CS Principles Review - 2022

12345678910111213141516
Across
  1. 5. Rogue Access Point is a wireless access point that gives _____ access
  2. 9. the separation of a program into independent ____s.
  3. 11. the ability of a system to adjust to meet new demands.
  4. 12. htt Hypertext Transfer UD User Datagram are all missing what letter and associated word.
  5. 15. when a system can support failures and still continue to function, it is called ____.
  6. 16. Symmetric key encryption involves the key for both encryption and decryption
Down
  1. 1. a problem where we can’t ever create an algorithm that would be able to answer for all inputs.
  2. 2. citizen science is _____ conducted by people who contribute relevant data to research.
  3. 3. distributed computing is a computational model which uses ________ devices.
  4. 4. The iteration over the items in a list
  5. 6. network connection, typically measured in bits per second.
  6. 7. an approach to solving problems that will always get an answer.
  7. 8. an attack where a user is tricked into revealing private information, often via a deceptive email.
  8. 10. The Checksum is an error checking mechanism built into the metadata of Internet packets. Its in which protocol
  9. 13. Array's start at what number on cs exam
  10. 14. ___ source—programs that are made freely available and may be redistributed and modified