Y11/12 CompSci AS Level Review
Across
- 3. Collections of pre-written code that can be used by other programs.
- 4. Software whose source code is publicly available and can be modified.
- 8. A logical operation that returns true if the inputs are different.
- 9. A part of an instruction that specifies the operation to be performed.
- 13. A network topology that combines elements of multiple topologies.
- 16. Temporary storage areas used to hold data while it is being transferred.
- 17. A type of storage medium that uses magnetism to store data.
- 19. A unique hardware address used to identify network devices.
- 22. A part of the CPU responsible for performing arithmetic and logical operations.
- 24. Another term for the decimal number system.
- 25. A feature of an IDE where it formats the code or data to make it more readable.
- 27. A method for error detection in data transmission using parity bits.
- 29. Legal protection granted to the creators of original works.
- 30. A network of remote servers used to store and manage data online.
- 33. Software designed to help manage and tune computer resources.
- 36. Self-replicating malicious software that spreads across networks without user intervention.
- 37. A cryptographic method used to verify the authenticity of digital messages.
- 41. The practice of dividing a network into smaller, more manageable sub-networks.
- 42. Software that is available for use at no cost.
- 43. The part of the CPU that directs operations within the computer.
Down
- 1. the Vonn Neumann Cycle.
- 2. Malicious software disguised as legitimate software to deceive users.
- 5. Legal rights to creations of the mind, such as inventions and trademarks.
- 6. A type of data compression where some data is lost to reduce size.
- 7. A storage technology that uses light to read and write data, such as CDs and DVDs.
- 10. A cyber attack where multiple systems overwhelm a target with traffic.
- 11. Software that is distributed for free with the option to purchase after a trial period.
- 12. The process of ensuring that input data is correct and reasonable.
- 14. A communication system where data can flow in both directions simultaneously.
- 15. Small, fast storage locations within a CPU used to store data temporarily.
- 18. The process of checking that a system or product meets specified requirements.
- 20. (Duplicate) Another term for the decimal number system.
- 21. The process of tracking the status or performance of a system.
- 23. Malicious software that replicates itself and spreads to other computers.
- 26. Signals that halt the current process to handle a different task.
- 28. A method of addressing memory directly by its exact location.
- 31. A storage technology that uses flash memory instead of mechanical parts.
- 32. A register that holds the address of the next instruction to be executed.
- 34. The most recent version of the Internet Protocol addressing scheme.
- 35. A software tool used for writing and testing code.
- 38. A company that provides access to the internet.
- 39. A protocol and address of your network
- 40. A method of addressing memory by adding an index to a base address.