APCSP Intro to Vocabulary (Part 4)
Across
- 7. A type of computer malware that can make copies of itself
- 8. A method of user authentication which requires the user to present multiple pieces of evidence in multiple categories
- 9. The sequential execution of steps in an algorithm or code in a program
- 10. Error that results when the number of bits is not enough to represent the number
- 11. A technique for encrypting data where the same key is used to both encrypt and decrypt data
- 12. A run time for an algorithm that doesn’t increase faster than a polynomial function of the input size
Down
- 1. The ability of a system to adjust in scale to meet new demands
- 2. An agreed upon set of rules that specify the behavior of a system
- 3. A lightweight data transport protocol with minimal error checking
- 4. A data transport protocol that includes mechanisms for reliably transmitting packets to a destination
- 5. An attack where a user is tricked into revealing private information, often via a deceptive email
- 6. Error that results when the number of bits is not enough to represent the number with full precision