APCS Key Terms

123456789101112131415161718192021
Across
  1. 1. program interfaces (APIs), specifications for how the procedures in a library behave and can be used.
  2. 3. science, Scientific research conducted in whole or part by distributed individuals, many of whom may not be scientists, who contribute relevant data to research using their own computing devices.
  3. 7. computing, the delivery of computing services—including servers, storage, databases, networking, software, analytics, and intelligence—over the Internet (“the cloud”) to offer faster innovation, flexible resources, and economies of scale.
  4. 8. The practice of obtaining input or information from a large number of people via the Internet.
  5. 10. data about data
  6. 11. a technique that attempts to trick a user into providing personal information.
  7. 13. learning, an application of artificial intelligence (AI) that provides systems the ability to automatically learn and improve from experience without being explicitly programmed.
  8. 14. an agreed upon set of rules that specify the behavior of a system
  9. 16. key encryption, involves one key for both encryption and decryption.
  10. 18. the process of decoding the data.
  11. 20. Denial of Service, a malicious attempt to disrupt the normal traffic of a targeted server service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic.
  12. 21. True or false values
Down
  1. 2. the delay between a user's action and a web application's response to that action
  2. 4. Engineering Task Force, Develops and promotes voluntary Internet standards and protocols, in particular the standards that comprise the Internet protocol suite (TCP/IP).
  3. 5. divide, refers to differing access to computing devices and the Internet, based on socioeconomic, geographic, or demographic characteristics.
  4. 6. Law, A prediction made that computing power will double every 1.5 - 2 years.
  5. 9. the inclusion of extra components that can be used to mitigate failure of a system if other components fail.
  6. 11. key encryption, pairs a public key for encryption and a private key for decryption.
  7. 12. Cipher, an alphabetic shift.
  8. 15. a network of servers that track the IP addresses of different domain names like “example.com”
  9. 17. the process of encoding data to prevent unauthorized access.
  10. 19. abstractions, manage complexity in programs by giving a collection of data a name without referencing the specific details of the representation.