CS principles 2022

12345678910111213141516
Across
  1. 2. when a system can support failures and still continue to function, it is called ____.
  2. 4. The Checksum is an error checking mechanism built into the metadata of Internet packets. Its in which protocol
  3. 5. Rogue Access Point is a wireless access point that gives _____ access
  4. 8. a problem where we can’t ever create an algorithm that would be able to answer for all inputs.
  5. 9. the separation of a program into independent ____s.
  6. 12. an approach to solving problems that will always get an answer.
  7. 14. Array's start at what number on cs exam
  8. 16. an attack where a user is tricked into revealing private information, often via a deceptive email.
Down
  1. 1. distributed computing is a computational model which uses ________ devices.
  2. 3. htt Hypertext Transfer UD User Datagram are all missing what letter and associated word.
  3. 6. The iteration over the items in a list
  4. 7. the ability of a system to adjust to meet new demands.
  5. 10. ___ source—programs that are made freely available and may be redistributed and modified
  6. 11. citizen science is _____ conducted by people who contribute relevant data to research.
  7. 13. Symmetric key encryption involves the key for both encryption and decryption
  8. 15. network connection, typically measured in bits per second.