Bletchley Park Computing Science Crossword
Across
- 3. An attribute that uniquely identifies one, and only one, entity occurrence in a database (Database Key)
- 5. File format for storing images where each pixel and color are stored individually. Can be edited at the pixel level, and the image is resolution-dependent.
- 9. A custom data type that itself can contain many different pieces of data.
- 12. A notation resembling a simplified programming language used to design algorithms before writing in a programming language.
- 17. We say a piece of software or code is this when it is written and documented in a way that makes changes straightforward.
- 19. Temporary storage locations within the processor. Store instructions, data, or memory addresses temporarily while a process is being carried out.
- 20. The fith step in the waterfall software development methodology.
- 21. Accronyme for a specific security risk that involves an attacker sending multiple spoof requests to a system causing the system to be unable to process legitimate requests.
- 22. The program will not crash even when faced with unacceptable input. A program can be made this way by the inclusion of input validation.
- 23. Variables which only exist in the method or function in which it was defined, are destroyed when we reach the end of the method or function. (Variable Scope)
- 26. The code is broken down into functions and procedures. Helps with readability and maintainability.
- 27. Type of error that causes the program to crash when executing. An example of this type of error would be division by zero.
- 29. An attribute that is inserted into an entity to link two entities together for a relational database. This attribute will be the primary key in another entity. (Database Key)
- 33. Debugging technique that involves temporarily halting the program when the value of specified variables changes. This allows the programmer to compare the actual value with the expected value.
- 35. Method of storing both positive and negative numbers in binary (2nd word of the two words)
- 36. We say a piece of software is this when the software uses the least amount of system resources (CPU, Memory) as possible.
Down
- 1. An array search methodology where we go through the entire array and check each element until we find the correct one.
- 2. The part of the CPU that is responsible for handling mathematical and logical operations such as addition, subtraction, logical "and" etc. (Only the first word of the name of the component)
- 4. Used to replace one or more characters in an SQL search.
- 6. The limits that help define what is in the project and what is not. It can also clarify any assumptions made by the software developers regarding the client's requirements.
- 7. Debugging technique that involves temporarily halting the program when a certain line is reached. The value of variables can then be checked when the program is halted.
- 8. Software development methodology that supports flexibility, especially when client specifications change frequently.
- 10. A variable that you specify when you determine the subroutine or function. (Parameter Passing)
- 11. Type of error that prevents the code from compiling. Examples of this type would be forgetting closing parenthesis e.g. Print("Hello"
- 13. Variables that are available to be accessed and altered from any part of a program. (Variable Scope)
- 14. Fetch execute cycle - the name of the bus that accesses a memory location through memory addressability.
- 15. JavaScript event that triggers when the user moves the mouse pointer over an image or piece of text.
- 16. A drawing of a webpage that helps to design the layout, relative positioning of media, and file formats to ensure consistency across multiple pages.
- 18. Part of representing floating point representation in binary. The more bits assigned to this part, the higher the accuracy of the stored value.
- 24. Standard for storing text in binary. This standard uses 8 bits per character.
- 25. The name of the predefined function that returns the remainder when one number is divided by another.
- 28. Standard for storing text in binary. This particular standard is useful when we want to store a wider variety of characters (e.g. other languages)
- 30. Encryption - The key that is kept secret, only one entity has access to this key.
- 31. Part of representing floating point representation in binary. The more bits assigned to this part, the greater the range of values that can be stored (greater range = can store very large numbers and very small numbers)
- 32. Javascript event that triggers when the user clicks on an image or piece of text.
- 34. The values that are passed into the function when the function is called(Parameter Passing)