AP Computer Science Review

123456789101112131415161718192021
Across
  1. 4. manages complexity in programs by giving a collection of data a name without referencing the specific details of the representation
  2. 6. the use of a computer to represent the dynamic responses of one system by the behavior of another system modeled after it.
  3. 7. a whole number
  4. 8. a technique that attempts to trick a user into providing personal information
  5. 10. data about data.
  6. 11. software intended to damage a computing system or to take partial control over its operation
  7. 14. a detailed yet readable description of what a computer program or algorithm must do.
  8. 17. measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack
  9. 18. the delay between a user's action and a web application's response to that action
  10. 19. the process of decoding data.
  11. 20. is the practice of obtaining input or information from a large number of people via the Internet.
  12. 21. study of securing (or encrypting) information such that it is inaccessible by third parties.
Down
  1. 1. transmission of data from one computer to another, or from one device to another.
  2. 2. the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
  3. 3. the ability to limit access to information to a certain set of users.
  4. 5. either true or false.
  5. 9. a base-16 number system.
  6. 12. the inclusion of extra components that can be used to mitigate failure of a system if other components fail.
  7. 13. the process of encoding data to prevent unauthorized access.
  8. 15. a network of servers that track the IP addresses of different domain names like “example.com”
  9. 16. a base-2 number system.