Knowledge Module Glossary Terms Flashcards

1
Q

A/B Testing

A

A/B testing (sometimes called split testing) is comparing two versions of a web page to see which one performs better.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Abstraction

A

The quality of dealing with ideas rather than events.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Acceptance Testing

A

Acceptance Testing is a level of the software testing where a system is testing for acceptability. The purpose of this test is to evaluate the system’s compliance with the business requirements and assess whether it is acceptable for delivery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Activity diagrams

A

Activity diagrams are graphical representations of workflows of stepwise activities and actions with support for choice, iteration and concurrency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Actors

A

In software and systems engineering, a use case is a list of actions or event steps typically defining the iterations between a role (known in the UML as an actor) and a system to achieve a goal. The actor can be a human or other external system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Adapter pattern

A

The adapter pattern is a software design pattern (also known as a Wrapper, an alternative naming shared with the Decorator pattern) that allows the interface of an existing class to be used as another interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Agile

A

Relating to or denoting a method of project management, used especially for software development, that is characterised by the division into short phases of work and frequent reassessment and adaptation of plans.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Agile Manifesto

A

The Agile Manifesto, also called the Manifesto for Agile Software Development, is a formal proclamation of four key values and 12 principles to guide an iterative and people-centric approach to software development.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Algorithms

A

A process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Analogue data

A

Analog data is data that is represented in a physical way.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Analyse

A

Examine (something) methodically and in detail, typically in order to explain and interpret it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Anomaly

A

Something that deviates from what is standard, normal, or expected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Anivirus

A

Designed to detect and destroy computer viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

API

A

A set of functions and procedures that allow the creation of applications which access the features or data of an operating system, application, or other service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Applicability

A

An application is any program, or group of programs, that is designed for the end user. … Applications software (also called end-user programs) include such things as database programs, word processors, Web browsers and spreadsheets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Application developer

A

Application developers work in teams to identify ideas and concepts for the general public, or a specific need brought to them by a customer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Architectural pattern

A

An architectural pattern is a general, reusable solution to a commonly occurring problem in software architecture within a given context.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Array

A

An ordered series or arrangement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Ascending

A

To go up or climb.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Assembly languages

A

A low-level symbolic code converted by an assembler.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

ATM

A

A machine that dispenses cash or performs other banking services when an account holder inserts a bank card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Attribute

A

A piece of information which determines the properties of a field or tag in a database or a string of characters in a display.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Authentication

A

The process or action of verifying the identity of a user or process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Authorisation Matrix

A

Only applicable to companies that require two signatories or companies needing to perform trade transactions in Business Internet Banking.) To enable dual authorisation on financial transactions or to perform trade transactions, the primary user has to set up the authorisation matrix in Business Internet Banking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Authorisation Mechanism

A

Authorisation is a security mechanism used to determine user/client privileges or access levels related to system resources, including computer programs, files, services, data and application features. Authorisation is normally preceded by authentication for user identity verification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Backlog

A

An accumulation of uncompleted work or matters needing to be dealt with.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Backtracking

A

Backtracking is an algorithm for capturing some or all solutions to given computational issues, especially for constraint satisfaction issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Behavioural design pattern

A

In software engineering, behavioural design patterns are design patterns that identify common communication patterns between objects and realise these patterns. By doing so, these patterns increase flexibility in carrying out this communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Beta releases

A

Beta version. A pre-release of software that is given out to a large group of users to try under real conditions. Beta versions have gone through alpha testing in-house and are generally fairly close in look, feel and function to the final product; however, design changes often occur as a result.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Big bang development

A

Big bang adoption or direct changeover is the adoption type of the instant changeover, when everybody associated with the new system moves to the fully functioning new system on a given date.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Binary chop / Binary search

A

Is a search algorithm that finds the position of a target value within a sorted array.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Black Box

A

In science, computing, and engineering, a black box is a device, system or object which can be viewed in terms of its inputs and outputs (or transfer characteristics), without any knowledge of its internal workings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Blueprint

A

A blueprint is a reproduction of a technical drawing, documenting an architecture or an engineering design, using a contact print process on light-sensitive sheets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Boolean

A

A Boolean data type is a data type with only two possible values: true or false.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Brainstorming

A

Brainstorming is a group creativity technique by which efforts are made to find a conclusion for a specific problem by gathering a list of ideas spontaneously contributed by its members.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Bridge pattern

A

The bridge pattern is a design pattern used in software engineering that is meant to “decouple
an abstraction from its implementation so that the two can vary independently”, introduced by the Gang of Four. The bridge uses encapsulation, aggregation, and can use inheritance to separate responsibilities into different classes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Bubble sort

A

Bubble sort, sometimes referred to as sinking sort, is a simple sorting algorithm that repeatedly steps through the list to be sorted, compares each pair of adjacent items and swaps them if they are in the wrong order.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Buffer overflows

A

In computer security and programming, a buffer overflow, or buffer overrun, is an anomaly where a program, while writing data to a buffer, overruns the buffer’s boundary and overwrites adjacent memory locations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Bug-fix

A

A correction to a bug in a computer program or system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Builder pattern

A

Builder pattern builds a complex object using simple objects and using a step by step approach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Business Analyst

A

A business analyst (BA) is someone who analyses an organisation or business domain (real or hypothetical) and documents its business or processes or systems, assessing the business model or its integration with technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Business Case

