Knowledge Module Glossary Terms Flashcards

(326 cards)

1
Q

A/B Testing

A

A/B testing (sometimes called split testing) is comparing two versions of a web page to see which one performs better.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Abstraction

A

The quality of dealing with ideas rather than events.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Acceptance Testing

A

Acceptance Testing is a level of the software testing where a system is testing for acceptability. The purpose of this test is to evaluate the system’s compliance with the business requirements and assess whether it is acceptable for delivery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Activity diagrams

A

Activity diagrams are graphical representations of workflows of stepwise activities and actions with support for choice, iteration and concurrency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Actors

A

In software and systems engineering, a use case is a list of actions or event steps typically defining the iterations between a role (known in the UML as an actor) and a system to achieve a goal. The actor can be a human or other external system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Adapter pattern

A

The adapter pattern is a software design pattern (also known as a Wrapper, an alternative naming shared with the Decorator pattern) that allows the interface of an existing class to be used as another interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Agile

A

Relating to or denoting a method of project management, used especially for software development, that is characterised by the division into short phases of work and frequent reassessment and adaptation of plans.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Agile Manifesto

A

The Agile Manifesto, also called the Manifesto for Agile Software Development, is a formal proclamation of four key values and 12 principles to guide an iterative and people-centric approach to software development.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Algorithms

A

A process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Analogue data

A

Analog data is data that is represented in a physical way.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Analyse

A

Examine (something) methodically and in detail, typically in order to explain and interpret it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Anomaly

A

Something that deviates from what is standard, normal, or expected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Anivirus

A

Designed to detect and destroy computer viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

API

A

A set of functions and procedures that allow the creation of applications which access the features or data of an operating system, application, or other service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Applicability

A

An application is any program, or group of programs, that is designed for the end user. … Applications software (also called end-user programs) include such things as database programs, word processors, Web browsers and spreadsheets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Application developer

A

Application developers work in teams to identify ideas and concepts for the general public, or a specific need brought to them by a customer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Architectural pattern

A

An architectural pattern is a general, reusable solution to a commonly occurring problem in software architecture within a given context.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Array

A

An ordered series or arrangement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Ascending

A

To go up or climb.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Assembly languages

A

A low-level symbolic code converted by an assembler.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

ATM

A

A machine that dispenses cash or performs other banking services when an account holder inserts a bank card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Attribute

A

A piece of information which determines the properties of a field or tag in a database or a string of characters in a display.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Authentication

A

The process or action of verifying the identity of a user or process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Authorisation Matrix

