CS Principles Exam Review

12345678910111213141516
Across
  1. 3. online research output free of any and all restrictions on access and free of many restrictions on use, such as copyright or license restrictions
  2. 6. hiding a message in plain sight
  3. 10. The iteration over the items in a list. A full traversal iterates over every item, while a partial traversal iterates over a subset of the items.
  4. 12. An algorithm that searches a sorted list for a value by repeatedly splitting the list in half.
  5. 14. _____ key encryption involves one key for both encryption and decryption.
  6. 15. mixed up letters somehow
  7. 16. using one function to combine the features of another. For example a writeEssay() function could be a generalization that uses doResearch(), chooseThesis(), writeOutline() etc
Down
  1. 1. Compressing data in a way that discards some data and makes it impossible to recover the original.
  2. 2. The separation of a program into independent modules that are each responsible for one aspect of the program's functionality.
  3. 4. _____ issues digital certificates that validate the ownership of encryption keys used in secure communications and are based on a trust model
  4. 5. every letter is substituted with another letter
  5. 7. _____ key encryption pairs a public key for encryption and a private key for decryption.
  6. 8. When your roblox game code gets leaked to the world it becomes...
  7. 9. An algorithm that iterates through each item in a list until it finds the target value.
  8. 11. Algorithms with exponential complexity run in an ____ amount of time.
  9. 13. Algorithms with a polynomial complexity or lower (constant,linear, square, cube, etc.) are said to run in a _____ amount of time.