AP Computer Principles

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071
Across
  1. 3. Trusted platform module is a specialized chip on an endpoint device that stores RSA encryption keys specific to the host system for hardware authentication
  2. 6. a group or system of interconnected people or things
  3. 7. list of items that are granted access to a certain system or protocol
  4. 8. Collection of hardware and software needed to have a working system
  5. 10. something that is created dynamically according to the needs of the data user
  6. 11. request for information from a database
  7. 15. a list of email addresses or domains of known spammers which are considered dangerous
  8. 16. a large group of network computer servers typically used by organizations for the remote storage, processing, or distribution of large amounts of data
  9. 17. state of being protected against criminal or unauthorized use of electronic data
  10. 21. the practice of using a network of remote servers hosted on the Internet to store, manage and process data
  11. 22. A class of data compression algorithms that allows original data to be perfectly reconstructed from compressed data
  12. 28. the online world of computer networks and especially the Internet
  13. 32. Algorithm for performing encryption or decryption - a series of steps that can be followed as a procedure - which converts plain text into a coded set of data
  14. 36. computer program that analyzes data in order to translate it to a form acceptable to the computer
  15. 38. a device that allows a computer to read data and/or write data on a disk
  16. 39. A type of computing architecture where all or most of the processing is performed on a central server
  17. 41. a trusted entity that manages and issues security certificates and public keys used for secure communication in a public network
  18. 46. describes the method of converting data for storage or transmission
  19. 49. encryption standard developed by IBM - data encryption standard is a block cipher thus applying cryptographic key and algorithms to a block of data rather than one bit at a time
  20. 50. enterprise data storage entity in which data has been specifically partitioned for an analytical or reporting purpose
  21. 51. Advanced encryption standard is a symmetric block cipher to protect classified information and is implemented in software and hardware to encrypt sensitive data
  22. 57. expressed as a series of zero and one, typically represented by values of a physical quantity
  23. 58. a unit of information equal to 1 million bytes
  24. 60. an instance of a program running in a computer which is started when the program is initiated
  25. 62. a rectangular pattern of parallel scanning lines followed by the electron beams on a TV screen or computer monitor
  26. 63. the art of writing or solving codes
  27. 64. forwarding by a router of a packet from any node to every other node attached to the router
  28. 65. to store data and perform calculations using only zeros and ones
  29. 66. Central location in which data is stored and managed
  30. 67. Digital rights management is a systematic approach to copyright protection for digital media
  31. 68. relating to or using signals represented by a continuously variable physical quantity
  32. 69. an identifier for devices on the TCP/IP network
  33. 71. A small amount of data sent over a network which includes a source and destination
Down
  1. 1. the observation that the number of transistors in a dense, integrated circuit doubles approximately every two years
  2. 2. to copy data from one computer system to another, typically over the Internet
  3. 4. a minute area of illumination on a display screen, one of many from which an image is composed
  4. 5. a unit of information equal to 1 billion bytes
  5. 9. interrelationship among data elements that determine how data is recorded, manipulated, stored and presented in a database
  6. 12. primary location from where data comes such as a database, data set or spreadsheet
  7. 13. the address of the world wide web page
  8. 14. any computing hardware that is used for storing, porting and extracting data files
  9. 18. the use of dedicated websites and applications to interact with other users
  10. 19. recognition of printed or written text characters by a computer - optical character recognition
  11. 20. use of interactive, sensory representations of abstract data to reinforce cognition, hypothesis building and reasons
  12. 23. term referring to creations of the intellect for which a monopoly is assigned to designated owners by law
  13. 24. software used to organize and analyze data
  14. 25. describes how, when and by whom a particular set of data was collected and how data is formed
  15. 26. hypertext markup language is standard text based computer language for creating electronic documents for the web or offline uses
  16. 27. the process of converting information or data into a code, especially to prevent unauthorized access
  17. 29. any letter, number, punctuation mark or symbol that can be typed
  18. 30. radio frequency identification is a form of wireless communication that incorporates the use of electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum
  19. 31. reduces a file by permanently eliminating certain information
  20. 33. the process of representing a real world object or phenomenon as a set of mathematical equations
  21. 34. Term used to describe unsightly debris that occurs due to digital living
  22. 35. signal that is used to represent data as a sequence of discrete values
  23. 37. practice of sending unwanted email messages, frequently with commercial content
  24. 40. any process in which information is gathered and expressed in a summary form
  25. 42. To store data locally in order to speed up subsequent retrievals
  26. 43. well-defined procedure that allows computers to solve a problem
  27. 44. An automated program that runs over the Internet - a computer program that executes a specific task according to the users instructions
  28. 45. a unit of graphic solution equivalent to 1 million pixels
  29. 46. event data recorder’s capture information for analysis or better understanding of an event
  30. 47. system that transfers data between network access points known as nodes through data switching, system control and interconnection transmission lines
  31. 48. the place an active program is running but is not visible to the user
  32. 50. Dynamic random-access memory is a type of random access semiconductor memory that stores each bit of data in a separate tiny capacitator within an integrated circuit
  33. 52. Part of a computer system that is designed to block unauthorized access while permitting outward communication
  34. 53. process of generating an image from a model using computer programs
  35. 54. process of taking encoded text or other data and converting it back to a text that you or the computer can read and understand
  36. 55. Discreet online resource that is collaboratively developed and managed by a community
  37. 56. smallest unit of data in a computer
  38. 57. the process of examining large databases in order to generate new information
  39. 59. quantities, characters or symbols on which operations are performed by a computer
  40. 61. contains the applications the user is working on - a priority assigned to programs running in a multitasking environment
  41. 67. Collection of documents about a person, event or subject
  42. 70. Most common format for text files in computers and on the Internet