AP Comp Sci Principles Semester 1 Review
Across
- 2. The amount of delay (or time) it takes to send information from one point to the next.
- 3. A base -16 number system that uses sixteen distinct symbols 0-9 and A-F to represent numbers from 0-15
- 9. The use of a computer program to record every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information.
- 10. The most common networking protocol online. Extremely reliable and used for everything from surfing the web, sending emails and transferring files.
- 14. Some program statements run when triggered by an event, like a mouse click or a key press
- 15. An AI system originally used to play Jeopardy
- 16. A legal document designed to shield a company from a lawsuit
- 18. A form of AI that relies on instructions being fed to it
- 19. An algorithm that substitutes each letter in the original message with a letter in a certain number of steps down the alphabet
- 20. Electric current or voltage
Down
- 1. The scrambling or changing of the message to hide the original text
- 4. A form of program documentation written into the program to be read by people and which do not affect how a program runs
- 5. A mode of computer operation in which a process is split into parts that execute simultaneously on different processors attached to the same computer.
- 6. Finding and fixing errors/problems in an algorithm/program
- 7. Small sizes of data from a larger message
- 8. Hacker taps into server and changes it to match a domain name with the wrong IP address
- 11. Information about an individual that identifies, relates, or describes them
- 12. Headquarter located in Arlington, Virginia
- 13. A file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants.
- 17. A scalable, fault-tolerant, and cost-effective distributed file system that stores large datasets across a cluster of commodity hardware