CS Principle Review - 2022
Across
- 2. A small amount of text that tracks information about a user visiting a website
- 3. remainder
- 7. Phishing uses an _____ to trick an individual into revealing private info
- 8. Not enough bit to represent number with full precision
- 12. Rogue Access Point is an/a ____ access to the traffic that attackers use to go over the network
- 13. Logic Error is a mistake in an algorithm or program that causes it to behave unexpectedly or return the ______ _______
- 15. Lossless is Compressing data in a way that preserves all data away and allows full recovery of the original
- 17. A mistake in typed code that violates the rules of the programming language
- 18. Parallel computing is computational model which splits a program into multiple tasks, some of which can be executed ___________
- 19. technique for encrypting data where the same key is used to both encrypt and decrypt data(2 words)
Down
- 1. Descriptive information about a file or a row in a database
- 4. Information that can be used to _____ identify is called Personally identifiable information
- 5. model in which many online users combine efforts to help fund projects, generate ideas, or create goods or services (2 words)
- 6. Append is the test version of ____
- 7. Byte is a sequence of ___ bits
- 9. Application Programming Interface is a ______ of procedures and a description of how to call each procedure.
- 10. Lossy is compressing data in a way that ______ some data and makes it impossible to recover the original
- 11. The ability of a system to adjust in scale to meet new demands
- 14. A computing device is a physical device that can run a _____
- 16. Arrays start at ____ on the test