Month
Across
- 3. This is the place where we can find our OU Scorecard details?
- 4. Unwanted mail generated by robots, hackers or scammers
- 5. Volume, variety, velocity and veracity are the characteristic of __
- 7. a model that helps to predict defects
- 8. The front line of defense in Information Security!
- 9. A reporting dashboard with compliance and excellence measures
- 12. This concept is related to pooling and sharing of resources.
- 15. At what risk response is GL approval needed?
- 16. Early involvement approach of QA team called
- 19. Project creation functionality will be removed from iPMS shortly and moved to __
- 22. PI project executed for Improvement in CSI score is closed in IMPACT as __
- 23. a place to look for templates and checklist
- 25. Customer appreciation must be analyzed to identify and propagate this within/outside you team
- 27. Parent & child project id mapping across DU is known as
- 29. The legal right granted to an author, composer, playwright, publisher, or distributor to exclusive publication, production, sale, or distribution of a literary, musical, dramatic, or artistic work.
- 31. Iterate, Ideate, Inculcate and what else?
- 32. T3 metrics in ASU is meant for __ Testing?
- 34. this activity needs to be done with all project stakeholders together at the beginning of project
- 35. Our in house tool which is equivalent to HP ALM
- 40. Common name for a "web log"
- 41. This technology is default in current business environment.
- 43. This is our inhouse social media site.
Down
- 1. This is the place where we are implementing prediction models?
- 2. What is the system generated value that we get on basis of model of the project and number of test cycles?
- 6. An act of pretending to be another person for the purpose of fraud.
- 10. Mandatory activity done for all deliverable or last verification before every delivery to customer
- 11. Set of rules used to control the exchange of information that is understood by the transmitter and receivers.
- 13. Number of sections in CSS form.
- 14. This document needs to be prepared to extract security requirement from MSA.
- 17. Place where all value adds are recorded in system
- 18. Try to obtain financial or other confidential information from Internet users, typically by sending an email that looks as if it is from a legitimate organization.
- 19. A cloud architecture maintained within an enterprise data centre is known as __
- 20. This refers to applications and services that run on a distributed network using virtualized resources.
- 21. an uncertain event or condition that, if it occurs, has an effect on at least one project objective
- 24. Ultimatix application where customer complaints are logged.
- 26. is a small piece of text stored on a user's computer by a web browser.
- 28. What should be done to a risk which is no longer prevalent?
- 30. Group which reviews all documents
- 33. PI projects focussing in margin improvements is
- 36. Quantitative measure of customer satisfaction.
- 37. The use of machines and technology to make processes run on their own without manpower.
- 38. This horse can stampede your security defenses for the bad guys.
- 39. Name of a ASU DERM's mobile app on TCS APPMART; which also means dictionary
- 42. a book that tells you about ETVX of entire testing project
- 43. Transformation from Satisfiers to delighters is mentioned in what model