A

Only applicable to companies that require two signatories or companies needing to perform trade transactions in Business Internet Banking.) To enable dual authorisation on financial transactions or to perform trade transactions, the primary user has to set up the authorisation matrix in Business Internet Banking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Authorisation Mechanism
Authorisation is a security mechanism used to determine user/client privileges or access levels related to system resources, including computer programs, files, services, data and application features. Authorisation is normally preceded by authentication for user identity verification.
26
Backlog
An accumulation of uncompleted work or matters needing to be dealt with.
27
Backtracking
Backtracking is an algorithm for capturing some or all solutions to given computational issues, especially for constraint satisfaction issues.
28
Behavioural design pattern
In software engineering, behavioural design patterns are design patterns that identify common communication patterns between objects and realise these patterns. By doing so, these patterns increase flexibility in carrying out this communication.
29
Beta releases
Beta version. A pre-release of software that is given out to a large group of users to try under real conditions. Beta versions have gone through alpha testing in-house and are generally fairly close in look, feel and function to the final product; however, design changes often occur as a result.
30
Big bang development
Big bang adoption or direct changeover is the adoption type of the instant changeover, when everybody associated with the new system moves to the fully functioning new system on a given date.
31
Binary chop / Binary search
Is a search algorithm that finds the position of a target value within a sorted array.
32
Black Box
In science, computing, and engineering, a black box is a device, system or object which can be viewed in terms of its inputs and outputs (or transfer characteristics), without any knowledge of its internal workings.
33
Blueprint
A blueprint is a reproduction of a technical drawing, documenting an architecture or an engineering design, using a contact print process on light-sensitive sheets.
34
Boolean
A Boolean data type is a data type with only two possible values: true or false.
35
Brainstorming
Brainstorming is a group creativity technique by which efforts are made to find a conclusion for a specific problem by gathering a list of ideas spontaneously contributed by its members.
36
Bridge pattern
The bridge pattern is a design pattern used in software engineering that is meant to "decouple an abstraction from its implementation so that the two can vary independently", introduced by the Gang of Four. The bridge uses encapsulation, aggregation, and can use inheritance to separate responsibilities into different classes.
37
Bubble sort
Bubble sort, sometimes referred to as sinking sort, is a simple sorting algorithm that repeatedly steps through the list to be sorted, compares each pair of adjacent items and swaps them if they are in the wrong order.
38
Buffer overflows
In computer security and programming, a buffer overflow, or buffer overrun, is an anomaly where a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory locations.
39
Bug-fix
A correction to a bug in a computer program or system.
40
Builder pattern
Builder pattern builds a complex object using simple objects and using a step by step approach.
41
Business Analyst
A business analyst (BA) is someone who analyses an organisation or business domain (real or hypothetical) and documents its business or processes or systems, assessing the business model or its integration with technology.
42
Business Case
A justification for a proposed project or undertaking on the basis of its expected commercial benefit.
43
Business Drivers
A business driver is a resource, process or condition that is vital for the continued success and growth of a business.
44
Change Management
The controlled identification and implementation of required changes within a computer system.
45
Changeover
A change from one system or situation to another.
46
Character
A printed or written letter or symbol.
47
Classification
The action or process of classifying something.
48
Client GUI
A graphical user interface (GUI) is a human-computer interface (i.e., a way for humans to interact with computers) that uses windows, icons and menus and which can be manipulated by a mouse (and often to a limited extent by a keyboard as well).
49
Cloud
A network of remote servers hosted on the Internet and used to store, manage, and process data in place of local servers or personal computers.
50
Code functions
Parameter in computer programming, a parameter is a value that is passed into a function or procedure
51
Code libraries
A set of routines for a particular operating system. Depending on the environment, code libraries may be source code, in an intermediate language or in executable form.
52
Cohesion
The action or fact of forming a united whole.
53
Collaboration
The action of working with someone to produce something.
54
Common failures
A common cause failure (CCF) is a failure where: Two or more items fail within a specified time such that the success of the system mission would be uncertain.
55
Compliers
A program that converts instructions into a machine-code or lower-level form so that they can be read and executed by a computer.
56
Component diagram
Component diagrams show the dependencies and interactions between software components.
57
Components
A part or element of a larger whole, especially a part of a machine or vehicle.
58
Comprising
Consist of; be made up of.
59
Computable problem
Computability is the ability to solve a problem in an effective manner.
60
Computational
Using or relating to computers
61
Concurrency pattern
In software engineering, concurrency patterns are those types of design patterns that deal with the multithreaded programming paradigm.
62
Concurrent
Existing, happening, or done at the same time.
63
Confidential data
Confidential Data is a generalised term that typically represents data classified as Restricted.
64
Configuration management
Configuration management (CM) is a system engineering process for establishing and maintaining consistency of a product's performance, functional, and physical attributes with its requirements, design, and operational information throughout its life.
65
Conjunction
The action or an instance of two or more events or things occurring at the same point in time or space.
66
Consequences
A result or effect, typically one that is unwelcome or unpleasant.
67
Constant
Occurring continuously over a period of time.
68
Constraint satisfaction
In artificial intelligence and operations research, constraint satisfaction is the process of finding a solution to a set of constraints that impose conditions that the variables must satisfy.
69
Constraints
A limitation or restriction.
70
Contextual enquiry
Contextual inquiry is a semi-structured interview method to obtain information about the context of use, where users are first asked a set of standard questions and then observed and questioned while they work in their own environments.
71