A

A justification for a proposed project or undertaking on the basis of its expected commercial benefit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Business Drivers

A

A business driver is a resource, process or condition that is vital for the continued success and growth of a business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Change Management

A

The controlled identification and implementation of required changes within a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Changeover

A

A change from one system or situation to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Character

A

A printed or written letter or symbol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Classification

A

The action or process of classifying something.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Client GUI

A

A graphical user interface (GUI) is a human-computer interface (i.e., a way for humans to interact with computers) that uses windows, icons and menus and which can be manipulated by a mouse (and often to a
limited extent by a keyboard as well).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Cloud

A

A network of remote servers hosted on the Internet and used to store, manage, and process data in place of local servers or personal computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Code functions

A

Parameter in computer programming, a parameter is a value that is passed into a function or procedure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Code libraries

A

A set of routines for a particular operating system. Depending on the environment, code libraries may be source code, in an intermediate language or in executable form.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Cohesion

A

The action or fact of forming a united whole.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Collaboration

A

The action of working with someone to produce something.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Common failures

A

A common cause failure (CCF) is a failure where: Two or more items fail within a specified time such that the success of the system mission would be uncertain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Compliers

A

A program that converts instructions into a machine-code or lower-level form so that they can be read and executed by a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Component diagram

A

Component diagrams show the dependencies and interactions between software components.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Components

A

A part or element of a larger whole, especially a part of a machine or vehicle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Comprising

A

Consist of; be made up of.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Computable problem

A

Computability is the ability to solve a problem in an effective manner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Computational

A

Using or relating to computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Concurrency pattern

A

In software engineering, concurrency patterns are those types of design patterns that deal with the multithreaded programming paradigm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Concurrent

A

Existing, happening, or done at the same time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Confidential data

A

Confidential Data is a generalised term that typically represents data classified as Restricted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Configuration management

A

Configuration management (CM) is a system engineering process for establishing and maintaining consistency of a product’s performance, functional, and physical attributes with its requirements, design, and operational information throughout its life.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Conjunction

A

The action or an instance of two or more events or things occurring at the same point in time or space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Consequences

A

A result or effect, typically one that is unwelcome or unpleasant.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Constant

A

Occurring continuously over a period of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Constraint satisfaction

A

In artificial intelligence and operations research, constraint satisfaction is the process of finding a solution to a set of constraints that impose conditions that the variables must satisfy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Constraints

A

A limitation or restriction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Contextual enquiry

A

Contextual inquiry is a semi-structured interview method to obtain information about the context of use, where users are first asked a set of standard questions and then observed and questioned while they work in their own environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Continuity

A

The unbroken and consistent existence or operation of something over time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Copyright law

A

A copyright is a form of protection provided by the laws of the United States to authors of “original works of authorship.” This includes literary, dramatic, musical, artistic and certain other creative works.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Correction

A

A change that rectifies an error or inaccuracy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Coupling

A

The pairing of two items.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Creational design pattern

A

In software engineering, creational design patterns are design patterns that deal with object creation
mechanisms, trying to create objects in a manner suitable to the situation. The basic form of object creation could result in design problems or in added complexity to the design.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Cross-site scripting

A

Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications. XSS enables attackers to inject client-side scripts into web pages viewed by other users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Cryptography

A

The art of writing or solving codes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Cyber resilience

A

Cyber Resilience is an evolving perspective that is rapidly gaining recognition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Data

A

The quantities, characters, or symbols on which operations are performed by a computer, which may be stored and transmitted in the form of electrical signals and recorded on magnetic, optical, or mechanical recording media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Data models

A

Data models define how data is connected to each other and how they are processed and stored inside the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Data storage

A

Data storage is a general term for archiving data in electromagnetic or other forms for use by a computer or device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Data-flow models

A

A data flow model is diagrammatic representation of the flow and exchange of information within a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

DBMS

A

A database-management system (DBMS) is a computer-software application that interacts with end-users, other applications, and the database itself to capture and analyse data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Debuggers

A

A computer program that assists in the detection and correction of errors in other computer programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Decomposition

A

The state or process of decay.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Decouple

A

Separate, disengage, or dissociate (something) from something else

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Defensive programming

A

Defensive programming is a form of defensive design intended to ensure the Continuing function of a piece of software under unforeseen circumstances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Deletion

A

The removal of data from a computer’s memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Deliverable

A

A thing able to be provided, especially as a product of a development process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Denial of service

A

An interruption in an authorised user’s access to a computer network, typically one caused with malicious intent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Deployement

A

The action of bringing resources into effective action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

Design components

A

In programming and engineering disciplines, a component is an identifiable part of a larger program or construction. Usually, a component provides a particular function or group of related functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

Design documentation

A

Is a written description of a software product, that a software designer writes in order to give a software
development team overall guidance to the architecture of the software project.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Desktop

A

The working area of a computer screen regarded as a representation of a notional desktop and containing icons representing items such as files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

Detection

A

The action or process of identifying the presence of something concealed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

Developmental methodologies

A

A system development methodology refers to the framework that is used to structure, plan, and control the process of developing an information system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

DevOps

A

Is a software development and delivery process that emphasises communication and collaboration between product management, software development, and operations professionals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

