The first step in understanding a client's business needs
What is discovery?
The four main types of software testing
What is Unit testing, Integration testing, System testing and Acceptance testing
This is a secret string used to verify identity online
What is a password?
The acronym KPI
What is Key Performance Indicator?
Hidden data embedded within files - or data about data
What is Metadata?
The acronym ROI
What is Return on Investment?
The cost of taking shortcuts in development, leading to future issues requiring refactoring
What is Technical Debt?
This method involves attempting to gain unauthorized access to a system by mimicking a trustworthy entity.
What is phishing?
The process of identifying stakeholders' expectations
What is requirements elicitation?
On a Scrum Team, this person manages the Product Backlog
Who is the Product Owner?
Describes when a consultant is between engagements and not staffed on a project
What is on the bench?
This architectural style separates presentation, logic, and data access
What is MVC (Model-view-controller)?
________ refers to malicious softrware designed to damage, disrupt, or gain unauthorized access to computer systems.
What is malware?
A method used to trace requirements throughout a project lifecycle
What is a requirements traceability matrix (RTM)?
This futuristic term describes combining physical and digital experiences
What is the Metaverse?
The five service areas Resource Data focuses on
What is Data & AI, Software Services, GIS, IT Business Consulting, Systems Engineering?
The practice of running tests every time code is changed
What is Continuous Integration?
This framework provides cybersecurity best practices across industries
What is NIST Cybersecurity Framework?
This visual model shows the current and future state of a process
What is a gap analysis?
Six values at Resource Data
What is Pragmatism, Financial Stability, Responsibility, Partnership, Integrity, Work-Life Balance?
The primary goal of a consulting engagement
What is to provide expert advice and solutions to help clients solve specific problems.
This principle advocates for small, reusable pieces of code
What is modularity?
This security measure limits access based on roles
What is Role-Based Access Control (RBAC)?
A poor software requirement is not ________. It cannot be tested cost-effectively.
What is verifiable?
The acronym SLA
What is Service Level Agreement?