Computer Principles Crossword Puzzle

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273
Across
  1. 4. the process of discovering interesting and useful patterns and relationships in large volumes of data
  2. 6. American Standard Code for Information Interchange
  3. 7. a space in your computer's hard drive and in RAM memory where your browser saves copies of previously visited Web pages
  4. 9. discreet online resource that is collaboratively developed and managed by a community
  5. 14. digital telecommunications network which allows nodes to share resources
  6. 18. Advanced Encryption Standard, the standard for data encryption adopted by the NIST in 2001
  7. 20. Trusted Platform Module, specialized chip on an endpoint device that stores RSA encryption keys specific to the host system for hardware authentication
  8. 22. a device that originates, or generates, an information transfer to one or more receivers
  9. 27. storing and accessing data and programs over the Internet instead of a computer's hard drive
  10. 28. information processed or stored by a computer
  11. 30. virtual space created by interconnected computers and computer networks on the Internet
  12. 33. used by many websites for encryption to protect files and information that is transmitted over the Internet
  13. 35. computing done at a central location, using terminals that are attached to a central computer
  14. 36. Constructing and manipulating abstract (mathematical and , or graphical) representations of economic, engineering, manufacturing, social, and other types of situations and natural phenomenon, simulated with the help of a computer system
  15. 37. radio frequency identification, similar to barcodes
  16. 38. data compression techniques in which some amount of data is lost; this technique attempts to eliminate redundant info
  17. 40. an online platform which people use to build social networks or social relations with other people
  18. 42. a collection of data that can be used by computers which need to communicate with each other
  19. 44. software that helps you organize and analyze data
  20. 45. an identifier for devices on a TCP , IP network
  21. 48. recognition of printed or written text characters by a computer(optical character recognition)
  22. 52. event data recorder
  23. 53. a numeric system that only uses two digits — 0 and 1
  24. 56. namespace that organizes a set of related classes and interfaces
  25. 58. any intangible asset, something proprietary that doesn't exist as a physical object but has value
  26. 64. process of taking encoded or encrypted text or other data and converting it back into text that you or the computer can read and understand
  27. 66. smallest unit of data in a computer, has a single binary value of 0 or 1
  28. 67. form of computer that uses the continuously changeable aspects of physical phenomena such as electrical, mechanical, or hydraulic quantities to model the problem being solved
  29. 68. an instance of a computer program that is being executed. It contains the program code and its activity.
  30. 69. central place in which an aggregation of data is kept and maintained in an organized way, usually in computer storage
  31. 70. a request for information from a database
  32. 71. term used to describe unsightly debris that accrues as the result of the experience of digital living
  33. 73. a general category of storage mechanisms where data is recorded by various electronic, magnetic, optical, or mechanical changes to a surface layer of one or more rotating disks
Down
  1. 1. Dynamic random access memory, type of memory that is typically used for data or program code that a computer processor needs to function
  2. 2. unsolicited junk email sent indiscriminately in bulk, often for commercial purposes
  3. 3. known as encrypted or encoded information because it contains a form of the original plaintext that is unreadable by a human or computer without the proper cipher to decrypt it
  4. 5. the forwarding by a router of a packet from any node to every other node attached to the router except the node from which the packet arrived
  5. 6. set of steps for solving a particular problem
  6. 8. the protection of internet-connected systems, including hardware, software and data, from cyberattacks
  7. 10. contains the applications the user is working on
  8. 11. a collection of data values, the relationships among them, and the functions or operations that can be applied to the data.
  9. 12. facility used to store computers, servers, routers, switches, and other networking equipment in a single location
  10. 13. an electrical signal that is converted into a pattern of bits
  11. 15. A method of presenting data or information in non-traditional, interactive graphical forms
  12. 16. a digital image (photo, drawing etc.) stored on a graphical user interface on the screen of a computer, mobile communications device or other electronic device.
  13. 17. list of items that are granted access to a certain system or protocol
  14. 19. any letter, number, space, punctuation mark, or symbol that can be typed on a computer
  15. 21. a place where multiple databases or files are located for distribution over a network
  16. 23. the translation of data into secret code
  17. 24. any of a class of devices capable of solving problems by processing information in discrete form. It operates on data, including magnitudes, letters, and symbols, that are expressed in binary code—i.e., using only the two digits 0 and 1
  18. 25. transmission of a file from one computer system to another
  19. 26. any process in which information is gathered and expressed in a summary form for purposes such as statistical analysis
  20. 29. a small chip that resides in computers and other electronic devices
  21. 31. data compression techniques in which no data is lost
  22. 32. the phrase used to describe the method of preparing data for storage or transmission
  23. 34. hypertext markup language, a formatting system for displaying text, graphics, and audio retrieved over the Internet on a computer monitor
  24. 39. the basic unit of programmable color on a computer display or in a computer image
  25. 41. is a dot matrix data structure that represents a generally rectangular grid of pixels (points of color), viewable via a monitor, paper, or other display medium
  26. 43. type of security program that enables encryption and decryption of a data stream at rest or in transit
  27. 46. Data Encryption Standard is a block cipher, meaning a cryptographic key and algorithm are applied to a block of data simultaneously rather than one bit at a time
  28. 47. any computing hardware that is used for storing, porting and extracting data files and objects
  29. 49. measure of a computer's disk storage capacity or a computer file's size. Equal to 1,024 kilobytes.
  30. 50. art of protecting information by transforming it into an unreadable format, called cipher text
  31. 51. an automated program that runs over the Internet
  32. 54. basic access control mechanism that allows through all elements except those explicitly mentioned
  33. 55. Digital rights management, refers to any scheme that controls access to copyrighted material using technological means
  34. 57. created in order to get information when the need arises
  35. 59. trend regarding the number of transistors per square inch on integrated circuits doubling every year
  36. 60. data about data; describes how and when and by whom a particular set of data was collected, and how data is formatted
  37. 61. when two or more computers are linked in order to share resources
  38. 62. a system designed to prevent unauthorized access to or from a private network
  39. 63. used in reference to resolution of graphics device. Equal to 1,000,000 pixels
  40. 64. a collection of documents about a person, event, or subject
  41. 65. unit of data storage capacity that is roughly equivalent to 1 billion bytes
  42. 71. sources the source of the data
  43. 72. Uniform Resource Locator, a reference to a web resource that specifies its location on a computer network and a mechanism for retrieving it