Differentiation

A

An electronic device whose output signal is proportional to the derivative of its input signal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

Digital certificates

A

An attachment to an electronic message used for security purposes. The most common use of a digital
certificate is to verify that a user sending a message is who he or she claims to be, and to provide the receiver with the means to encode a reply.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

Digital data

A

Digital data, in information theory and information systems, are discrete, discontinuous representations of information or works, as contrasted with continuous, or analogue signals which behave in a continuous manner, or represent information using a continuous function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

Distributed denial of service

A

The intentional paralysing of a computer network by flooding it with data sent simultaneously from many
individual computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

DMZ

A

DMZ or demilitarized zone (sometimes referred to as a perimeter network) is a physical or logical subnetwork that contains and exposes an organisation’s external-facing services to an untrusted network, usually a larger network such as the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

Domain experts

A

Domain expert is a person who is an authority in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

Elaborate

A

Involving many carefully arranged parts or details; detailed and complicated in design and planning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

Elicitation

A

Elicitation (intelligence), collecting intelligence information from people as part of human intelligence (intelligence collection) Elicitation technique or elicitation procedure, any of various data collection techniques in social sciences or other fields to gather knowledge or information from people.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

Encapsulation

A

The action of enclosing something in or as if in a capsule.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

End-user license

A

Is a legal contract between a software application author or publisher and the user of that application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

Enhance

A

Intensify, increase, or further improve the quality, value, or extent of.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

Enterprise license

A

An enterprise license is one that is issued to a large company. It typically allows unlimited use of the program throughout the organisation, although there may be restrictions and limitations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

Entity

A

A thing with distinct and independent existence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

Entity relationship models

A

An entity-relationship model (ERM) is a theoretical and conceptual way of showing data relationships in software development.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

Equivalence classes

A

The class of all members of a set that are in a given equivalence relation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

Ergonomics

A

The study of people’s efficiency in their working environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

Error correction

A

The automatic correction of errors that arise from the incorrect transmission of digital data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

EU Anti-Spam law

A

A European law against sending commercial spam emails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

EU Cookie law

A

The Cookie Law is a piece of privacy legislation that requires websites to get consent from visitors to store or retrieve any information on a computer, smartphone or tablet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

Evaluate

A

Form an idea of the amount, number, or value of; assess.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

Evolutionary

A

Relating to the gradual development of something.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

Exception handling

A

Exception handling is the process of responding to the occurrence, during computation, of exceptions –
anomalous or exceptional conditions requiring special processing – often changing the normal flow of program execution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

Executable code

A

Software in a form that can be run in the computer. It typically refers to machine language, which is the set of native instructions the computer carries out in hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

Exhibits

A

Manifest clearly (a quality or a type of behaviour).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

Extreme Programming

A

Extreme programming (XP) is a software development methodology which is intended to improve software quality and responsiveness to changing customer requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

Facet

A

A particular aspect or feature of something.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

Fault tree analysis

A

Fault tree analysis (FTA) is a top down, deductive failure analysis in which an undesired state of a system is analysed using Boolean logic to combine a series of lower-level events.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

Feasibility phase

A

Feasibility is the measure of how well a proposed system solves the problems, and takes advantage of the opportunities identified during scope definition and how it satisfies the requirements identified in the
requirements analysis phase of system development.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

Feasibility study

A

An assessment of the practicality of a proposed plan or method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

Features

A

A distinctive attribute or aspect of something.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

Financial feasibility

A

A financial feasibility study is an assessment of the financial aspects of something.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

Finiteness

A

Having boundaries or limits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

Firewall

A

Protect (a network or system) from unauthorised access with a firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

First line support

A

This role is generally phone or sometimes internet support based.

132
Q

Flowcharts

A

A graphical representation of a computer program in relation to its sequence of functions (as distinct from the data it processes).

133
Q

Framework

A

A basic structure underlying a system, concept, or text.

134
Q

Functional decomposition

A

A method of business analysis that dissects a complex business process to show its individual elements. Functional decomposition is used to facilitate the understanding and management of large and/or complex processes and can be used to help solve problems.

135
Q

Functional requirements

A

In Software engineering and systems engineering, a functional requirement defines a function of a system or its component. A function is described as a set of inputs, the behaviour, and outputs.

136
Q

Fuzzing

A

Make or become blurred or indistinct.

137
Q

Games Developer

A

Game developers, more specifically known as videogame developers or video game designers, are
software developers and engineers who create videogames.

138
Q

Gantt chart

A

A chart in which a series of horizontal lines shows the amount of work done or production completed in certain periods of time in relation to the amount planned for those periods.

139
Q

GUI designers

A

The graphical user interface (GUI /ɡuːiː/), is a type of user interface that allows users to interact with electronic devices through graphical icons and visual indicators such as secondary notation, instead of text-based user interfaces, typed command labels or text navigation.

140
Q

Hardware

A

The machines, wiring, and other physical components of a computer or other electronic system.

141
Q

Hexadecimal

A

Relating to or using a system of numerical notation that has 16 rather than 10 as its base.

142
Q

High-level languages

A

A high-level language (HLL) is a programming language such as C, FORTRAN, or Pascal that enables a programmer to write programs that are more or less independent of a particular type of computer

143
Q

Host services

A

A hosting service is a type of Internet hosting service that allows individuals and organisations to make their website accessible via the World Wide Web.

