APCSP Intro to Vocabulary (Part 4)

123456789101112
Across
  1. 7. A type of computer malware that can make copies of itself
  2. 8. A method of user authentication which requires the user to present multiple pieces of evidence in multiple categories
  3. 9. The sequential execution of steps in an algorithm or code in a program
  4. 10. Error that results when the number of bits is not enough to represent the number
  5. 11. A technique for encrypting data where the same key is used to both encrypt and decrypt data
  6. 12. A run time for an algorithm that doesn’t increase faster than a polynomial function of the input size
Down
  1. 1. The ability of a system to adjust in scale to meet new demands
  2. 2. An agreed upon set of rules that specify the behavior of a system
  3. 3. A lightweight data transport protocol with minimal error checking
  4. 4. A data transport protocol that includes mechanisms for reliably transmitting packets to a destination
  5. 5. An attack where a user is tricked into revealing private information, often via a deceptive email
  6. 6. Error that results when the number of bits is not enough to represent the number with full precision