CS Principles Review - 2022

123456789101112131415161718192021
Across
  1. 1. A ____ system is a system which can change in size to meet new demands.
  2. 5. MOD finds the remainder.
  3. 6. A method by which an algorithm is able to produce a good solution to a hard problem.
  4. 7. ____ is the estimation of the amount of computational resources used by an algorithm.
  5. 9. a binary digit, either 1 or 0.
  6. 11. Bandwidth describes the ____ amount of data that can be sent over an internet connection.
  7. 13. Modularity describes a program which is ____ into individual modules which handle aspects of the program's functionality.
  8. 14. Analog data involves values that change ____ rather than in discrete intervals.
  9. 16. Distributed computing describes a computational model which uses ____ devices to run different parts of a program.
  10. 18. MFA is a method of use authentication which requires multiple pieces of ____ in multiple categories.
  11. 19. When a system is _____ _____, it supports failures, meaning it can continue to function even a part of it breaks (2 words).
  12. 20. Parallel computing is a computational model which splits a program into multiple tasks, which can sometimes be executed ____.
  13. 21. a byte is a sequence of ____ bits.
Down
  1. 2. A license that allows for the free distribution of copyrighted work (2 words).
  2. 3. ____ encryption uses the same encryption key to encrypt and decrypt the data.
  3. 4. Metadata is ____ information about data.
  4. 8. a model in which many online users collaborate to generate ideas or funding.
  5. 10. ____ start at 1 on the AP exam.
  6. 12. Speedup is the ___ in the amount of time a parallelized program takes to solve a problem, computed as the amount of time to complete the task sequentially divided by the amount of time to complete the task when run in parallel.
  7. 15. Redundancy increases the ____ of the internet by including extra components which can be used if the original systems fail.
  8. 17. A rogue access point gives ____ access to secure networks.