144
Q

Human computer interaction

A

HCI (human-computer interaction) is the study of how people interact with computers and to what
extent computers are or are not developed for successful interaction with human beings.

145
Q

Idealisation

A

The action of regarding or representing something as perfect or better than in reality.

146
Q

Impediment

A

A hindrance or obstruction in doing something.

147
Q

Implementation

A

The process of putting a decision or plan into effect; execution.

148
Q

Implications

A

The conclusion that can be drawn from something although it is not explicitly stated.

149
Q

Incremental

A

Relating to or denoting an increase or addition, especially one of a series on a fixed scale.

150
Q

Incur

A

Become subject to (something unwelcome or unpleasant) as a result of one’s own behaviour or actions.

151
Q

Independent tester

A

An independent test organisation is an organisation, person, or company that tests products, materials, software, etc. according to agreed requirements.

152
Q

Inheritance

A

A thing that is inherited.

153
Q

Initiation

A

The action of beginning something.

154
Q

Insertion

A

The action of inserting something.

155
Q

Intangible

A

Unable to be touched; not having physical presence.

156
Q

Integers

A

A number which is not a fraction; a whole number.

157
Q

Intent

A

Intention or purpose.

158
Q

Interaction diagrams

A

Interaction diagrams are models that describe how a group of objects collaborate in some behaviour - typically a single use-case.

159
Q

Interface

A

A device or program enabling a user to communicate with a computer.

160
Q

Interface design

A

User Interface Design is the design of websites, computers, appliances, machines, mobile communication devices, and software applications with the focus on the user’s experience and interaction.

161
Q

Interpreters

A

A program that can analyse and execute a program line by line.

162
Q

Ishakawa diagrams

A

A diagram that shows the causes of an event and is often used in manufacturing and product development to outline the different steps in a process, demonstrate where quality control issues might arise and determine which resources are required at specific times.

163
Q

Iterative method

A

In computational mathematics, an iterative method is a mathematical procedure that generates a sequence of improving approximate solutions for a class of problems, in which the n-th approximation is derived from the previous ones.

164
Q

ITIL

A

Information Technology Infrastructure Library

165
Q

Kanban

A

A Japanese manufacturing system in which the supply of components is regulated through the use of an instruction card sent along the production line.

166
Q

Kepner - Tregoe root cause analysis

A

Kepner-Tregoe Root Cause Analysis(RCA) consulting services are crucial to increase the speed of solving complex business problems or, eliminating those intractable problems once and for all.

167
Q

Lean

A

Lean management is an approach to running an organisation that supports the concept of continuous
improvement, a long-term approach to work that systematically seeks to achieve small, incremental changes in processes in order to improve efficiency and quality.

168
Q

Library functions

A

Library functions in C language are inbuilt functions which are grouped together and placed in a common place called library.

169
Q

Limitations

A

A limiting rule or circumstance; a restriction.

170
Q

Linear

A

Resembling a straight line; having only one dimension

171
Q

List data

A

A list or sequence is an abstract data type that represents a countable number of ordered values, where the same value may occur more than once.

172
Q

Load testing

A

Load testing is the process of putting demand on a software system or computing device and measuring its response.

173
Q

Local network

A

A local area network (LAN) is a network that connects computers and other devices in a relatively small area, typically a single building or a group of buildings.

174
Q

Logical design

A

The process of logical design involves arranging data into a series of logical relationships called entities and attributes. An entity represents a chunk of information. In relational databases, an entity often maps to a table. An attribute is a component of an entity and helps define the uniqueness of the entity

175
Q

Logical operators

A

Logic operations include any operations that manipulate Boolean values. Boolean values are either true or false.

176
Q

Loop

A

A structure, series, or process, the end of which is connected to the beginning.

177
Q

Machine languages

A

A computer programming language consisting of binary or hexadecimal instructions which a computer can respond to directly.

178
Q

Maintainability

A

Maintainability is defined as the probability of performing a successful repair action within a given time. In other words, maintainability measures the ease and speed with which a system can be restored to operational status after a failure occurs.

179
Q

Major release

A

Traditionally, major releases are numbered as X.0; for example, WordPerfect 6.0 is a major release, significantly different from any previous version; whereas WordPerfect 6.1 has only minor changes, and is, thus, only a revision.

180
Q

Malware

A

Software which is specifically designed to disrupt, damage, or gain authorised access to a computer system.

181
Q

Manual testing

A

Manual testing is the process of manually testing software for defects. It requires a tester to play the role of an end user whereby they utilise most of the application’s features to ensure correct behaviour.

182
Q

Market risk

A

Market risk is the possibility for an investor to experience losses due to factors that affect the overall performance of the financial markets in which he is involved.

183
Q

Matrix structure

A

A matrix organisational structure is a company structure in which the reporting relationships are set up as a grid, or matrix, rather than in the traditional hierarchy. In other words, employees have dual reporting relationships - generally to both a functional manager and a product manager.

184
Q

MDM

A

Master data management (MDM) is a comprehensive method of enabling an enterprise to link all of its critical data to one file, called a master file, that provides a common point of reference.

185
Q

Minor release

A

Is the release of a product that does not add new features or content.

