Across
- 2. program that translates high-level code into machine-readable code.
- 5. physical parts of a computer system like the CPU or monitor.
- 7. step-by-step set of instructions to complete a task or solve a problem.
- 13. system of numerical notation that has 2 as its base (0 and 1).
- 14. maximum amount of data that can be transmitted over a connection.
- 18. security system that monitors and controls network traffic.
- 21. data into code to prevent unauthorized access.
- 22. electronic communication to intimidate or harass a person.
- 23. problem-solving mental shortcut or ""rule of thumb"" approach."
- 24. placeholder for a piece of information that can change.
- 25. security process requiring two different forms of identification.
- 26. programming technique where a function calls itself.
- 27. process of finding and fixing errors in a computer program.
- 28. programs and operating information used by a computer.
Down
- 1. global network of remote servers used to store and manage data.
- 3. temporary storage area that keeps recently used data for quicker access.
- 4. with source code that anyone can inspect, modify, and share."
- 6. fraudulent email attempt to steal sensitive information.
- 8. that describes other data, such as a photo's location or date."
- 9. in AI caused by skewed data or human prejudice.
- 10. information created and spread with the intent to deceive.
- 11. software application used to access and view websites.
- 12. trail of data you leave behind on the internet (Digital ____).
- 15. license that ensures modified software remains free and open.
- 16. responsible, ethical, and safe use of technology (Digital ____)."
- 17. group of two or more computer systems linked together.
- 19. informal code of polite conduct for communicating online.
- 20. data type that can only have one of two values: True or False.
