CS principles 2022
Across
- 2. when a system can support failures and still continue to function, it is called ____.
- 4. The Checksum is an error checking mechanism built into the metadata of Internet packets. Its in which protocol
- 5. Rogue Access Point is a wireless access point that gives _____ access
- 8. a problem where we can’t ever create an algorithm that would be able to answer for all inputs.
- 9. the separation of a program into independent ____s.
- 12. an approach to solving problems that will always get an answer.
- 14. Array's start at what number on cs exam
- 16. an attack where a user is tricked into revealing private information, often via a deceptive email.
Down
- 1. distributed computing is a computational model which uses ________ devices.
- 3. htt Hypertext Transfer UD User Datagram are all missing what letter and associated word.
- 6. The iteration over the items in a list
- 7. the ability of a system to adjust to meet new demands.
- 10. ___ source—programs that are made freely available and may be redistributed and modified
- 11. citizen science is _____ conducted by people who contribute relevant data to research.
- 13. Symmetric key encryption involves the key for both encryption and decryption
- 15. network connection, typically measured in bits per second.