FOC - Unit 6-7 - S1 25-26
Across
- 4. involves one key for both encryption and decryption
- 6. an extra piece of information passed to a function to customize it for a specific need
- 8. a description of the behavior of a command, function, library, API, etc.
- 12. a type of loop that has a predetermined beginning, end, and increment (step interval)
- 14. a collection of commands made available to a programmer
- 15. a method of programming in which two programmers write code using a single computer
- 16. software intended to damage a computing system or to take partial control over its operation
- 20. a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails
- 21. a simplified representation of something more complex
- 22. a process that reverses encryption, taking a secret message and reproducing the original plain text
- 25. pairs a public key for encryption and a private key for decryption. The sender does not need the receiver’s private key to encrypt a message, but the receiver’s private key is required to decrypt the message
- 26. a collection of functions, typically with a shared purpose
Down
- 1. a base-16 number system that uses sixteen distinct symbols 0-9 and A-F to represent numbers from 0 to 15
- 2. includes a program as an integral part of its function. Can be physical (e.g. self-driving car), non-physical computing software (e.g. picture editing software), or non-physical computing concepts (e.g., e-commerce).
- 3. protects a computing system against infection
- 5. a repetitive portion of an algorithm which repeats a specified number of times or until a given condition is met
- 7. a general description of a task that can (or cannot) be solved with an algorithm
- 9. a system that requires at least two steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access
- 10. deciding which steps to do next
- 11. the action of doing something over and over again
- 13. a wireless access point that gives unauthorized access to secure networks
- 17. a process of encoding messages to keep them secret, so only "authorized" parties can read it
- 18. a named group of programming instructions
- 19. putting steps in an order
- 20. (Personally Identifiable Information) information about an individual that identifies, links, relates, or describes them
- 23. a finite set of instructions that accomplish a task
- 24. the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information