AP CSP Review

12345678910111213141516171819202122232425
Across
  1. 3. a finite set of instructions to complete a task
  2. 4. A repetitive portion of an algorithm which repeats a specified number of times or until a given condition is met
  3. 7. 2 words, research that uses online members of a community to assist to provide computing resources
  4. 8. 2 words, ____ allows for people to share ideas with everyone while still putting certain limitations on what people can do
  5. 9. 2 words, To sort incredibly large amounts of data _____ can be used to sort the data faster
  6. 12. A measure of how many steps it takes to complete an algorithm
  7. 13. 3 Words,A wireless access point that gives unauthorized access to a secure network
  8. 16. 3 words, Using ____ multiple people can send encrypted messages to a person with only that person being able to access all of those messages
  9. 18. If a scammer uses fake websites where you enter information to steal your information the scammer is ____
  10. 19. 2 words,If scammers use hacked computers to prevent access to a server is called a ____
  11. 21. Using a ___ is a good way to find the minimum or maximum of list
  12. 23. 2 words, Any human creation or idea such as art, symbols, or inventions
  13. 24. 2 words, ____ is often used to compress songs due to parts of the data not being needed as some parts can't be heard
  14. 25. A simplified representation of something that is more complex
Down
  1. 1. 2 words, If a program runs above polynomial efficiency it is considered to run in a(n) _____
  2. 2. 3 words, ___ requires at least 2 login methods out of inherence, knowledge, and possession
  3. 5. A good example of ___ is libraries
  4. 6. software that can be downloaded for free online that usually has malware
  5. 10. the time used to complete a task sequentially divided by the time to complete the task in parallel
  6. 11. 2 words, in order for a(n) ____ to work the list must be sorted
  7. 14. 2 words, obtaining information or other resources from members of the online community in order to help a project
  8. 15. 2 words, Extracting shared features to generalize funtionality
  9. 17. ____ is an incredibly important problem to lessen to ensure machine learning models work for equally for everyone
  10. 20. Using ___ people can obtain passwords and private data by recording keystrokes
  11. 22. For undecidable or unrealistic problems a(n) ____ is required to find a solution