CS Principles Review - 2022

1234567891011121314151617181920212223
Across
  1. 2. Information about an individual that can be used to uniquely identify them (directly or indirectly). (word is shortened)
  2. 7. A rogue access point is a _______ access point that provides an attacker with unauthorized access to the traffic going over the network.
  3. 8. A full traversal _______ over every item, while a partial traversal ______ over a subset of the items. (one word, same word)
  4. 11. An approximate latitude and longitude describing their ________ location.
  5. 14. When elements of complex systems (often in groups)_____ at unexpected times, leading to fault tolerance.
  6. 15. Heuristic is a technique that guides algorithms to find good choices that no longer needs to _______ search every possible solution.
  7. 17. A bit is a _____ digit, either 0 or 1.
  8. 18. Scrambling data according to a secret key.
  9. 20. A method of user authentication which requires the user to present multiple pieces of evidence in multiple categories (such as knowledge and possession).(word is shortened)
  10. 21. Creative commons is an alternative ________ that allows people to declare how they want their artistic creations to be shared, remixed.
  11. 23. A binary search, searches a _____ list for a value by repeatedly splitting the list in half.
Down
  1. 1. Analog data have values that change smoothly, rather than in ______ intervals, over time.
  2. 3. The gap between people who have access to affordable internet service and those who lack it. (2 words)
  3. 4. Bandwidth is the _______ amount of data that can be sent in a fixed period of time over a network connection, usually measured in bits per second.
  4. 5. An attack that tricks users revealing their private information usually via a deceptive email.
  5. 6. Iteration is the _______ of steps in an algorithm or program for a certain amount of times or until a certain condition is met.
  6. 9. The _______ execution of steps in an algorithm or code in a program (like steps in a recipe).
  7. 10. A small amount of text that tracks information about a user visiting a website.
  8. 12. ______ contains a chunk of data.
  9. 13. Recovering the original data from scrambled data using a secret key.
  10. 16. In order to determine different set of steps to execute based on a boolean expression, algorithms use _____.
  11. 19. IP, TCP, & UDP are common protocols used on the _________.
  12. 22. An agreed upon set of rules that specify the behavior of a system.