Across
- 2. Software intended to damage a computing system or to take partial control over its operation.
- 4. A technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources (such as bank accounts and emails).
- 8. A variable in a function definition. Used as a placeholder for values that will be passed through the function.
- 9. Form of program documentation written into the program to be read by people and which do not affect how a program runs.
- 10. A group of functions (procedures) that may be used in creating new programs.
- 12. An ordered collection of elements.
- 14. An ordered sequence of characters.
- 15. A combination of operators and values that evaluates to a single value.
- 16. The series of connections between computing devices on a network starting with a sender and ending with a receiver.
Down
- 1. A process for creating a digital representation of analog data by measuring the analog data at regular intervals called samples
- 3. The inclusion of extra components so that a system can continue to work even if individual components fail.
- 4. A general description of a task that can (or cannot) be solved with an algorithm.
- 5. The collection of facts and patterns extracted from data.
- 6. A repetitive portion of an algorithm which repeats a specified number of times or until a given condition is met.
- 7. The time used to complete a task sequentially divided by the time to complete a task in parallel.
- 9. The practice of obtaining input or information from a large number of people via the Internet.
- 11. Any data that are sent from a program to a device. Can come in a variety of forms, such as tactile interaction, audio, visuals, or text.
- 13. A way of representing information using only 2 options