186
Q

Mobile App Developer

A

Mobile app development is a term used to denote the act or process by which a mobile app is developed for mobile devices, such as personal digital assistants, enterprise digital assistants or mobile phones.

187
Q

Mobile device management

A

Mobile device management (MDM) is an industry term for the administration of mobile devices, such as
smartphones, tablet computers, laptops and desktop computers.

188
Q

Mobile platform

A

The hardware/software environment for laptops, tablets, smartphones and other portable devices.

189
Q

Mobilising

A

Make (something) movable or capable of movement.

190
Q

Modules

A

Each of a set of standardised parts or independent units that can be used to construct a more complex structure, such as an item of furniture or a building.

191
Q

MoSCoW Prioritisation

A

The MoSCoW method is a prioritisation technique used in management, business analysis, project management, and software development to reach a common understanding with stakeholders on the importance they place on the delivery of each requirement - also known as MoSCoW prioritisation or MoSCoW analysis.

192
Q

Motivation

A

A reason or reasons for acting or behaving in a particular way.

193
Q

Non-functional requirements

A

A non-functional requirement (NFR) is a requirement that specifies criteria that can be used to judge the
operation of a system, rather than specific behaviours. They are contrasted with functional
requirements that define specific behaviour or functions.

194
Q

Object-orientated models

A

Object-oriented modelling (OOM) is the construction of objects using a collection of objects that contain stored values of the instance variables found within an object. Unlike models that are record-oriented, object-oriented values are solely objects.

195
Q

On-demand self-service

A

On-demand self-service, as defined by the National Institute of Standards and Technology, is the process through which “a consumer (or any user for our purposes here) can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without requiring human interaction.

196
Q

Open-source license

A

Open source licenses are licenses that comply with the Open Source Definition — in brief, they allow software to be freely used, modified, and shared. To be approved by the Open Source Initiative (also known as the OSI), a licence must go through the Open Source Initiative’s license review process.

197
Q

Operational risk

A

Operational risk is the prospect of loss resulting from inadequate or failed procedures, systems or policies.
Employee errors. Systems failures. Fraud or other criminal activity. Any event that disrupts business processes.

198
Q

Operational software

A

An operating system (OS) is system software that manages computer hardware and software resources and provides common services for computer programs.

199
Q

Organisational Behaviour Theory

A
Organisational behaviour (OB) is the study of the way people interact within groups. Normally this study is
applied in an attempt to create more efficient business organisations.
200
Q

Outsource

A

Contract (work) out.

201
Q

Paradigm

A

A set of linguistic items that form mutually exclusive choices in particular syntactic roles.

202
Q

Parallel running

A

Parallel running is one of the ways to change from an existing system to a new one. This conversion takes place as the technology of the old system is outdated so a new system is needed to be installed to replace the old one.

203
Q

Parameter

A

A numerical or other measurable factor forming one of a set that defines a system or sets the conditions of its operation.

204
Q

Patent infringement

A

Patent infringement is the commission of a prohibited act with respect to a patented invention without
permission from the patent holder.

205
Q

Pattern recognition

A

Pattern recognition is a branch of machine learning that focuses on the recognition of patterns and regularities in data, although it is in some cases considered to be nearly synonymous with machine learning.

206
Q

Peer reviews

A

Evaluation of scientific, academic, or professional work by others working in the same field.

207
Q

Penetration testing

A

Penetration testing (also called pen testing) is the practice of testing a computer system, network or Web application to find vulnerabilities that an attacker could exploit.

208
Q

Perpetual license

A

A perpetual software license is a type of software license that authorises an individual to use a program
indefinitely.

209
Q

Phased deployment

A

Phased deployment is a method of changing from an existing system to a new one. Phased deployment is a changeover process that takes place in stages.

210
Q

Polymorphism

A

The condition of occurring in several different forms.

211
Q

Precision

A

Refinement in a measurement, calculation, or specification, especially as represented by the number of digits given.

212
Q

Prevention

A

The action of stopping something from happening or arising.

213
Q

Principle of least privilege

A

The principle of least privilege (POLP) is the practice of limiting access to the minimal level that will allow normal functioning. Applied to employees, the principle of least privilege translates to giving people the lowest level of user rights that they can have and still do their jobs.

214
Q

Privacy law

A

Privacy law refers to the laws that deal with regulating, storing, and using of Personally identifiable information of individuals, which can be collected by governments, public or private organisations, or by other individuals

215
Q

Privileged access

A

A privileged user, by definition, is a “user who, by virtue. of function, and / or seniority, has been allocated powers within the computer system, which are. significantly greater than those available to the majority of users.”

216
Q

Procedure call

A

A programmatic subroutine (function, procedure, or subprogram) or a sequence of code which performs a specific task, as part of a larger program that is grouped as one or more statement blocks with the typical intention of doing one thing well.

217
Q

Product owner

A

The product owner is typically a project’s key stakeholder. Part of the product owner responsibilities is to have a vision of what he or she wishes to build, and convey that vision to the scrum team.

218
Q

Program documentation

A

The program documentation is a kind of documentation that gives a comprehensive procedural description of a program.

219
Q

Programming

A

The process of writing computer programs.

220
Q

Programming language

A

In computer technology, a set of conventions in which instructions for the machine are written. There are many languages that allow humans to communicate with computers; C++, BASIC, and Java are some common ones.

