Across
- 6. A person who analyses and determines requirements for a system or piece of software.
- 8. Scrambling data in a way that's unreadable to people who don’t have a way to unscramble the data, usually with a key. 🔑
- 11. _____________ is a term referring to preventing unauthorised users from accessing something such as sensitive data.
- 12. The acronym for a graphical interfaced “programming language” that allows people to make pieces of software without knowing how to code.
- 14. Storing is a version of a file or software that can be accessed later in case something happens to the original file.
- 15. The development approach that is great for small groups or individuals'
- 16. The process of ensuring the requirements of a system have been met.
- 18. Analysing a piece of software in order to create a similar if-not identical piece of software to replace it is called this.
- 19. The baseline interface that allows a user to interface their hardware with software.
- 20. A software component that allows communication between devices.
- 21. The idea of protecting someone’s personally identifiable information to allow a user not to reveal who they are when using the internet.
Down
- 1. What is the term for using someone else's work and then claiming it as your own?
- 2. For a piece of software to achieve its purpose, it must have tasks and elements called ____________.
- 3. The final person who will use a software package
- 4. The property of someone’s mind, either an idea, trademark or the application of an idea
- 5. This is what is created when multiple devices are connected electronically in order for them to communicate with each other.
- 7. The relationship between a user and their work environment. This can include both the physical aspects of a workspace, but also the elements that make up a software solution and how they can be used.
- 9. When you are making a software solution accessible to all regardless of race, gender or disabilities, you are what?
- 10. The approach that has major consequences for changing requirements
- 13. Software that is designed to cause harm performs an unwanted action on a computer.
- 17. A type of prototype that's the forerunner to the final product
- 18. When a person wants to use a copyrighted work, an author collects a portion of this from the person requesting it.