CS Principles Review - 2022

12345678910111213141516171819202122
Across
  1. 1. Using 3.14 to represent π (pi) is a example of a _____ (2 words)
  2. 5. Compressing data in a way that preserves all data away and allows full recovery of the ____
  3. 6. True or false a virus is a type of computer malware that can not duplicate
  4. 7. A rogue access point is a ____ access point that provides an attacker with unauthorized access to the traffic going over the network
  5. 9. Metadata is information that describes other ___
  6. 13. A type of encrypting data where the same key is used to both encrypt and decrypt data(2 words)
  7. 14. Modularity is the separation of a programs independent ___ that are each responsible for one aspect of the program's functionality.
  8. 15. A byte is sequence of __ bits
  9. 16. device A physical device that can run a program
  10. 19. True or false An Array starts at 1
  11. 21. A problem with no clear ____ is an undecidable problem
  12. 22. The idea that some communities or populations have less access to computing than others (2 words)
Down
  1. 2. True or false a linear search is an algorithm that searches a sorted list for a value by repeatedly splitting the list in half
  2. 3. TCP stands for ___control protocol
  3. 4. A lightweight data transport protocol (3 words, No caps)
  4. 8. A run-time error is a mistake in a program that happens only when the program is actually ___
  5. 10. An attack where the user is ___ into revealing private information is called phishing
  6. 11. When a user visits a ____ a cookie is created
  7. 12. A binary search is an algorithm that searches a sorted list for a value by repeatedly splitting the list in ____
  8. 17. A bit uses the binary numbers 0 and ___
  9. 18. Reasonable Time is when an algorithms with a ___ efficiency or lower are said to run in a reasonable amount of time
  10. 20. Encryption is the process of scrambling data to prevent ____ access.