Continuity
The unbroken and consistent existence or operation of something over time.
72
Copyright law
A copyright is a form of protection provided by the laws of the United States to authors of "original works of authorship." This includes literary, dramatic, musical, artistic and certain other creative works.
73
Correction
A change that rectifies an error or inaccuracy.
74
Coupling
The pairing of two items.
75
Creational design pattern
In software engineering, creational design patterns are design patterns that deal with object creation mechanisms, trying to create objects in a manner suitable to the situation. The basic form of object creation could result in design problems or in added complexity to the design.
76
Cross-site scripting
Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications. XSS enables attackers to inject client-side scripts into web pages viewed by other users.
77
Cryptography
The art of writing or solving codes
78
Cyber resilience
Cyber Resilience is an evolving perspective that is rapidly gaining recognition.
79
Data
The quantities, characters, or symbols on which operations are performed by a computer, which may be stored and transmitted in the form of electrical signals and recorded on magnetic, optical, or mechanical recording media.
80
Data models
Data models define how data is connected to each other and how they are processed and stored inside the system.
81
Data storage
Data storage is a general term for archiving data in electromagnetic or other forms for use by a computer or device.
82
Data-flow models
A data flow model is diagrammatic representation of the flow and exchange of information within a system.
83
DBMS
A database-management system (DBMS) is a computer-software application that interacts with end-users, other applications, and the database itself to capture and analyse data.
84
Debuggers
A computer program that assists in the detection and correction of errors in other computer programs.
85
Decomposition
The state or process of decay.
86
Decouple
Separate, disengage, or dissociate (something) from something else
87
Defensive programming
Defensive programming is a form of defensive design intended to ensure the Continuing function of a piece of software under unforeseen circumstances.
88
Deletion
The removal of data from a computer's memory.
89
Deliverable
A thing able to be provided, especially as a product of a development process.
90
Denial of service
An interruption in an authorised user's access to a computer network, typically one caused with malicious intent
91
Deployement
The action of bringing resources into effective action.
92
Design components
In programming and engineering disciplines, a component is an identifiable part of a larger program or construction. Usually, a component provides a particular function or group of related functions.
93
Design documentation
Is a written description of a software product, that a software designer writes in order to give a software development team overall guidance to the architecture of the software project.
94
Desktop
The working area of a computer screen regarded as a representation of a notional desktop and containing icons representing items such as files.
95
Detection
The action or process of identifying the presence of something concealed.
96
Developmental methodologies
A system development methodology refers to the framework that is used to structure, plan, and control the process of developing an information system.
97
DevOps
Is a software development and delivery process that emphasises communication and collaboration between product management, software development, and operations professionals.
98
Differentiation
An electronic device whose output signal is proportional to the derivative of its input signal.
99
Digital certificates
An attachment to an electronic message used for security purposes. The most common use of a digital certificate is to verify that a user sending a message is who he or she claims to be, and to provide the receiver with the means to encode a reply.
100
Digital data
Digital data, in information theory and information systems, are discrete, discontinuous representations of information or works, as contrasted with continuous, or analogue signals which behave in a continuous manner, or represent information using a continuous function.
101
Distributed denial of service
The intentional paralysing of a computer network by flooding it with data sent simultaneously from many individual computers.
102
DMZ
DMZ or demilitarized zone (sometimes referred to as a perimeter network) is a physical or logical subnetwork that contains and exposes an organisation's external-facing services to an untrusted network, usually a larger network such as the Internet.
103
Domain experts
Domain expert is a person who is an authority in
104
Elaborate
Involving many carefully arranged parts or details; detailed and complicated in design and planning.
105
Elicitation
Elicitation (intelligence), collecting intelligence information from people as part of human intelligence (intelligence collection) Elicitation technique or elicitation procedure, any of various data collection techniques in social sciences or other fields to gather knowledge or information from people.
106
Encapsulation
The action of enclosing something in or as if in a capsule.
107
End-user license
Is a legal contract between a software application author or publisher and the user of that application.
108
Enhance
Intensify, increase, or further improve the quality, value, or extent of.
109
Enterprise license
An enterprise license is one that is issued to a large company. It typically allows unlimited use of the program throughout the organisation, although there may be restrictions and limitations.
110
Entity
A thing with distinct and independent existence.
111
Entity relationship models
An entity-relationship model (ERM) is a theoretical and conceptual way of showing data relationships in software development.
112
Equivalence classes
The class of all members of a set that are in a given equivalence relation.
113
Ergonomics
The study of people's efficiency in their working environment.
114
Error correction
The automatic correction of errors that arise from the incorrect transmission of digital data.
115
EU Anti-Spam law
A European law against sending commercial spam emails.
116
EU Cookie law
The Cookie Law is a piece of privacy legislation that requires websites to get consent from visitors to store or retrieve any information on a computer, smartphone or tablet.
117
Evaluate
Form an idea of the amount, number, or value of; assess.
118
Evolutionary
Relating to the gradual development of something.
119
Exception handling
Exception handling is the process of responding to the occurrence, during computation, of exceptions – anomalous or exceptional conditions requiring special processing – often changing the normal flow of program execution.
120
Executable code
Software in a form that can be run in the computer. It typically refers to machine language, which is the set of native instructions the computer carries out in hardware.
121
Exhibits
Manifest clearly (a quality or a type of behaviour).
122
Extreme Programming
