Comp. Sci. Crossword

1234567891011121314151617181920
Across
  1. 3. (American Standard Code for Information Interchange) is one of the most common character encoding standards.
  2. 6. Artificial intelligence that embodies a system designed to carry out one particular job.
  3. 8. Data with values that change continuously, or smoothly, over time. Ex. music, colors of a paintain, a sprinter in a race.
  4. 9. The amount of delay (or time) it takes to send information from one point to the next.
  5. 12. Algorithms for scrambling date into unreadable text for secure communication.
  6. 14. Security threat where attackers corrupt the Domain Name System (DNS) by altering IP address mappings, tricking users into visiting malicious sites by false IP address.
  7. 15. Data that changes discretely through a finite set of possible values.
  8. 16. A group of interconnected computing devices capable of sending or receiving data.
  9. 17. Often called a "Father of the Internet," co-designed the fundamental TCP/IP protocols that allow different networks to communicate, forming the backbone of the internet.
  10. 18. Fundamental microscopic switches on chips that control electric current to represent binary 0s (off) and 1s (on), forming the basis for all digital data processing.
  11. 19. networking device that forwards data packets between computer networks. They perform the traffic directing functions on the Internet.
  12. 20. Data compression method that reduces file size by finding patterns, allowing for perfect, bit-for-bit reconstruction of the original data.
Down
  1. 1. Field of artificial intelligence (AI) that enables systems to learn from data and improve without explicit programming. It uses algorithms to identify patterns in data, build models from those patterns, and make predictions or decisions on new, unseen data.
  2. 2. File or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants.
  3. 4. The data trail from your online activities. It demonstrates how personal information is collected, used by algorithms for targeted ads, and impacts privacy, security, and digital identity, making its management a key component of computational thinking and digital citizenship.
  4. 5. The systematic process of finding and fixing errors (bugs) in code.
  5. 7. The use of a computer program to record every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information.
  6. 10. Where computers process large datasets contributed by many individuals to identify patterns, solve problems, and build applications, highlighting the impact of computing on a collaborative scale.
  7. 11. A system that allows multiple computers across a network to access and manage files stored on different physical machines as if they were on a single local device.
  8. 13. base-16 system (0-9, A-F) used as human-friendly shorthand for binary.