221
Q

Project Lifecycle

A

All projects can be mapped to the following simple life cycle structure: starting the project, organising and preparing, carrying out the work, and closing the project. This is known as a four-phase life cycle and the phases are usually referred to as: initiation, planning, execution, and closure.

222
Q

Project manager

A

The person in overall charge of the planning and execution of a particular project.

223
Q

Proprietary license

A

Proprietary software is software that is owned by an individual or a company (usually the one that developed it).

224
Q

Pros and Cons

A

The pros and cons of something are its advantages and disadvantages, which you consider carefully so that you can make a sensible decision.

225
Q

Prototypes

A

A first or preliminary version of a device or vehicle from which other forms are developed.

226
Q

Pseudocode

A

A notation resembling a simplified programming language, used in program design.

227
Q

Quality control

A

A system of maintaining standards in manufactured products by testing a sample of the output against the specification.

228
Q

Randomised

A

Make random in order or arrangement; employ random selection or sampling in (an experiment or procedure).

229
Q

Recursive

A

Relating to or involving a program or routine of which a part requires the application of the whole, so that its explicit interpretation requires in general many successive executions.

230
Q

Refactor code

A

Code refactoring is the process of restructuring existing computer code—changing the factoring—without changing its external behaviour.

231
Q

Regression testing

A

Regression testing is a type of software testing which verifies that software which was previously developed and tested still performs the same way after it was changed or interfaced with other software.

232
Q

Regulated

A

Control (something, especially a business activity) by means of rules and regulations.

233
Q

Release management

A

Release management is the process of managing, planning, scheduling and controlling a software build through different stages and environments; including testing and deploying software releases.

234
Q

Requirements Analysis

A

Requirements analysis, also called requirements engineering, is the process of determining user expectations for a new or modified product. These features, called requirements, must be quantifiable, relevant and detailed. In software engineering, such requirements are often called functional specifications.

235
Q

Requirements documentation

A

Requirements Document (PRD) is a document containing all the requirements to a certain product. It is written to allow people to understand what a product should do.

236
Q

Retrospective

A

Looking back on or dealing with past events or situations.

237
Q

Return on investment (ROI)

A

Return on investment (ROI) is usually expressed as a percentage and is typically used for personal financial decisions, to compare a company’s profitability or to compare the efficiency of different investments. The return on investment formula is: ROI = (Net Profit / Cost of Investment) x 100.

238
Q

Rigour

A

The quality of being extremely thorough and careful.

239
Q

Risk reduction

A

Measures to reduce the frequency or severity of losses, also known as loss control. May include engineering, fire protection, safety inspections, or claims management.

240
Q

Routine upgrade

A

Commonplace tasks, chores, or duties as must be done regularly or at specified intervals; typical or everyday activity.

241
Q

Scalability

A

The ability of a computing process to be used or produced in a range of capabilities.

242
Q

Scope creep

A

Scope creep (also called requirement creep, function creep, or kitchen sink syndrome) in project management refers to changes, continuous or uncontrolled growth in a project’s scope, at any point after the project begins. This can occur when the scope of a project is not properly defined, documented, or controlled.

243
Q

Screen magnifier

A

A screen magnifier is software that interfaces with a computer’s graphical output to present enlarged screen content. By enlarging part (or all) of a screen, people with visual impairments can better see words and images.

244
Q

Scrum master

A

A scrum master is the facilitator for an agile development team. Scrum is a methodology that allows a team to self-organise and make changes quickly, in accordance with agile principles. The scrum master manages the process for how information is exchanged.

245
Q

SDLC

A

Software development life cycle.

246
Q

Second line support

A

Onsite IT requests are usually passed to the 2nd Line Support personnel

247
Q

Secure development

A

Secure development is a practice to ensure that the code and processes that go into developing applications are as secure as possible. Secure development entails the utilisation of several processes, including the implementation of a Security Development Lifecycle (SDL) and secure coding itself.

248
Q

Security scanning

A

A test of a network’s vulnerabilities. A security scan does not attempt to break into the network illegally; rather it tries to find areas of vulnerability. A security scan uses a variety of automated software tools, typically performing hundreds of routine tests and checks.

249
Q

Semantics

A

The branch of linguistics and logic concerned with meaning. The two main areas are logical semantics, concerned with matters such as sense and reference and presupposition and implication, and lexical semantics, concerned with the analysis of word meanings and relations between them.

250
Q

Sensitive data

A

Sensitive data encompasses a wide range of information and can include: your ethnic or racial origin; political opinion; religious or other similar beliefs; memberships; physical or mental health details; personal life; or criminal or civil offences. These examples of information are protected by your civil rights.

251
Q

Sequence diagrams

A

A sequence diagram is an interaction diagram that shows how objects operate with one another and in what order. It is a construct of a message sequence chart. A sequence diagram shows object interactions arranged in time sequence.

252
Q

Sequential File

A

A file that contains records or other elements that are stored in a chronological order based on account number or some other identifying data. In order to locate the desired data, sequential files must be read starting at the beginning of the file.

253
Q

Sequential running

A

Something that is sequential often follows a numerical or alphabetical order, but it can also describe things that aren’t numbered but still need to take place in a logical order, such as the sequential steps you follow for running a program on your computer.

254
Q

Server

A

A computer or computer program which manages access to a centralised resource or service in a network.

