Ap Computer Principles (Part 1)

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475
Across
  1. 3. a numeric system that only uses two digits — 0 and 1
  2. 6. also known as encrypted or encoded information because it contains a form of the original plaintext that is unreadable by a human or computer without the proper cipher to decrypt it
  3. 7. a type of denial of service (DoS) attack that sends a series of "SYN" messages to a computer, such as a web server
  4. 9. the process of receiving data over the Internet
  5. 11. the protection of computer systems from theft of or damage to their hardware
  6. 12. an automated program that runs over the Internet
  7. 16. the class of data encoding methods that uses inexact approximations and partial data
  8. 19. An IP address, or simply an "IP," is a unique address that identifies a device on the Internet
  9. 22. A megabyte is 106 or 1,000,000 bytes
  10. 24. the language used to create webpages
  11. 26. a dot matrix data structure that represents a generally rectangular grid of pixels
  12. 28. a digital telecommunications network which allows nodes to share resources
  13. 29. a technology that recognizes text within a digital image
  14. 38. any process in which information is gathered and expressed in a summary form
  15. 39. is a database that is located, stored, and maintained in a single location
  16. 42. the study of visual representations of abstract data to reinforce human cognition
  17. 43. smallest unit of data in a computer
  18. 46. a list of applications that are denied of access to a certain system
  19. 50. Stands for "American Standard Code for Information Interchange." ASCII character encoding provides a standard way to represent characters using numeric codes
  20. 51. An algorithm is a set of instructions designed to perform a specific task
  21. 53. A megapixel is one million pixels
  22. 54. Cryptography is the science of protecting information by transforming it into a secure format
  23. 55. an international standard for a secure cryptoprocessor, a dedicated microcontroller designed to secure hardware
  24. 57. any letter, number, space, punctuation mark, or symbol that can be typed on a computer
  25. 58. a central file storage location
  26. 59. the process of analyzing large amounts of data in order to discover patterns and other information
  27. 62. the process of putting/ converting data into a sequence of characters and symbols into a specialized format
  28. 63. refers to a collection of systems used to protect the copyrights of electronic media
  29. 64. A dossier is a collection of papers or other sources, containing detailed information about a particular person or subject
  30. 65. a symmetric-key block cipher
  31. 68. Rendering is the process of generating a final digital product from a specific type of input
  32. 70. the process of taking encoded or encrypted text or other data and converting it back into text that you or the computer can read and understand
  33. 72. a term used to describe unsightly debris that accrues as a result of the experience of digital living
  34. 74. the basic unit of programmable color on a computer display or in a computer image
  35. 75. - Metadata describes other data about a certain item’s content
Down
  1. 1. counts as a barrier between a trusted system or network and outside connections, such as the Internet
  2. 2. a continuous transmission of information to our senses
  3. 4. A wallpaper or background is a digital image used as a decorative background of a graphical user interface
  4. 5. any type of hardware that stores data
  5. 8. a facility used to house computer systems and houses computing facilities routers, firewalls, etc.
  6. 10. Lossless compression reduces a file's size with no loss of quality
  7. 13. cloud computing refers to applications and services offered over the Internet
  8. 14. a collection of tables with unknown relationships gathered to serve a specific
  9. 15. Stands for "Radio-Frequency Identification." RFID is a system used to track objects, people, or animals using tags that respond to radio waves
  10. 17. the primary location from where data comes
  11. 18. the address of a specific webpage or file on the Internet
  12. 20. information processed or stored by a computer
  13. 21. is a namespace that organizes a set of related classes and interfaces
  14. 23. the use of dedicated websites and applications to interact with other users,
  15. 25. A disk drive is a device that reads, writes, and deletes data to a disk
  16. 27. the ownership of intangible and non-physical goods, such as an idea, name, content, etc,
  17. 30. land or resources belonging to or affecting the whole of a community
  18. 31. is a computer program that is designed to simulate what might or what did happen in a situation
  19. 32. the software and hardwaresystems that support data-intensive applications
  20. 33. expressed as series of the digits 0 and 1
  21. 34. refers to an enterprise data storage entity into which data has been specifically partitioned for an analytical or reporting purpose
  22. 35. A digital signal is a signal that is being used to represent data as a sequence of discrete values
  23. 36. consists of multiple devices that communicate with one another
  24. 37. U.S. government encryption standard supported by the National Institute of Standards & Technology
  25. 40. can be larger than the original packet for the following
  26. 41. is an entity that issues digital certificates
  27. 44. the number of transistors placed in an integrated circuit or chip doubles approximately every two years
  28. 45. a small amount of data sent over a network, such as a LAN or the Internet
  29. 47. refers to methods of organizing units of data within larger data sets.
  30. 48. a list of items that are granted access to a certain system or protocol
  31. 49. a small chip that resides in computers and other electronic devices
  32. 52. the part of a view that is nearest to the observer, especially in a picture or photograph
  33. 56. a type of RAM that stores each bit of data on a separate capacitor
  34. 60. is 109 or 1,000,000,000 bytes
  35. 61. Query is another word for question
  36. 66. Processing is a programming language designed for the visual arts community
  37. 67. an electronic medium used to form a global computer network to facilitate online communication
  38. 69. Endpoint Detection and Response (EDR) is an emerging technology
  39. 71. stores recently used information so that it can be quickly accessed at a later time
  40. 73. refers to junk e-mail or irrelevant postings to a newsgroup or bulletin board