CS Principles Review - 2022
Across
- 1. Using 3.14 to represent π (pi) is a example of a _____ (2 words)
- 5. Compressing data in a way that preserves all data away and allows full recovery of the ____
- 6. True or false a virus is a type of computer malware that can not duplicate
- 7. A rogue access point is a ____ access point that provides an attacker with unauthorized access to the traffic going over the network
- 9. Metadata is information that describes other ___
- 13. A type of encrypting data where the same key is used to both encrypt and decrypt data(2 words)
- 14. Modularity is the separation of a programs independent ___ that are each responsible for one aspect of the program's functionality.
- 15. A byte is sequence of __ bits
- 16. device A physical device that can run a program
- 19. True or false An Array starts at 1
- 21. A problem with no clear ____ is an undecidable problem
- 22. The idea that some communities or populations have less access to computing than others (2 words)
Down
- 2. True or false a linear search is an algorithm that searches a sorted list for a value by repeatedly splitting the list in half
- 3. TCP stands for ___control protocol
- 4. A lightweight data transport protocol (3 words, No caps)
- 8. A run-time error is a mistake in a program that happens only when the program is actually ___
- 10. An attack where the user is ___ into revealing private information is called phishing
- 11. When a user visits a ____ a cookie is created
- 12. A binary search is an algorithm that searches a sorted list for a value by repeatedly splitting the list in ____
- 17. A bit uses the binary numbers 0 and ___
- 18. Reasonable Time is when an algorithms with a ___ efficiency or lower are said to run in a reasonable amount of time
- 20. Encryption is the process of scrambling data to prevent ____ access.