Extreme programming (XP) is a software development methodology which is intended to improve software quality and responsiveness to changing customer requirements.
123
Facet
A particular aspect or feature of something.
124
Fault tree analysis
Fault tree analysis (FTA) is a top down, deductive failure analysis in which an undesired state of a system is analysed using Boolean logic to combine a series of lower-level events.
125
Feasibility phase
Feasibility is the measure of how well a proposed system solves the problems, and takes advantage of the opportunities identified during scope definition and how it satisfies the requirements identified in the requirements analysis phase of system development.
126
Feasibility study
An assessment of the practicality of a proposed plan or method
127
Features
A distinctive attribute or aspect of something.
128
Financial feasibility
A financial feasibility study is an assessment of the financial aspects of something.
129
Finiteness
Having boundaries or limits.
130
Firewall
Protect (a network or system) from unauthorised access with a firewall.
131
First line support
This role is generally phone or sometimes internet support based.
132
Flowcharts
A graphical representation of a computer program in relation to its sequence of functions (as distinct from the data it processes).
133
Framework
A basic structure underlying a system, concept, or text.
134
Functional decomposition
A method of business analysis that dissects a complex business process to show its individual elements. Functional decomposition is used to facilitate the understanding and management of large and/or complex processes and can be used to help solve problems.
135
Functional requirements
In Software engineering and systems engineering, a functional requirement defines a function of a system or its component. A function is described as a set of inputs, the behaviour, and outputs.
136
Fuzzing
Make or become blurred or indistinct.
137
Games Developer
Game developers, more specifically known as videogame developers or video game designers, are software developers and engineers who create videogames.
138
Gantt chart
A chart in which a series of horizontal lines shows the amount of work done or production completed in certain periods of time in relation to the amount planned for those periods.
139
GUI designers
The graphical user interface (GUI /ɡuːiː/), is a type of user interface that allows users to interact with electronic devices through graphical icons and visual indicators such as secondary notation, instead of text-based user interfaces, typed command labels or text navigation.
140
Hardware
The machines, wiring, and other physical components of a computer or other electronic system.
141
Hexadecimal
Relating to or using a system of numerical notation that has 16 rather than 10 as its base.
142
High-level languages
A high-level language (HLL) is a programming language such as C, FORTRAN, or Pascal that enables a programmer to write programs that are more or less independent of a particular type of computer
143
Host services
A hosting service is a type of Internet hosting service that allows individuals and organisations to make their website accessible via the World Wide Web.
144
Human computer interaction
HCI (human-computer interaction) is the study of how people interact with computers and to what extent computers are or are not developed for successful interaction with human beings.
145
Idealisation
The action of regarding or representing something as perfect or better than in reality.
146
Impediment
A hindrance or obstruction in doing something.
147
Implementation
The process of putting a decision or plan into effect; execution.
148
Implications
The conclusion that can be drawn from something although it is not explicitly stated.
149
Incremental
Relating to or denoting an increase or addition, especially one of a series on a fixed scale.
150
Incur
Become subject to (something unwelcome or unpleasant) as a result of one's own behaviour or actions.
151
Independent tester
An independent test organisation is an organisation, person, or company that tests products, materials, software, etc. according to agreed requirements.
152
Inheritance
A thing that is inherited.
153
Initiation
The action of beginning something.
154
Insertion
The action of inserting something.
155
Intangible
Unable to be touched; not having physical presence.
156
Integers
A number which is not a fraction; a whole number.
157
Intent
Intention or purpose.
158
Interaction diagrams
Interaction diagrams are models that describe how a group of objects collaborate in some behaviour - typically a single use-case.
159
Interface
A device or program enabling a user to communicate with a computer.
160
Interface design
User Interface Design is the design of websites, computers, appliances, machines, mobile communication devices, and software applications with the focus on the user's experience and interaction.
161
Interpreters
A program that can analyse and execute a program line by line.
162
Ishakawa diagrams
A diagram that shows the causes of an event and is often used in manufacturing and product development to outline the different steps in a process, demonstrate where quality control issues might arise and determine which resources are required at specific times.
163
Iterative method
In computational mathematics, an iterative method is a mathematical procedure that generates a sequence of improving approximate solutions for a class of problems, in which the n-th approximation is derived from the previous ones.
164
ITIL
Information Technology Infrastructure Library
165
Kanban
A Japanese manufacturing system in which the supply of components is regulated through the use of an instruction card sent along the production line.
166
Kepner - Tregoe root cause analysis
Kepner-Tregoe Root Cause Analysis(RCA) consulting services are crucial to increase the speed of solving complex business problems or, eliminating those intractable problems once and for all.
167
Lean
Lean management is an approach to running an organisation that supports the concept of continuous improvement, a long-term approach to work that systematically seeks to achieve small, incremental changes in processes in order to improve efficiency and quality.
168
Library functions
Library functions in C language are inbuilt functions which are grouped together and placed in a common place called library.
169
Limitations
A limiting rule or circumstance; a restriction.
170
Linear
Resembling a straight line; having only one dimension
171
List data
A list or sequence is an abstract data type that represents a countable number of ordered values, where the same value may occur more than once.
172
Load testing
Load testing is the process of putting demand on a software system or computing device and measuring its response.
173
Local network
A local area network (LAN) is a network that connects computers and other devices in a relatively small area, typically a single building or a group of buildings.
174
Logical design
The process of logical design involves arranging data into a series of logical relationships called entities and attributes. An entity represents a chunk of information. In relational databases, an entity often maps to a table. An attribute is a component of an entity and helps define the uniqueness of the entity
