Across
- 2. A computer system whose mission is to act as an intermediary between one system and another over the Internet.
- 3. This is a numbering system in which numbers are represented using only two digits: zero and one.
- 6. Action and effect of developing or being developed.
- 8. A type of malicious code whose main characteristic is that it is copied from one system to another over the Internet.
- 9. Development staff are the workers in charge of developing a project.
- 11. A sequence of codes ready to be executed.
- 12. The Roadmap, known in Spanish as a road map, works as a schedule for project planning.
- 13. Malicious code camouflaged inside another apparently useful and harmless program.
- 15. The best known type of malicious code.
- 16. A menu at the top or bottom that shows certain functions indicates that it is a side menu in which various tools are grouped.
- 17. The waterfall model is a project management method, in which the project is divided into different sequential phases, where the team can move to the next phase only when the previous one has been completed.
- 19. A network system that controls which machines and services can be accessed within a network, It can be a specialized system or an installed program.
- 20. In computing, a developer is responsible for the application or website to work correctly, to be safe, to withstand the passage of time, to be easily modifiable and adaptable.
Down
- 1. A spreadsheet is a computer application software that is based on a system of vertical and horizontal cells that form rows and columns with each other.
- 4. Information that, sent by an Internet server to the browser, is subsequently returned on each new connection.
- 5. A computer attack that, without affecting the information contained in a system, renders it unable to provide service. Denial of service can be achieved by saturation or blocking of machines.
- 7. Encryption of data using various mathematical techniques to ensure confidentiality in transmission.
- 10. It is an outline or framework that provides a basic structure for developing a project with specific objectives.
- 14. A set of letters, numbers and symbols, or even phrases, used to authenticate users on a computer system.
- 18. Any program with an annoying, malicious or illegal intent. They are generally designed to run without user intervention.
