Network
What allows the sharing of data ?
Manage IT and its projects
What is the role of project manager ?
Vulnerability
How do we call a weakness of a system ?
Password
What users have to define with their username or email address when they sign up in a new website ?
Array
What do we use in programming to store multiples values in a single variable ?
User
How is called the one who uses a computer, computer program, or online service ?
Meet client expectations
What do you need to do if you want your client to pay you ?
Bruteforce
What is the method that consists of testing all possible combinaison to find a password ?
Database query
What is the name of the request we have to do in a software to get data from database ?
Integrated development environment
Which tools developers have to use to write their code ?
Sound card
What computer hardware device is used to generate sound ?
Modeling systems and networks architecture
What is the objective of the proof of concept ?
Ransomware
What is a malicious software designed to block access to a computer system until a sum of money is paid ?
Cloud computing
What is the name of the technology which host data or software on remote servers ?
Execute loops
What developers have to do to browse an array ?
Root directory
What contains all other folders in the drive or folder, and can, of course, also contain files ?
Build Specifications
What is the first thing a Project Manager has to do when they start a new project ?
Mailbot
How do you call this malicious software that massively sends e-mail automatically ?
Platform as a service
How do we call a cloud service category that offers a processing platform and a software layer as a service ?
Unit testing
Which procedure should developers use to verify the proper functioning of a specific part of a program ?
Backup
How is called the process of creating and storing copies of data that can be used to protect organizations against data loss ?
Design solutions
What the step after building specifications ?
Address spoofing
How do we call malicious action that involves deliberately using the address of another system ?
Technical Debt
What is a failure to comply with the design of the software which entails additional costs in the future ?
Browser
What is the mispelled name of Mario's enemy ?