Consulting
Software Development
Cybersecurity
Business Analysis
Wild Card
100

The first step in understanding a client's business needs

What is discovery?

100

The four main types of software testing

What is Unit testing, Integration testing, System testing and Acceptance testing

100

This is a secret string used to verify identity online

What is a password?

100

The acronym KPI

What is Key Performance Indicator?

100

Hidden data embedded within files - or data about data

What is Metadata?

200

The acronym ROI 

What is Return on Investment?

200

The cost of taking shortcuts in development, leading to future issues requiring refactoring

What is Technical Debt?

200

This method involves attempting to gain unauthorized access to a system by mimicking a trustworthy entity.

What is phishing?

200

The process of identifying stakeholders' expectations

What is requirements elicitation?

200

On a Scrum Team, this person manages the Product Backlog

Who is the Product Owner?

300

Describes when a consultant is between engagements and not staffed on a project

What is on the bench?

300

This architectural style separates presentation, logic, and data access

What is MVC (Model-view-controller)?

300

________ refers to malicious softrware designed to damage, disrupt, or gain unauthorized access to computer systems.

What is malware?

300

A method used to trace requirements throughout a project lifecycle

What is a requirements traceability matrix (RTM)?

300

This futuristic term describes combining physical and digital experiences

What is the Metaverse?

400

The five service areas Resource Data focuses on

What is Data & AI, Software Services, GIS, IT Business Consulting, Systems Engineering?

400

The practice of running tests every time code is changed

What is Continuous Integration?

400

This framework provides cybersecurity best practices across industries

What is NIST Cybersecurity Framework?

400

This visual model shows the current and future state of a process

What is a gap analysis?

400

Six values at Resource Data

What is Pragmatism, Financial Stability, Responsibility, Partnership, Integrity, Work-Life Balance?

500

The primary goal of a consulting engagement

What is to provide expert advice and solutions to help clients solve specific problems.

500

This principle advocates for small, reusable pieces of code

What is modularity?

500

This security measure limits access based on roles

What is Role-Based Access Control (RBAC)?

500

A poor software requirement is not ________.  It cannot be tested cost-effectively.

What is verifiable?

500

The acronym SLA

What is Service Level Agreement?

M
e
n
u