CS101 Vocab Review
Across
- 1. Governs what an authenticated user is allowed to do
- 3. Memory that stores values that are being used during processing
- 6. The number of bits used to store each sample or value
- 7. A signal that changes continuously overtime
- 11. A smarter device that has knowledge about the nodes on each bus or LAN
- 14. The number of images shown per second of video
- 16. A collection of logic gates that transforms a set of binary inputs into a set of binary outputs
- 17. The probability that a data request will be in the cache
- 18. Used to store data for transactional purposes
- 20. A type of node that amplifies and forwards a signal
- 21. Users who have more privileges than others
- 22. The process of measuring an analog signal at set intervals in order to digitize it
- 24. Training model to correspond too closely or exactly to a particular set of data
- 25. A variable or statement that evaluates to true or false
- 26. A single element of a picture
- 29. The type of node needed as the center of a star topography
- 31. A type of node that can translate signals between different types of networks
- 32. Malware that pretends to only do a legitimate task while also breaching security
- 33. An unreliable transmission protocol
- 35. A type of memory where information disappears without power
- 36. A fixed size unit of memory, typically 1 byte
- 37. This occurs when a computer tries to represent a number larger than the maximum value it is capable of storing
- 40. Applying a mathematical one-way function to create a "signature" of the input
- 45. A type of supervised learning with discrete targets
- 46. Occurs when two messages are sent at the same time on a shared communication line
Down
- 2. A method used to hide unneeded or complex details of a problem or idea
- 4. The fastest networking technology for data communication today
- 5. There are _____ bits in one byte
- 8. Step-by-step instructions for solving a problem
- 9. A program for reading and interpreting websites
- 10. The base 8 positional numbering system
- 12. A type of machine learning based on rewards and punishments
- 13. An aspect of a computer that can be used to breach security
- 15. The process of verifying that you really are the person who has the right to access a given computer
- 19. The program that translates assembly language to machine language
- 21. The practice of hiding the very existence of a message
- 23. The base 2 numbering system that does not allow for negative numbers
- 27. A reliable transmission protocol
- 28. The von Nuemann architecture component that includes the ALU and the Control Unit
- 30. An example of non-volatile memory
- 32. A Boolean expression that is never false
- 34. The rate at which information can be sent and received across a network
- 38. A malicious security breach
- 39. A network of networks
- 41. A flexible notation that lies between the two extremes of natural language and real code
- 42. The internet protocol layer whose goal is to deliver packages from source port to destination port
- 43. One of the 3-V's, the rate at which data changes
- 44. A herd of computers controlled to perform a task without the user's knowledge