Brayan Alexander Pinilla Moreno

1234567891011121314151617181920
Across
  1. 2. A computer system whose mission is to act as an intermediary between one system and another over the Internet.
  2. 3. This is a numbering system in which numbers are represented using only two digits: zero and one.
  3. 6. Action and effect of developing or being developed.
  4. 8. A type of malicious code whose main characteristic is that it is copied from one system to another over the Internet.
  5. 9. Development staff are the workers in charge of developing a project.
  6. 11. A sequence of codes ready to be executed.
  7. 12. The Roadmap, known in Spanish as a road map, works as a schedule for project planning.
  8. 13. Malicious code camouflaged inside another apparently useful and harmless program.
  9. 15. The best known type of malicious code.
  10. 16. A menu at the top or bottom that shows certain functions indicates that it is a side menu in which various tools are grouped.
  11. 17. The waterfall model is a project management method, in which the project is divided into different sequential phases, where the team can move to the next phase only when the previous one has been completed.
  12. 19. A network system that controls which machines and services can be accessed within a network, It can be a specialized system or an installed program.
  13. 20. In computing, a developer is responsible for the application or website to work correctly, to be safe, to withstand the passage of time, to be easily modifiable and adaptable.
Down
  1. 1. A spreadsheet is a computer application software that is based on a system of vertical and horizontal cells that form rows and columns with each other.
  2. 4. Information that, sent by an Internet server to the browser, is subsequently returned on each new connection.
  3. 5. A computer attack that, without affecting the information contained in a system, renders it unable to provide service. Denial of service can be achieved by saturation or blocking of machines.
  4. 7. Encryption of data using various mathematical techniques to ensure confidentiality in transmission.
  5. 10. It is an outline or framework that provides a basic structure for developing a project with specific objectives.
  6. 14. A set of letters, numbers and symbols, or even phrases, used to authenticate users on a computer system.
  7. 18. Any program with an annoying, malicious or illegal intent. They are generally designed to run without user intervention.