CS Principles 2022

123456789101112131415161718
Across
  1. 2. Metadata stores _____ concerning larger data to increase convenience.
  2. 3. JPG Images use this type of compression.
  3. 8. Rogue Access points allow for ________ access into secure networks.
  4. 10. All protocols used in the Internet are _____.
  5. 13. Algorithms with _______ efficiency are said to run in reasonable time.
  6. 14. A system that is able to handle failure and still function is called fault-________.
  7. 16. Open _____ programs can be redistributed and modified freely.
  8. 18. Some data types include lists, ______, strings, and numbers.
Down
  1. 1. The bandwidth of a computer is the ________ amount of data that can be sent in a fixed amount of time.
  2. 4. This type of problem has the goal of finding the best solution.
  3. 5. Every algorithm can be broken down into three parts: sequencing, ________, and iteration.
  4. 6. This type of routing allows for the scalability of the internet:
  5. 7. Analog data is used to store values that have ______ changes.
  6. 9. If you put 5 cans of beans into a box designed to hold 4 cans of beans, that is an example of a(n) _________ error.
  7. 11. A heuristic approach produces a solution that is not guaranteed to be _______ but is "good enough" for the situation.
  8. 12. This type of key encryption uses one key for both encryption and decryption.
  9. 15. Dividing by zero is an example of this type of error.
  10. 17. This protocol is more popular for video calls and streams.
  11. 18. Bandwidth is measured in ______ per second.