AP Computer Science Review
Across
- 4. manages complexity in programs by giving a collection of data a name without referencing the specific details of the representation
- 6. the use of a computer to represent the dynamic responses of one system by the behavior of another system modeled after it.
- 7. a whole number
- 8. a technique that attempts to trick a user into providing personal information
- 10. data about data.
- 11. software intended to damage a computing system or to take partial control over its operation
- 14. a detailed yet readable description of what a computer program or algorithm must do.
- 17. measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack
- 18. the delay between a user's action and a web application's response to that action
- 19. the process of decoding data.
- 20. is the practice of obtaining input or information from a large number of people via the Internet.
- 21. study of securing (or encrypting) information such that it is inaccessible by third parties.
Down
- 1. transmission of data from one computer to another, or from one device to another.
- 2. the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
- 3. the ability to limit access to information to a certain set of users.
- 5. either true or false.
- 9. a base-16 number system.
- 12. the inclusion of extra components that can be used to mitigate failure of a system if other components fail.
- 13. the process of encoding data to prevent unauthorized access.
- 15. a network of servers that track the IP addresses of different domain names like “example.com”
- 16. a base-2 number system.