CS Principles Review

123456789101112131415161718192021222324
Across
  1. 4. Type of compression Images use
  2. 7. A type of search algorithm that searches a sorted list for a value by repeatedly splitting the list in half.
  3. 8. Data about data, like descriptive information about a file or a row in a database.
  4. 9. A type of search by going through the entire list until the desired value is found
  5. 13. Uses different keys for encrypting versus decrypting data.
  6. 14. Error that results when the number of bits is not enough to represent the number (like a car’s odometer “rolling over”).
  7. 16. A mistake in typed code that violates the rules of the programming language. Typically, code with syntax errors will not run.
  8. 19. A library of procedures and a description of how to call each procedure.
  9. 22. A mistake in an algorithm or program that causes it to behave unexpectedly or return the incorrect value.
  10. 23. Can increase the data's usefulness by making it easier to organize, filter, and structure
  11. 24. The participation of volunteers from the public in a scientific research project
Down
  1. 1. The idea that some communities or populations have less access to computing than others
  2. 2. **Wikipedia uses ___ to write their articles
  3. 3. A sequence of 8 bits.
  4. 5. the same key is used to both encrypt and decrypt data.
  5. 6. A mistake in a program that happens only when the program is actually run, such as a program attempting to access memory that does not exist.
  6. 10. Compressing data in a way that discards some data and makes it impossible to recover the original.
  7. 11. A recipe is a type of this algorithm
  8. 12. Error that results when the number of bits is not enough to represent the number with full precision
  9. 15. Compressing data in a way that preserves all data away and allows full recovery of the original.
  10. 17. A binary digit, either 0 or 1.
  11. 18. Values that change smoothly, rather than in discrete intervals, over time. For example, the pitch and volume of a live concert. Learn more in From analog to digital data.
  12. 20. The process of scrambling data to prevent unauthorized access.
  13. 21. A shortcut valuing getting a plausible solution, even though it might not be the best solution