Words
Expressions
Definitions
Mix
Mix
100

Network

What allows the sharing of data ?

100

Manage IT and its projects

What is the role of project manager ?

100

Vulnerability

How do we call a weakness of a system ?

100

Password

What users have to define with their username or email address when they sign up in a new website ?

100

Array

What do we use in programming to store multiples values in a single variable ?

200

User

How is called the one who uses a computer, computer program, or online service ?

200

Meet client expectations

What do you need to do if you want your client to pay you ?

200

Bruteforce

What is the method that consists of testing all possible combinaison to find a password ?

200

Database query

What is the name of the request we have to do in a software to get data from database ?

200

Integrated development environment

Which tools developers have to use to write their code ?

300

Sound card

What computer hardware device is used to generate sound ?

300

Modeling systems and networks architecture

What is the objective of the proof of concept ?

300

Ransomware

What is a malicious software designed to block access to a computer system until a sum of money is paid ?

300

Cloud computing

What is the name of the technology which host data or software on remote servers ?

300

Execute loops

What developers have to do to browse an array ?

400

Root directory

What contains all other folders in the drive or folder, and can, of course, also contain files ?

400

Build Specifications

What is the first thing a Project Manager has to do when they start a new project ?

400

Mailbot

How do you call this malicious software that massively sends e-mail automatically ?

400

Platform as a service

How do we call a cloud service category that offers a processing platform and a software layer as a service ?

400

Unit testing

Which procedure should developers use to verify the proper functioning of a specific part of a program ?

500

Backup

How is called the process of creating and storing copies of data that can be used to protect organizations against data loss ?

500

Design solutions

What the step after building specifications ?

500

Address spoofing

How do we call malicious action that involves deliberately using the address of another system ?

500

Technical Debt

What is a failure to comply with the design of the software which entails additional costs in the future ?

500

Browser

What is the mispelled name of Mario's enemy  ?