175
Logical operators
Logic operations include any operations that manipulate Boolean values. Boolean values are either true or false.
176
Loop
A structure, series, or process, the end of which is connected to the beginning.
177
Machine languages
A computer programming language consisting of binary or hexadecimal instructions which a computer can respond to directly.
178
Maintainability
Maintainability is defined as the probability of performing a successful repair action within a given time. In other words, maintainability measures the ease and speed with which a system can be restored to operational status after a failure occurs.
179
Major release
Traditionally, major releases are numbered as X.0; for example, WordPerfect 6.0 is a major release, significantly different from any previous version; whereas WordPerfect 6.1 has only minor changes, and is, thus, only a revision.
180
Malware
Software which is specifically designed to disrupt, damage, or gain authorised access to a computer system.
181
Manual testing
Manual testing is the process of manually testing software for defects. It requires a tester to play the role of an end user whereby they utilise most of the application's features to ensure correct behaviour.
182
Market risk
Market risk is the possibility for an investor to experience losses due to factors that affect the overall performance of the financial markets in which he is involved.
183
Matrix structure
A matrix organisational structure is a company structure in which the reporting relationships are set up as a grid, or matrix, rather than in the traditional hierarchy. In other words, employees have dual reporting relationships - generally to both a functional manager and a product manager.
184
MDM
Master data management (MDM) is a comprehensive method of enabling an enterprise to link all of its critical data to one file, called a master file, that provides a common point of reference.
185
Minor release
Is the release of a product that does not add new features or content.
186
Mobile App Developer
Mobile app development is a term used to denote the act or process by which a mobile app is developed for mobile devices, such as personal digital assistants, enterprise digital assistants or mobile phones.
187
Mobile device management
Mobile device management (MDM) is an industry term for the administration of mobile devices, such as smartphones, tablet computers, laptops and desktop computers.
188
Mobile platform
The hardware/software environment for laptops, tablets, smartphones and other portable devices.
189
Mobilising
Make (something) movable or capable of movement.
190
Modules
Each of a set of standardised parts or independent units that can be used to construct a more complex structure, such as an item of furniture or a building.
191
MoSCoW Prioritisation
The MoSCoW method is a prioritisation technique used in management, business analysis, project management, and software development to reach a common understanding with stakeholders on the importance they place on the delivery of each requirement - also known as MoSCoW prioritisation or MoSCoW analysis.
192
Motivation
A reason or reasons for acting or behaving in a particular way.
193
Non-functional requirements
A non-functional requirement (NFR) is a requirement that specifies criteria that can be used to judge the operation of a system, rather than specific behaviours. They are contrasted with functional requirements that define specific behaviour or functions.
194
Object-orientated models
Object-oriented modelling (OOM) is the construction of objects using a collection of objects that contain stored values of the instance variables found within an object. Unlike models that are record-oriented, object-oriented values are solely objects.
195
On-demand self-service
On-demand self-service, as defined by the National Institute of Standards and Technology, is the process through which “a consumer (or any user for our purposes here) can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without requiring human interaction.
196
Open-source license
Open source licenses are licenses that comply with the Open Source Definition — in brief, they allow software to be freely used, modified, and shared. To be approved by the Open Source Initiative (also known as the OSI), a licence must go through the Open Source Initiative's license review process.
197
Operational risk
Operational risk is the prospect of loss resulting from inadequate or failed procedures, systems or policies. Employee errors. Systems failures. Fraud or other criminal activity. Any event that disrupts business processes.
198
Operational software
An operating system (OS) is system software that manages computer hardware and software resources and provides common services for computer programs.
199
Organisational Behaviour Theory
``` Organisational behaviour (OB) is the study of the way people interact within groups. Normally this study is applied in an attempt to create more efficient business organisations. ```
200
Outsource
Contract (work) out.
201
Paradigm
A set of linguistic items that form mutually exclusive choices in particular syntactic roles.
202
Parallel running
Parallel running is one of the ways to change from an existing system to a new one. This conversion takes place as the technology of the old system is outdated so a new system is needed to be installed to replace the old one.
203
Parameter
A numerical or other measurable factor forming one of a set that defines a system or sets the conditions of its operation.
204
Patent infringement
Patent infringement is the commission of a prohibited act with respect to a patented invention without permission from the patent holder.
205
Pattern recognition
Pattern recognition is a branch of machine learning that focuses on the recognition of patterns and regularities in data, although it is in some cases considered to be nearly synonymous with machine learning.
206
Peer reviews
Evaluation of scientific, academic, or professional work by others working in the same field.
207
Penetration testing
Penetration testing (also called pen testing) is the practice of testing a computer system, network or Web application to find vulnerabilities that an attacker could exploit.
208
Perpetual license
A perpetual software license is a type of software license that authorises an individual to use a program indefinitely.
209
Phased deployment
Phased deployment is a method of changing from an existing system to a new one. Phased deployment is a changeover process that takes place in stages.
210
Polymorphism
The condition of occurring in several different forms.
211
Precision
Refinement in a measurement, calculation, or specification, especially as represented by the number of digits given.
212
Prevention
The action of stopping something from happening or arising.
213
Principle of least privilege
The principle of least privilege (POLP) is the practice of limiting access to the minimal level that will allow normal functioning. Applied to employees, the principle of least privilege translates to giving people the lowest level of user rights that they can have and still do their jobs.
214