255
Q

Server GUI

A

Is a graphical (rather than purely textual) user interface to a computer.

256
Q

Service Desk

A

A Service Desk is a primary IT function within the discipline of IT service management (ITSM) as defined by the Information Technology Infrastructure Library (ITIL).

257
Q

Service Manager

A

The Service Manager has overall accountability for defining the service, ensuring services meet the business need and are delivered in accordance with agreed business requirements, and managing the service lifecycle – often in conjunction with a Service Team.

258
Q

Singleton pattern

A

In software engineering, the singleton pattern is a software design pattern that restricts the instantiation of a class to one object. This is useful when exactly one object is needed to coordinate actions across the system.

259
Q

Site License

A

A site license is a type of software license that allows the user to install a software package in several computers simultaneously, such as at a particular site (facility) or across a corporation.

260
Q

SLA

A

Service level agreement.

261
Q

Social engineering

A

The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.

262
Q

Software

A

The programs and other operating information used by a computer.

263
Q

Software architecture

A

Software architecture is the structure of an information system consisting of entities and their externally. visible properties, and the relationships among them.

264
Q

Software designer

A

A Software designer is responsible for the process of implementing software solutions to one or more sets of problems.

265
Q

Software developer

A

A software developer is a person concerned with facets of the software development process, including the research, design, programming, and testing of computer software. Other job titles which are often used with similar meanings are programmer, software analyst, and software engineer.

266
Q

Software licensing

A

A software license is a legal instrument (usually by way of contract law, with or without printed material)
governing the use or redistribution of software. Under United States copyright law all software is copyright protected, in source code as also object code form.

267
Q

Software release engineer

A

Release engineering, frequently abbreviated as RE or as the clipped compound Releng, is a sub-discipline
in software engineering concerned with the compilation, assembly, and delivery of source code into finished products or other software components.

268
Q

Software specifications

A

A software requirements specification (SRS) is a description of a software system to be developed. It lays out functional and non-functional requirements, and may include a set of use cases that describe user interactions that the software must provide.

269
Q

Sprint leader

A

The leader of a sprint is responsible for designing and running the sprint. The leader must choose / describe the tickets in the sprint and completes (or at least coordinates) reviewing of the code submitted during the sprint.

270
Q

SQL

A

SQL is an abbreviation for structured query language, and pronounced either see-kwell or as separate
letters.SQL is a standardised query language for requesting information from a database.

271
Q

SQL injection vulnerability

A

SQL injection is a code injection technique, used to attack data-driven applications, in which nefarious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker).

272
Q

SSADM

A

SSADM (Structured Systems Analysis & Design Method) is a widely-used computer application development method in the UK, where its use is often specified as a requirement for government computing projects. It is increasingly being adopted by the public sector in Europe.

273
Q

Stakeholder

A

A person with an interest or concern in something, especially a business.

274
Q

State pattern

A

The state pattern is a behavioural software design pattern that implements a state machine in an object-oriented
way.

275
Q

Static code analysis

A

Static code analysis, is a method of computer program debugging that is done by examining the code without executing the program. The process provides an understanding of the code structure, and can help to ensure that the code adheres to industry standards.

276
Q

Storage devices

A

A piece of computer equipment on which information can be stored.

277
Q

Strategy pattern

A

The strategy pattern (also known as the policy pattern) is a behavioural software design pattern that enables selecting an algorithm at runtime.

278
Q

String searching

A

A search string is the combination of characters and words that make up the search being conducted.

279
Q

Strong password protection

A

Encrypt passwords to make them more difficult to crack or guess.

280
Q

Structural decomposition

A

Structural decomposition refers to the process by which a complex problem or system is broken down into parts that are easier to conceive, analyse, develop, or maintain.

281
Q

Structural design pattern

A
Structural design patterns are design patterns that ease the design by identifying a simple way to realise
relationships between entities. Examples of Structural Patterns include: Adapter pattern: 'adapts' one interface for a class into one that a client expects.
282
Q

Structure

A

The arrangement of and relations between the parts or elements of something complex.

283
Q

Sub-network

A

A part of a larger network such as the Internet.

284
Q

Supplier relationship management

A

Supplier relationship management (SRM) is the discipline of strategically planning for, and managing, all interactions with third party organisations that supply goods and/or services to an organisation in order to maximise the value of those interactions.

285
Q

Syllabus

A

The subjects in a course of study or teaching.

286
Q

Synonymous

A

Having the same meaning as another word or phrase in the same language.

287
Q

Syntax

A

The structure of statements in a computer language.

288
Q

Systems architect

A

Systems architects define the architecture of a computerised system (i.e., a system composed of software and hardware) in order to fulfil certain requirements. Such definitions include: a breakdown of the system into components, the component interactions and interfaces (including with the environment, especially the user), and the technologies and resources to be used in the design.

289
Q

Systems components

A

A system component is a process, program, utility, or another part of a computer’s operating system that helps to manage different areas of the computer.

290
Q

Tangible

A

Perceptible by touch.

291
Q

TDD

A

Test-driven development (TDD) is a software development process that relies on the repetition of a very short development cycle: Requirements are turned into very specific test cases, then the software is improved to pass the new tests, only

292
Q

Technical Architect

A

Responsible for defining the overall structure of a program or system. You’ll act as project manager, overseeing IT assignments that are aimed at improving the business, and ensuring all parts of the project run smoothly.

