Month

12345678910111213141516171819202122232425262728293031323334353637383940414243
Across
  1. 3. This is the place where we can find our OU Scorecard details?
  2. 4. Unwanted mail generated by robots, hackers or scammers
  3. 5. Volume, variety, velocity and veracity are the characteristic of __
  4. 7. a model that helps to predict defects
  5. 8. The front line of defense in Information Security!
  6. 9. A reporting dashboard with compliance and excellence measures
  7. 12. This concept is related to pooling and sharing of resources.
  8. 15. At what risk response is GL approval needed?
  9. 16. Early involvement approach of QA team called
  10. 19. Project creation functionality will be removed from iPMS shortly and moved to __
  11. 22. PI project executed for Improvement in CSI score is closed in IMPACT as __
  12. 23. a place to look for templates and checklist
  13. 25. Customer appreciation must be analyzed to identify and propagate this within/outside you team
  14. 27. Parent & child project id mapping across DU is known as
  15. 29. The legal right granted to an author, composer, playwright, publisher, or distributor to exclusive publication, production, sale, or distribution of a literary, musical, dramatic, or artistic work.
  16. 31. Iterate, Ideate, Inculcate and what else?
  17. 32. T3 metrics in ASU is meant for __ Testing?
  18. 34. this activity needs to be done with all project stakeholders together at the beginning of project
  19. 35. Our in house tool which is equivalent to HP ALM
  20. 40. Common name for a "web log"
  21. 41. This technology is default in current business environment.
  22. 43. This is our inhouse social media site.
Down
  1. 1. This is the place where we are implementing prediction models?
  2. 2. What is the system generated value that we get on basis of model of the project and number of test cycles?
  3. 6. An act of pretending to be another person for the purpose of fraud.
  4. 10. Mandatory activity done for all deliverable or last verification before every delivery to customer
  5. 11. Set of rules used to control the exchange of information that is understood by the transmitter and receivers.
  6. 13. Number of sections in CSS form.
  7. 14. This document needs to be prepared to extract security requirement from MSA.
  8. 17. Place where all value adds are recorded in system
  9. 18. Try to obtain financial or other confidential information from Internet users, typically by sending an email that looks as if it is from a legitimate organization.
  10. 19. A cloud architecture maintained within an enterprise data centre is known as __
  11. 20. This refers to applications and services that run on a distributed network using virtualized resources.
  12. 21. an uncertain event or condition that, if it occurs, has an effect on at least one project objective
  13. 24. Ultimatix application where customer complaints are logged.
  14. 26. is a small piece of text stored on a user's computer by a web browser.
  15. 28. What should be done to a risk which is no longer prevalent?
  16. 30. Group which reviews all documents
  17. 33. PI projects focussing in margin improvements is
  18. 36. Quantitative measure of customer satisfaction.
  19. 37. The use of machines and technology to make processes run on their own without manpower.
  20. 38. This horse can stampede your security defenses for the bad guys.
  21. 39. Name of a ASU DERM's mobile app on TCS APPMART; which also means dictionary
  22. 42. a book that tells you about ETVX of entire testing project
  23. 43. Transformation from Satisfiers to delighters is mentioned in what model