Privacy law
Privacy law refers to the laws that deal with regulating, storing, and using of Personally identifiable information of individuals, which can be collected by governments, public or private organisations, or by other individuals
215
Privileged access
A privileged user, by definition, is a “user who, by virtue. of function, and / or seniority, has been allocated powers within the computer system, which are. significantly greater than those available to the majority of users.”
216
Procedure call
A programmatic subroutine (function, procedure, or subprogram) or a sequence of code which performs a specific task, as part of a larger program that is grouped as one or more statement blocks with the typical intention of doing one thing well.
217
Product owner
The product owner is typically a project's key stakeholder. Part of the product owner responsibilities is to have a vision of what he or she wishes to build, and convey that vision to the scrum team.
218
Program documentation
The program documentation is a kind of documentation that gives a comprehensive procedural description of a program.
219
Programming
The process of writing computer programs.
220
Programming language
In computer technology, a set of conventions in which instructions for the machine are written. There are many languages that allow humans to communicate with computers; C++, BASIC, and Java are some common ones.
221
Project Lifecycle
All projects can be mapped to the following simple life cycle structure: starting the project, organising and preparing, carrying out the work, and closing the project. This is known as a four-phase life cycle and the phases are usually referred to as: initiation, planning, execution, and closure.
222
Project manager
The person in overall charge of the planning and execution of a particular project.
223
Proprietary license
Proprietary software is software that is owned by an individual or a company (usually the one that developed it).
224
Pros and Cons
The pros and cons of something are its advantages and disadvantages, which you consider carefully so that you can make a sensible decision.
225
Prototypes
A first or preliminary version of a device or vehicle from which other forms are developed.
226
Pseudocode
A notation resembling a simplified programming language, used in program design.
227
Quality control
A system of maintaining standards in manufactured products by testing a sample of the output against the specification.
228
Randomised
Make random in order or arrangement; employ random selection or sampling in (an experiment or procedure).
229
Recursive
Relating to or involving a program or routine of which a part requires the application of the whole, so that its explicit interpretation requires in general many successive executions.
230
Refactor code
Code refactoring is the process of restructuring existing computer code—changing the factoring—without changing its external behaviour.
231
Regression testing
Regression testing is a type of software testing which verifies that software which was previously developed and tested still performs the same way after it was changed or interfaced with other software.
232
Regulated
Control (something, especially a business activity) by means of rules and regulations.
233
Release management
Release management is the process of managing, planning, scheduling and controlling a software build through different stages and environments; including testing and deploying software releases.
234
Requirements Analysis
Requirements analysis, also called requirements engineering, is the process of determining user expectations for a new or modified product. These features, called requirements, must be quantifiable, relevant and detailed. In software engineering, such requirements are often called functional specifications.
235
Requirements documentation
Requirements Document (PRD) is a document containing all the requirements to a certain product. It is written to allow people to understand what a product should do.
236
Retrospective
Looking back on or dealing with past events or situations.
237
Return on investment (ROI)
Return on investment (ROI) is usually expressed as a percentage and is typically used for personal financial decisions, to compare a company's profitability or to compare the efficiency of different investments. The return on investment formula is: ROI = (Net Profit / Cost of Investment) x 100.
238
Rigour
The quality of being extremely thorough and careful.
239
Risk reduction
Measures to reduce the frequency or severity of losses, also known as loss control. May include engineering, fire protection, safety inspections, or claims management.
240
Routine upgrade
Commonplace tasks, chores, or duties as must be done regularly or at specified intervals; typical or everyday activity.
241
Scalability
The ability of a computing process to be used or produced in a range of capabilities.
242
Scope creep
Scope creep (also called requirement creep, function creep, or kitchen sink syndrome) in project management refers to changes, continuous or uncontrolled growth in a project's scope, at any point after the project begins. This can occur when the scope of a project is not properly defined, documented, or controlled.
243
Screen magnifier
A screen magnifier is software that interfaces with a computer's graphical output to present enlarged screen content. By enlarging part (or all) of a screen, people with visual impairments can better see words and images.
244
Scrum master
A scrum master is the facilitator for an agile development team. Scrum is a methodology that allows a team to self-organise and make changes quickly, in accordance with agile principles. The scrum master manages the process for how information is exchanged.
245
SDLC
Software development life cycle.
246
Second line support
Onsite IT requests are usually passed to the 2nd Line Support personnel
247
Secure development
Secure development is a practice to ensure that the code and processes that go into developing applications are as secure as possible. Secure development entails the utilisation of several processes, including the implementation of a Security Development Lifecycle (SDL) and secure coding itself.
248
Security scanning
A test of a network's vulnerabilities. A security scan does not attempt to break into the network illegally; rather it tries to find areas of vulnerability. A security scan uses a variety of automated software tools, typically performing hundreds of routine tests and checks.
249
Semantics
The branch of linguistics and logic concerned with meaning. The two main areas are logical semantics, concerned with matters such as sense and reference and presupposition and implication, and lexical semantics, concerned with the analysis of word meanings and relations between them.
250
Sensitive data
Sensitive data encompasses a wide range of information and can include: your ethnic or racial origin; political opinion; religious or other similar beliefs; memberships; physical or mental health details; personal life; or criminal or civil offences. These examples of information are protected by your civil rights.
251
Sequence diagrams
