The Ultimate Review Guide
Across
- 3. an example of this was Ethernet
- 7. This occurs when the code continues to run but not as expected.
- 10. An access point that is wireless and functions to give unauthorized access to secure networks
- 11. the separation of a program into independent modules that are each responsible for one aspect of the program's functionality
- 12. This simply allows for the scalability of the internet through routing
- 13. a sequence of 8 bits
Down
- 1. A type of abstraction that uses arrays and/or lists in order to simplify the code and making it easier to adapt and scale to larger projects
- 2. when one function can be a broad function that contains more specific function inside of it
- 4. a technique that helps an algorithm find a good solution in a hard problem
- 5. a software that is freely accessible to the public and may be modified and sold
- 6. some communities have less access to computing than others due to limitation of internet speed or hardware access
- 7. an attack where a user is tricked into revealing private information, via a deceptive email.
- 8. reptition of steps in an algorithm until the condition is met
- 9. small amount of text that tracks information about a user visiting a website
- 11. data about data