AP Comp Sci Principles Semester 1 Review

1234567891011121314151617181920
Across
  1. 2. The amount of delay (or time) it takes to send information from one point to the next.
  2. 3. A base -16 number system that uses sixteen distinct symbols 0-9 and A-F to represent numbers from 0-15
  3. 9. The use of a computer program to record every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information.
  4. 10. The most common networking protocol online. Extremely reliable and used for everything from surfing the web, sending emails and transferring files.
  5. 14. Some program statements run when triggered by an event, like a mouse click or a key press
  6. 15. An AI system originally used to play Jeopardy
  7. 16. A legal document designed to shield a company from a lawsuit
  8. 18. A form of AI that relies on instructions being fed to it
  9. 19. An algorithm that substitutes each letter in the original message with a letter in a certain number of steps down the alphabet
  10. 20. Electric current or voltage
Down
  1. 1. The scrambling or changing of the message to hide the original text
  2. 4. A form of program documentation written into the program to be read by people and which do not affect how a program runs
  3. 5. A mode of computer operation in which a process is split into parts that execute simultaneously on different processors attached to the same computer.
  4. 6. Finding and fixing errors/problems in an algorithm/program
  5. 7. Small sizes of data from a larger message
  6. 8. Hacker taps into server and changes it to match a domain name with the wrong IP address
  7. 11. Information about an individual that identifies, relates, or describes them
  8. 12. Headquarter located in Arlington, Virginia
  9. 13. A file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants.
  10. 17. A scalable, fault-tolerant, and cost-effective distributed file system that stores large datasets across a cluster of commodity hardware