Across
- 1. program interfaces (APIs), specifications for how the procedures in a library behave and can be used.
- 3. science, Scientific research conducted in whole or part by distributed individuals, many of whom may not be scientists, who contribute relevant data to research using their own computing devices.
- 7. computing, the delivery of computing services—including servers, storage, databases, networking, software, analytics, and intelligence—over the Internet (“the cloud”) to offer faster innovation, flexible resources, and economies of scale.
- 8. The practice of obtaining input or information from a large number of people via the Internet.
- 10. data about data
- 11. a technique that attempts to trick a user into providing personal information.
- 13. learning, an application of artificial intelligence (AI) that provides systems the ability to automatically learn and improve from experience without being explicitly programmed.
- 14. an agreed upon set of rules that specify the behavior of a system
- 16. key encryption, involves one key for both encryption and decryption.
- 18. the process of decoding the data.
- 20. Denial of Service, a malicious attempt to disrupt the normal traffic of a targeted server service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic.
- 21. True or false values
Down
- 2. the delay between a user's action and a web application's response to that action
- 4. Engineering Task Force, Develops and promotes voluntary Internet standards and protocols, in particular the standards that comprise the Internet protocol suite (TCP/IP).
- 5. divide, refers to differing access to computing devices and the Internet, based on socioeconomic, geographic, or demographic characteristics.
- 6. Law, A prediction made that computing power will double every 1.5 - 2 years.
- 9. the inclusion of extra components that can be used to mitigate failure of a system if other components fail.
- 11. key encryption, pairs a public key for encryption and a private key for decryption.
- 12. Cipher, an alphabetic shift.
- 15. a network of servers that track the IP addresses of different domain names like “example.com”
- 17. the process of encoding data to prevent unauthorized access.
- 19. abstractions, manage complexity in programs by giving a collection of data a name without referencing the specific details of the representation.
