The usability, ease of use, and enjoyment provided in the interaction between the customer and the product
What is UX?
The type of cabling most resistant to electromagnetic interference
What is fibre optic?
The rights of individuals and organisations to maintain the confidentiality of their information
This is used for project management and visually represents a project schedule, showing tasks and their duration over time
What is a Gantt Chart?
The use of game design elements in non-game contexts, such as education or training
What is Gamification?
The type of storage that has both private and public cloud elements
What is hybrid cloud?
A malicious Wi-Fi network mimics a legitimate one to intercept sensitive information from unsuspecting users
This method allows a developer to easily visualise and troubleshoot networks before physical implementation
What is network simulation?
The type of image format that uses lossless compression to maintain its high quality
What is a PNG?
The type of network topology consists of nodes all connecting to one central switch, before being data is sent to its destination?
What is star topology?
The law passed in 1998 that sets out principles for collecting, using, and storing personal data
What is the Privacy Act 1998?
These tools are often used in user experience design to create a low fidelity, visual guide of a web page
What are screen design tools?
A key design principle that considers the way a user's eye tracks the page
What is Flow?
The mail server protocol that allows users to access emails on the server without downloading them
What is IMAP/Internet Message Access Protocol?
The vertical axis on a risk management matrix measures this
What is the likelihood of exploitation?
This is used to represent an individual, category, or page in a Graph and Network theory diagram
What is a node?
A flexible project management approach that focuses on delivering small, incremental improvements to a project
What is Agile project management?
The name of the security measure used to distinguish human users from automated bots
What is CAPTCHA?
The emerging cybersecurity threat that can break encryption and reverse hashing
What is Quantum Computing?
This is the highest-level Data Flow Diagram, which depicts the entire system as a single process with external entities and data flows
What is a Level 0 diagram?