APCSP Vocabulary Unit 8 & 10

123456789101112131415161718192021222324252627282930
Across
  1. 5. protects a computing system against infection
  2. 8. a model in which programs are broken into small pieces, some of which are run simultaneously
  3. 10. software intended to damage a computing system or to take partial control over its operation
  4. 14. a process that reverses encryption, taking a secret message and reproducing the original plain text
  5. 18. Algorithms with exponential or factorial efficiencies are examples of algorithms that run in an unreasonable amount of time
  6. 19. a search algorithm which checks each element of a list, in order, until the desired value is found or all elements in the list have been checked
  7. 21. a measure of how many steps are needed to complete an algorithm
  8. 24. Algorithms with a polynomial efficiency or lower (constant, linear, square, cube, etc.) are said to run in a reasonable amount of time
  9. 25. putting steps in an order
  10. 27. includes a program as an integral part of its function. Can be physical (e.g. self-driving car), non-physical computing software (e.g. picture editing software), or non-physical computing concepts (e.g., e-commerce).
  11. 28. a system that requires at least two steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access
  12. 29. information about an individual that identifies, links, relates, or describes them
  13. 30. a finite set of instructions that accomplish a task
Down
  1. 1. the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
  2. 2. the time used to complete a task sequentially divided by the time to complete a task in parallel
  3. 3. a search algorithm that starts at the middle of a sorted set of numbers and removes half of the data; this process repeats until the desired value is found or all elements have been eliminated
  4. 4. a wireless access point that gives unauthorized access to secure networks
  5. 6. a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails
  6. 7. a model in which programs are run by multiple devices
  7. 9. involves one key for both encryption and decryption
  8. 11. a problem with the goal of finding the "best" solution among many (e.g., what is the shortest path from A to B?)
  9. 12. pairs a public key for encryption and a private key for decryption. The sender does not need the receiver’s private key to encrypt a message, but the receiver’s private key is required to decrypt the message
  10. 13. a process of encoding messages to keep them secret, so only "authorized" parties can read it
  11. 15. a problem for which no algorithm can be constructed that is always capable of providing a correct yes-or-no answer
  12. 16. a general description of a task that can (or cannot) be solved with an algorithm
  13. 17. deciding which steps to do next
  14. 20. provides a "good enough" solution to a problem when an actual solution is impractical or impossible
  15. 22. a problem with a yes/no answer (e.g., is there a path from A to B?)
  16. 23. a model in which programs run in order, one command at a time
  17. 26. a repetitive portion of an algorithm which repeats a specified number of times or until a given condition is met