293
Q

Technical feasibility

A

Is the measure of how well a proposed system solves the problems, and takes advantage of the opportunities identified during scope definition and how it satisfies the requirements identified in the requirements analysis phase of system development.

294
Q

Technical specialists

A

An information technology specialist applies technical expertise to the implementation, monitoring, or maintenance of IT systems. Specialists typically focus on a specific computer network, database, or systems administration function.

295
Q

Technical support

A

A service provided by a hardware or software company which provides registered users with help and advice about their products.

296
Q

Temporary workaround

A

A workaround is a bypass of a recognised problem in a system. A workaround is typically a temporary fix that implies that a genuine solution to the problem is needed.

297
Q

Terminology

A

The body of terms used with a particular technical application in a subject of study, theory, profession, etc.

298
Q

Test coverage

A

Test coverage is defined as a technique which determines whether our test cases are actually covering the application code and how much code is exercised when we run those test cases.

299
Q

Test data

A

Test data is data which has been specifically identified for use in tests, typically of a computer program. Some data may be used in a confirmatory way, typically to verify that a given set of input to a given function produces some expected result.

300
Q

Test engineer

A

A test engineer is a professional who determines how to create a process that would best test a particular product in manufacturing, quality assurance or related areas.

301
Q

Test management tool

A

Test management most commonly refers to the activity of managing the computer software testing process. A test management tool is software used to manage tests (automated or manual) that have been previously specified by a test procedure. It is often associated with automation software.

302
Q

Test plan

A

A test plan is a document detailing the objectives, target market, internal beta team, and processes for a specific beta test for a software or hardware product.

303
Q

Test script

A

A test script in software testing is a set of instructions that will be performed on the system
under test, to test that the system functions as expected. There are various means for executing test scripts. Manual testing. These are more commonly called test cases. Automated testing.

304
Q

The Data Protection Act

A

The Data Protection Act 1998 (DPA 1998) is an act of the United Kingdom (UK) Parliament defining the ways in which information about living people may be legally used and handled. The main intent is to protect individuals against misuse or abuse of information about them.

305
Q

The stages of the SDLC

A

The systems development life cycle (SDLC), also referred to as the application development life-cycle, is a term used in systems engineering, information systems and software engineering to describe a process for planning, creating, testing, and deploying an information system.

306
Q

Traceability

A

Traceability is the capability to trace something. In some cases, it is interpreted as the ability to verify the history, location, or application of an item by means of documented recorded identification.

307
Q

Transferrable

A

Able to be transferred or made over to the possession of another person.

308
Q

UML

A

Unified Modelling language (UML) is a standardised modelling language enabling developers to specify, visualise, construct and document artefacts of a software system.

309
Q

Unified Process (UP)

A

Unified Process is a popular iterative and incremental software development process framework.

310
Q

Uniqueness

A

The quality of being the only one of its kind.

311
Q

Unit testing

A

Unit testing is a software development process in which the smallest testable parts of an application, called units, are individually and independently scrutinised for proper operation.

312
Q

Usability testing

A

Usability testing is a way to see how easy to use something is by testing it with real users. Users are asked to complete tasks, typically while they are being observed by a researcher, to see where they encounter problems and experience confusion.

313
Q

Use cases

A

In software and systems engineering, a use case is a list of actions or event steps typically defining the
interactions between a role (known in the Unified Modelling Language as an actor) and a system to achieve a goal. The actor can be a human or other external system.

314
Q

User interface

A

The means by which the user and a computer system interact, in particular the use of input devices and software.

315
Q

Validation

A

The action of checking or proving the validity or accuracy of something.

316
Q

Variable

A

Not consistent or having a fixed pattern; liable to change.

317
Q

Variate

A

A quantity having a numerical value for each member of a group, especially one whose values occur according to a frequency distribution

318
Q

Version control

A

A component of software configuration management, version control, also known as revision control or source control, is the management of changes to documents, computer programs, large web sites, and other collections of information.

319
Q

V-model

A

In software development, the V-model represents a development process that may be considered an extension of the waterfall model, and is an example of the more general V-model.

320
Q

Vulnerability

A

The quality or state of being exposed to the possibility of being attacked.

321
Q

Waterfall

A

Relating to or denoting a method of project management that is characterised by sequential stages and a fixed plan of work.

322
Q

Web developer

A

A web developer is a programmer who specialises in, or is specifically engaged in, the development of World Wide Web applications, or applications that are run over HTTP from a web server to a web browser.

323
Q

White box

A

In computer hardware, a white box is a personal computer or server without a well-known brand name. For instance, the term applies to systems assembled by small system integrators and to home-built computer systems assembled by end users from parts purchased separately at retail.

324
Q

Wireframes

A

A skeletal three-dimensional model in which only lines and vertices are represented.

325
Q

Work package management

A

A work package is a group of related tasks within a project. Because they look like projects themselves, they are often thought of as sub-projects within a larger project. Work packages are the smallest unit of work that a project can be broken down to when creating your Work Breakdown Structure (WBS).

326
Q

Work station license

A

Is a license that may be used on a computer, where the host application (3ds Max, Cinema 4D, …) is running in “full” mode - with graphical user interface, material editor, and all other features enabled, as opposed to node license.