CS Principles Review

1234567891011121314151617181920
Across
  1. 2. rogue access point: A wireless access point that provides an attacker with ____ access to the traffic going over the network
  2. 5. JPG images use a ___ compression technique
  3. 8. a solution that is good enough
  4. 9. data about data
  5. 10. The process of finding a path from sender to receiver.
  6. 13. A library is a collection of ___ that are useful for creating programs
  7. 16. Analog data is data that changes ___
  8. 18. Digital divide is the idea that some communities have less ___ to computing than others
  9. 19. Parallel computing ___ a program
  10. 20. The redundancy of routing options between two points increases the ___ of the internet
Down
  1. 1. (2 words)algorithms with a polynomial efficiency or lower.
  2. 3. bandwidth is measured in __ per second
  3. 4. (2 words) An algorithm that searches a sorted list for a value by repeatedly splitting the list in half.
  4. 6. (2 words)a program that is made freely available and may be redistributed and modified.
  5. 7. A sequence of 8 bits
  6. 11. (Abbreviation)A data transfer protocol which includes mechanisms to reliably transmit packets
  7. 12. Huffman Compression is a ___ compression technique
  8. 14. A problem that is so logically difficult, we can’t ever create an algorithm that would be able to answer "yes or "no" for all inputs
  9. 15. A small amount of text that tracks information about a user visiting a website
  10. 17. PII is information that can be used to ___ someone.