CS Principles Review - 2022

1234567891011121314151617
Across
  1. 4. Crowdsourcing is when multiple online users ____ to fund a project or come up with new ideas.
  2. 5. This is data about data.
  3. 8. The heuristic approach does not ensure that the ____ is optimal but is used when finding the best ____ is not practical.
  4. 10. This is when a user is tricked into giving away private information.
  5. 11. Information that can be used to uniquely ____ an individual is called personally identifiable information.
  6. 12. Distributed computing uses multiple ____ to run different parts of a program.
  7. 13. Creative commons is a public copyright license that allows copyrighted work to be _____ distributed.
  8. 15. Scientific research is done by individuals, many who are not scientists.
  9. 16. Multifactor _____ requires the user to show various proofs in multiple categories to determine their ____.
  10. 17. Scalablity is a program's ability to adjust its scale in order to meet new ____.
Down
  1. 1. Lossy compression technique takes away the subtle ____ variations that the human eye cannot capture. The ____ that is lost can never be recovered.
  2. 2. A rogue access point gives unauthorized access to secure networks through a ____ connection.
  3. 3. To prevent _____ access, an encryption is coded in the data.
  4. 6. A ____ is used to track information about a user visiting a website.
  5. 7. User datagram protocol is a minimal error checking protocol that transports _____ data.
  6. 9. Fault-tolerant is when a system is still able to function while supporting ____.
  7. 12. Open access allows people to view _____ for analysis purposes.
  8. 14. Application programing interface is a ____ of procedures with a description of how each procedure is called.