The Ultimate Review Guide

12345678910111213
Across
  1. 3. an example of this was Ethernet
  2. 7. This occurs when the code continues to run but not as expected.
  3. 10. An access point that is wireless and functions to give unauthorized access to secure networks
  4. 11. the separation of a program into independent modules that are each responsible for one aspect of the program's functionality
  5. 12. This simply allows for the scalability of the internet through routing
  6. 13. a sequence of 8 bits
Down
  1. 1. A type of abstraction that uses arrays and/or lists in order to simplify the code and making it easier to adapt and scale to larger projects
  2. 2. when one function can be a broad function that contains more specific function inside of it
  3. 4. a technique that helps an algorithm find a good solution in a hard problem
  4. 5. a software that is freely accessible to the public and may be modified and sold
  5. 6. some communities have less access to computing than others due to limitation of internet speed or hardware access
  6. 7. an attack where a user is tricked into revealing private information, via a deceptive email.
  7. 8. reptition of steps in an algorithm until the condition is met
  8. 9. small amount of text that tracks information about a user visiting a website
  9. 11. data about data