APCSP Units 9-10

123456789101112131415161718192021222324252627
Across
  1. 2. relationship between two pieces of data
  2. 7. attack in which a user is tricked into revealing private information
  3. 8. choosing a smaller subset of data to use for analysis
  4. 10. protections against threats and unauthorized usage of personal information
  5. 12. process of encoding messages to keep them secret so that only "authorized" parties can read it
  6. 14. type of encryption that involves one key for both encryption and decryption
  7. 15. development of computer systems with algorithms that enable them to learn and adapt based on patterns and inferences from data
  8. 18. wireless access point that provides an attacker with unauthorized access to the traffic going over a secure network
  9. 19. type of machine learning where a machine uses labeled input data to map a known target output generally used for solving classification and regression problems
  10. 21. research conducted in whole or part by distributed individuals using their own computing devices
  11. 22. type of machine learning where the machine is trained to make decisions in a specific way, usually through trial and error with rewards
  12. 24. type of encryption that pairs a public key for encryption and private key for decryption
  13. 25. use of a program to record every keystroke made by a computer in order to gain fraudulent access to confidential info
  14. 26. data that does not accurately reflect the full population being studied
  15. 27. small amount of text that tracks information about a user visiting a website
Down
  1. 1. process that takes a secret message and reproduces the original
  2. 3. the theory and development of computer systems able to perform tasks and solve problems in a similar manner to human intelligence
  3. 4. software intended to damage a computing system or take partial control over its operation
  4. 5. system that requires at least two steps to unlock protected information where each step adds a new layer of security
  5. 6. type of machine learning where a machine learns from unlabeled data and discovers patterns and features to produce an output
  6. 9. systematic and repeatable errors in a computer system that create unfair outcomes
  7. 11. policy allowing people to have public access to documents for reading for data for analysis
  8. 13. initial data to teach a machine or algorithm to predict outcomes and solve problems
  9. 16. the right to control how personal information is accessed, used, or shared
  10. 17. practice of obtaining input or information from a large number of people via the internet
  11. 20. type of computer malware that can make copies of itself
  12. 23. a process that makes the data uniform without changing its meaning