase in demand from a series of forecasts she had prepared. What strategy is she employing?
Abe decides to only increase his firm's capacity when there's actual demand sufficient to justify it. What strategy is he employing?
Lag strategy
How does capacity relate to profit?
Beth decides to increase her firm's capacity because she's forecasting a large uptick in demand. What strategy is she employing?
Lead strategy
How is output related to capacity?
An increase in capacity can increase output.
While Gantt charts are named after Henry Gantt who developed them in the 1910's, Karol Adamiecke was the first one to develop them in the 1890's.
Gantt charts are helpful for managing large projects that have multiple activities that need to be performed. Writing large reports, developing a software prototype, and planning a convention, all have multiple activities that need to be completed as the projects move forward. Answering emails is not a large enough project to warrant use of a Gantt chart.
Read Answer Explanation
Whether using specialized software, Microsoft Word or Excel, or a piece of paper, in order to determine the individual activities and create a time line for completion, the project must first be analyzed to determine if it a good fit for a Gantt chart.
There are two types of upfront techniques that can be valuable: critical path and earned value analysis.
Program evaluation and review technique'
Which is not part of the work breakdown structure in an earned value analysis?
estimated cost
The EVA consists of three parts, which are referred to as the work breakdown structure (WBS):
planned value - budget assigned to the work.
actual cost- total cost actually incurred.
earned value - shows how much value the project is worth at that point.
The critical path process:
define tasks - in sequence of execution.
create flowchart - that identifies each activity's relationship to another.
identify path type - critical versus non-critical.
define completion dates - for each task.
set alternative paths - for critical paths that could fail.
The most critical path determines the estimated time to complete the entire project. There are two types of estimates: deterministic, when there is a high degree of certainty in the estimate, and probabilistic, which requires an optimistic, realistic, and pessimistic estimate that is analyzed to create a best guess.
Critical path does not have slack or float available and will extend the schedule. Critical path is the chain of activities that will delay your project completion date. Activities can have negative float and not be on critical path if they are not logically tied to anything.
This type of relationship requires that an activity finishes before the next activity starts. This is also known as head to tail scheduling. This is one of four types of logical relationships in scheduling.
Critical path methodology is used to estimate the minimum duration of the project and to see how much float the schedule has. Critical path is the sequence of activities that will extend the project end date if they do not complete on schedule
Decomposition divides scope and deliverables down to manageable activities which will be sequenced for the schedule. The output of decomposition is an activities list, milestone list, and sequencing of activities and milestones.
neg slack = when the activity or project is behind schedule
-
Avoidance is a risk response strategy that eliminates a risk from a project. This can involve refraining from engaging in risky activity and/or establishing an alternative to a risk.
The risk management plan details how risks will be identified and managed throughout the course of a project. The components of a risk management plan are roles and responsibilities of people who will engage in risk management activities; methodology used for identifying, analyzing and responding to risk; budget; and timing of risk management activities.
What is used to give a visual representation of risks, their chance of occurrence and the potential damage they can cause on a project?
Probability/impact matrix
What is a common tool used to transfer risk from one entity to another?
insruance
-
Which of these steps is not required for a post project implementation review?
questionaire
What is the main goal of the post project implementation review?
To avoid problems and emulate success in order to improve future projects
What is a post project review facilitator?
When is the post project implementation review conducted?
Once the project has been completed
Who should attend the post project review meeting?
everyone
Which is NOT a characteristic of the monitor and control phase?
Identification of potential risks Change control process
What is the change control process?
Process to request new changes based on unexpected risks in the project
When does the monitor and control phase occur?
Simultaneously with the execution phase
Which is NOT a step of the corrective action process?
Change request for the new process Recommending the corrective action
What is the purpose of the monitor and control phase?
To measure the performance of the new process after the execution phase
Proposed SOC Analyst position for someone to regularly check logs/backups of mission critical devi es, got shot down
Why is business process modeling important to both client and vendor?
It optimizes efficiency when performing business processes, and activities associated with producing products and services.
In a physical DFD, the processes shown represent:
Programs and manual procedures
In a physical DFD, the processes shown represent programs, program modules and manual processes that are part of a business.
What role is responsible for ensuring documentation of the JAD session?
Scribe
The scribe's role is to clarify points of discussions and document them effectively during the JAD session.
Sourcing out alternatives in system analysis is an important stage because _____.
it enables alternate solutions in components and subsystems to be tried and tested on the system
The _____ software can help business analysts develop graphical representations of various concepts.
Mock-up
How is risk related to insurance?
A risk is uninsurable if it cannot be quantified.
Which of the following software development processes follows a linear sequence from initiation and conception to maintenance?
Waterfall
The waterfall model for software development follows a linear sequence from initiation and conception to maintenance.
Which symbol is used to represent a decision in a flowchart?
Diamond
A diamond is used to represent a decision in flowchart.
The unit testing phase of the V-shaped model for Systems Development Life Cycle does what?
tests for errors in code
The unit testing is related to the coding phase. It makes sure all the bugs are worked out of the coding instructions.
Which is not a phase of the system development project?
Software Documentation
What are the components of a risk management plan?
Roles and responsibilities, methodology, budget, timing
_____ and _____ are the general types of documentation.
User, System
Dry run testing is what type of test?
static
name the types of testing in testing phase
Quality Assurance testing, system integration testing and user acceptance testing
What type of testing is performed immediately before deployment?
Formal Acceptance Testing
Combining components to create a finished product is known as what?
System
What is information hiding in a system context diagram?
Masking the internal structure of a system's operations
The process where we conceptualize a new system, hardware or software or both, from cradle to grave is known as _____.
All answers are correct
System development life cycle
Application development life cycle
Software development life cycle
The following phases are applicable to JAD except?
Requirement gathering
Sourcing out alternatives in system analysis is an important stage because _____.
it enables alternate solutions in components and subsystems to be tried and tested on the system
![]() |
Notes is a web-based application for online taking notes. You can take your notes and share with others people. If you like taking long notes, notes.io is designed for you. To date, over 8,000,000,000+ notes created and continuing...
With notes.io;
- * You can take a note from anywhere and any device with internet connection.
- * You can share the notes in social platforms (YouTube, Facebook, Twitter, instagram etc.).
- * You can quickly share your contents without website, blog and e-mail.
- * You don't need to create any Account to share a note. As you wish you can use quick, easy and best shortened notes with sms, websites, e-mail, or messaging services (WhatsApp, iMessage, Telegram, Signal).
- * Notes.io has fabulous infrastructure design for a short link and allows you to share the note as an easy and understandable link.
Fast: Notes.io is built for speed and performance. You can take a notes quickly and browse your archive.
Easy: Notes.io doesn’t require installation. Just write and share note!
Short: Notes.io’s url just 8 character. You’ll get shorten link of your note when you want to share. (Ex: notes.io/q )
Free: Notes.io works for 14 years and has been free since the day it was started.
You immediately create your first note and start sharing with the ones you wish. If you want to contact us, you can use the following communication channels;
Email: [email protected]
Twitter: http://twitter.com/notesio
Instagram: http://instagram.com/notes.io
Facebook: http://facebook.com/notesio
Regards;
Notes.io Team