CS Principles Review - 2022

123456789101112131415161718192021
Across
  1. 3. A mistake in an algorithm or program that causes it to behave unexpectedly or return the _____ value.
  2. 5. A computational model which splits a program into multiple tasks, some of which can be executed simultaneously.(_____ Computing)
  3. 6. symmetric ____ion: A technique for ____ing data where the same key is used to both _____ and de___ data.(One Word)
  4. 8. The maximum amount of data that can be sent in a fixed period of time over a network connection
  5. 10. some people use this to catch fish others use it as an attack where a user is tricked into revealing private information, often via a deceptive email.
  6. 14. The iteration over the items in a list. A full _____ iterates over every item, while a partial _____ iterates over a subset of the items.
  7. 15. UDP is a lightweight data transport _____ with minimal error checking.
  8. 16. a rogue access point is a wireless access point that provides an attacker with _______ access to the traffic going over the network.
  9. 17. a small round food with chocolate chips. Also a small amount of text that tracks information about a user visiting a website.
  10. 18. Personally identifiable information is Information about an individual that can be used to uniquely _____ them.
  11. 20. An example of this 3 letter acronym is two-step verification
  12. 21. A computational model which uses multiple devices to run different parts of a program.(______ Computing)
Down
  1. 1. An algorithm that iterates through each item in a list until it finds the target value.(____ Search)
  2. 2. A physical device that can run a program(____ Device)
  3. 4. A sequence of 8 bits.
  4. 7. Crowdsourcing for science!(______ Science)
  5. 9. A data transport protocol that includes mechanisms for reliably transmitting packets to a destination.(Hint: An Acronym)
  6. 11. A group of interconnected computing devices capable of sending or receiving data.(Computer ______)
  7. 12. A virus is a type of computer ______ that can make copies of itself
  8. 13. A library is a collection of ______ that are useful in creating programs
  9. 19. lossy means to compress _____ in a way that discards some data and makes it impossible to recover the original.