CS Principles Review - 2022

1234567891011121314151617181920
Across
  1. 2. to grab someone's IP address
  2. 5. The availability of routing options allows for the internet to be _____
  3. 6. A linear search ___ through every item in the list until it finds it target value
  4. 9. Selection is when a boolean condition is used to determine what path should be taken in a algorithm or program
  5. 11. Multi-factor authentication's common forms include knowledge, ____ and inherence
  6. 14. Search A search which requires the list to be sorted
  7. 15. When a algorithm loops until a a specified condition is met
  8. 16. A library is a collection of _____ that are useful in creating programs
  9. 17. A program which can ____ well is able to adjust to greater demands
  10. 19. Bandwidth is the maximum amount of ____ that can per second
  11. 20. Symmetric encryption is when the ____ key is used to encrypt and decrypt data
Down
  1. 1. ____ can be created using sequencing, selection and iteration
  2. 3. When you separate a program into independent _______ which are responsible for different aspects of the programs functionality
  3. 4. Crowdfunding for science
  4. 7. this data transport protocol is able to detect if packets are lost
  5. 8. Analog data changes ____ over time
  6. 10. Protocols are an agreed upon set of rules that specify the ____ of a system
  7. 12. like steps in a recipe
  8. 13. Runs with polynomial efficiency
  9. 18. This is a type of digital attack that disrupts a service by sending too many requests