A sequence diagram is an interaction diagram that shows how objects operate with one another and in what order. It is a construct of a message sequence chart. A sequence diagram shows object interactions arranged in time sequence.
252
Sequential File
A file that contains records or other elements that are stored in a chronological order based on account number or some other identifying data. In order to locate the desired data, sequential files must be read starting at the beginning of the file.
253
Sequential running
Something that is sequential often follows a numerical or alphabetical order, but it can also describe things that aren't numbered but still need to take place in a logical order, such as the sequential steps you follow for running a program on your computer.
254
Server
A computer or computer program which manages access to a centralised resource or service in a network.
255
Server GUI
Is a graphical (rather than purely textual) user interface to a computer.
256
Service Desk
A Service Desk is a primary IT function within the discipline of IT service management (ITSM) as defined by the Information Technology Infrastructure Library (ITIL).
257
Service Manager
The Service Manager has overall accountability for defining the service, ensuring services meet the business need and are delivered in accordance with agreed business requirements, and managing the service lifecycle – often in conjunction with a Service Team.
258
Singleton pattern
In software engineering, the singleton pattern is a software design pattern that restricts the instantiation of a class to one object. This is useful when exactly one object is needed to coordinate actions across the system.
259
Site License
A site license is a type of software license that allows the user to install a software package in several computers simultaneously, such as at a particular site (facility) or across a corporation.
260
SLA
Service level agreement.
261
Social engineering
The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.
262
Software
The programs and other operating information used by a computer.
263
Software architecture
Software architecture is the structure of an information system consisting of entities and their externally. visible properties, and the relationships among them.
264
Software designer
A Software designer is responsible for the process of implementing software solutions to one or more sets of problems.
265
Software developer
A software developer is a person concerned with facets of the software development process, including the research, design, programming, and testing of computer software. Other job titles which are often used with similar meanings are programmer, software analyst, and software engineer.
266
Software licensing
A software license is a legal instrument (usually by way of contract law, with or without printed material) governing the use or redistribution of software. Under United States copyright law all software is copyright protected, in source code as also object code form.
267
Software release engineer
Release engineering, frequently abbreviated as RE or as the clipped compound Releng, is a sub-discipline in software engineering concerned with the compilation, assembly, and delivery of source code into finished products or other software components.
268
Software specifications
A software requirements specification (SRS) is a description of a software system to be developed. It lays out functional and non-functional requirements, and may include a set of use cases that describe user interactions that the software must provide.
269
Sprint leader
The leader of a sprint is responsible for designing and running the sprint. The leader must choose / describe the tickets in the sprint and completes (or at least coordinates) reviewing of the code submitted during the sprint.
270
SQL
SQL is an abbreviation for structured query language, and pronounced either see-kwell or as separate letters.SQL is a standardised query language for requesting information from a database.
271
SQL injection vulnerability
SQL injection is a code injection technique, used to attack data-driven applications, in which nefarious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker).
272
SSADM
SSADM (Structured Systems Analysis & Design Method) is a widely-used computer application development method in the UK, where its use is often specified as a requirement for government computing projects. It is increasingly being adopted by the public sector in Europe.
273
Stakeholder
A person with an interest or concern in something, especially a business.
274
State pattern
The state pattern is a behavioural software design pattern that implements a state machine in an object-oriented way.
275
Static code analysis
Static code analysis, is a method of computer program debugging that is done by examining the code without executing the program. The process provides an understanding of the code structure, and can help to ensure that the code adheres to industry standards.
276
Storage devices
A piece of computer equipment on which information can be stored.
277
Strategy pattern
The strategy pattern (also known as the policy pattern) is a behavioural software design pattern that enables selecting an algorithm at runtime.
278
String searching
A search string is the combination of characters and words that make up the search being conducted.
279
Strong password protection
Encrypt passwords to make them more difficult to crack or guess.
280
Structural decomposition
Structural decomposition refers to the process by which a complex problem or system is broken down into parts that are easier to conceive, analyse, develop, or maintain.
281
Structural design pattern
``` Structural design patterns are design patterns that ease the design by identifying a simple way to realise relationships between entities. Examples of Structural Patterns include: Adapter pattern: 'adapts' one interface for a class into one that a client expects. ```
282
Structure
The arrangement of and relations between the parts or elements of something complex.
283
Sub-network
A part of a larger network such as the Internet.
284
Supplier relationship management
Supplier relationship management (SRM) is the discipline of strategically planning for, and managing, all interactions with third party organisations that supply goods and/or services to an organisation in order to maximise the value of those interactions.
285
Syllabus
The subjects in a course of study or teaching.
286
Synonymous
Having the same meaning as another word or phrase in the same language.
287
Syntax
The structure of statements in a computer language.
288
Systems architect
Systems architects define the architecture of a computerised system (i.e., a system composed of software and hardware) in order to fulfil certain requirements. Such definitions include: a breakdown of the system into components, the component interactions and interfaces (including with the environment, especially the user), and the technologies and resources to be used in the design.
289
Systems components
A system component is a process, program, utility, or another part of a computer's operating system that helps to manage different areas of the computer.
290
Tangible
Perceptible by touch.
291
TDD
