FOC - Unit 6-7 - S1 25-26

1234567891011121314151617181920212223242526
Across
  1. 4. involves one key for both encryption and decryption
  2. 6. an extra piece of information passed to a function to customize it for a specific need
  3. 8. a description of the behavior of a command, function, library, API, etc.
  4. 12. a type of loop that has a predetermined beginning, end, and increment (step interval)
  5. 14. a collection of commands made available to a programmer
  6. 15. a method of programming in which two programmers write code using a single computer
  7. 16. software intended to damage a computing system or to take partial control over its operation
  8. 20. a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails
  9. 21. a simplified representation of something more complex
  10. 22. a process that reverses encryption, taking a secret message and reproducing the original plain text
  11. 25. pairs a public key for encryption and a private key for decryption. The sender does not need the receiver’s private key to encrypt a message, but the receiver’s private key is required to decrypt the message
  12. 26. a collection of functions, typically with a shared purpose
Down
  1. 1. a base-16 number system that uses sixteen distinct symbols 0-9 and A-F to represent numbers from 0 to 15
  2. 2. includes a program as an integral part of its function. Can be physical (e.g. self-driving car), non-physical computing software (e.g. picture editing software), or non-physical computing concepts (e.g., e-commerce).
  3. 3. protects a computing system against infection
  4. 5. a repetitive portion of an algorithm which repeats a specified number of times or until a given condition is met
  5. 7. a general description of a task that can (or cannot) be solved with an algorithm
  6. 9. a system that requires at least two steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access
  7. 10. deciding which steps to do next
  8. 11. the action of doing something over and over again
  9. 13. a wireless access point that gives unauthorized access to secure networks
  10. 17. a process of encoding messages to keep them secret, so only "authorized" parties can read it
  11. 18. a named group of programming instructions
  12. 19. putting steps in an order
  13. 20. (Personally Identifiable Information) information about an individual that identifies, links, relates, or describes them
  14. 23. a finite set of instructions that accomplish a task
  15. 24. the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information