CS Principle Review - 2022

12345678910111213141516171819
Across
  1. 2. A small amount of text that tracks information about a user visiting a website
  2. 3. remainder
  3. 7. Phishing uses an _____ to trick an individual into revealing private info
  4. 8. Not enough bit to represent number with full precision
  5. 12. Rogue Access Point is an/a ____ access to the traffic that attackers use to go over the network
  6. 13. Logic Error is a mistake in an algorithm or program that causes it to behave unexpectedly or return the ______ _______
  7. 15. Lossless is Compressing data in a way that preserves all data away and allows full recovery of the original
  8. 17. A mistake in typed code that violates the rules of the programming language
  9. 18. Parallel computing is computational model which splits a program into multiple tasks, some of which can be executed ___________
  10. 19. technique for encrypting data where the same key is used to both encrypt and decrypt data(2 words)
Down
  1. 1. Descriptive information about a file or a row in a database
  2. 4. Information that can be used to _____ identify is called Personally identifiable information
  3. 5. model in which many online users combine efforts to help fund projects, generate ideas, or create goods or services (2 words)
  4. 6. Append is the test version of ____
  5. 7. Byte is a sequence of ___ bits
  6. 9. Application Programming Interface is a ______ of procedures and a description of how to call each procedure.
  7. 10. Lossy is compressing data in a way that ______ some data and makes it impossible to recover the original
  8. 11. The ability of a system to adjust in scale to meet new demands
  9. 14. A computing device is a physical device that can run a _____
  10. 16. Arrays start at ____ on the test