Test-driven development (TDD) is a software development process that relies on the repetition of a very short development cycle: Requirements are turned into very specific test cases, then the software is improved to pass the new tests, only
292
Technical Architect
Responsible for defining the overall structure of a program or system. You'll act as project manager, overseeing IT assignments that are aimed at improving the business, and ensuring all parts of the project run smoothly.
293
Technical feasibility
Is the measure of how well a proposed system solves the problems, and takes advantage of the opportunities identified during scope definition and how it satisfies the requirements identified in the requirements analysis phase of system development.
294
Technical specialists
An information technology specialist applies technical expertise to the implementation, monitoring, or maintenance of IT systems. Specialists typically focus on a specific computer network, database, or systems administration function.
295
Technical support
A service provided by a hardware or software company which provides registered users with help and advice about their products.
296
Temporary workaround
A workaround is a bypass of a recognised problem in a system. A workaround is typically a temporary fix that implies that a genuine solution to the problem is needed.
297
Terminology
The body of terms used with a particular technical application in a subject of study, theory, profession, etc.
298
Test coverage
Test coverage is defined as a technique which determines whether our test cases are actually covering the application code and how much code is exercised when we run those test cases.
299
Test data
Test data is data which has been specifically identified for use in tests, typically of a computer program. Some data may be used in a confirmatory way, typically to verify that a given set of input to a given function produces some expected result.
300
Test engineer
A test engineer is a professional who determines how to create a process that would best test a particular product in manufacturing, quality assurance or related areas.
301
Test management tool
Test management most commonly refers to the activity of managing the computer software testing process. A test management tool is software used to manage tests (automated or manual) that have been previously specified by a test procedure. It is often associated with automation software.
302
Test plan
A test plan is a document detailing the objectives, target market, internal beta team, and processes for a specific beta test for a software or hardware product.
303
Test script
A test script in software testing is a set of instructions that will be performed on the system under test, to test that the system functions as expected. There are various means for executing test scripts. Manual testing. These are more commonly called test cases. Automated testing.
304
The Data Protection Act
The Data Protection Act 1998 (DPA 1998) is an act of the United Kingdom (UK) Parliament defining the ways in which information about living people may be legally used and handled. The main intent is to protect individuals against misuse or abuse of information about them.
305
The stages of the SDLC
The systems development life cycle (SDLC), also referred to as the application development life-cycle, is a term used in systems engineering, information systems and software engineering to describe a process for planning, creating, testing, and deploying an information system.
306
Traceability
Traceability is the capability to trace something. In some cases, it is interpreted as the ability to verify the history, location, or application of an item by means of documented recorded identification.
307
Transferrable
Able to be transferred or made over to the possession of another person.
308
UML
Unified Modelling language (UML) is a standardised modelling language enabling developers to specify, visualise, construct and document artefacts of a software system.
309
Unified Process (UP)
Unified Process is a popular iterative and incremental software development process framework.
310
Uniqueness
The quality of being the only one of its kind.
311
Unit testing
Unit testing is a software development process in which the smallest testable parts of an application, called units, are individually and independently scrutinised for proper operation.
312
Usability testing
Usability testing is a way to see how easy to use something is by testing it with real users. Users are asked to complete tasks, typically while they are being observed by a researcher, to see where they encounter problems and experience confusion.
313
Use cases
In software and systems engineering, a use case is a list of actions or event steps typically defining the interactions between a role (known in the Unified Modelling Language as an actor) and a system to achieve a goal. The actor can be a human or other external system.
314
User interface
The means by which the user and a computer system interact, in particular the use of input devices and software.
315
Validation
The action of checking or proving the validity or accuracy of something.
316
Variable
Not consistent or having a fixed pattern; liable to change.
317
Variate
A quantity having a numerical value for each member of a group, especially one whose values occur according to a frequency distribution
318
Version control
A component of software configuration management, version control, also known as revision control or source control, is the management of changes to documents, computer programs, large web sites, and other collections of information.
319
V-model
In software development, the V-model represents a development process that may be considered an extension of the waterfall model, and is an example of the more general V-model.
320
Vulnerability
The quality or state of being exposed to the possibility of being attacked.
321
Waterfall
Relating to or denoting a method of project management that is characterised by sequential stages and a fixed plan of work.
322
Web developer
A web developer is a programmer who specialises in, or is specifically engaged in, the development of World Wide Web applications, or applications that are run over HTTP from a web server to a web browser.
323
White box
In computer hardware, a white box is a personal computer or server without a well-known brand name. For instance, the term applies to systems assembled by small system integrators and to home-built computer systems assembled by end users from parts purchased separately at retail.
324
Wireframes
A skeletal three-dimensional model in which only lines and vertices are represented.
325
Work package management
A work package is a group of related tasks within a project. Because they look like projects themselves, they are often thought of as sub-projects within a larger project. Work packages are the smallest unit of work that a project can be broken down to when creating your Work Breakdown Structure (WBS).
326
Work station license
Is a license that may be used on a computer, where the host application (3ds Max, Cinema 4D, ...) is running in "full" mode - with graphical user interface, material editor, and all other features enabled, as opposed to node license.