CS101 Vocab Review

12345678910111213141516171819202122232425262728293031323334353637383940414243444546
Across
  1. 1. Governs what an authenticated user is allowed to do
  2. 3. Memory that stores values that are being used during processing
  3. 6. The number of bits used to store each sample or value
  4. 7. A signal that changes continuously overtime
  5. 11. A smarter device that has knowledge about the nodes on each bus or LAN
  6. 14. The number of images shown per second of video
  7. 16. A collection of logic gates that transforms a set of binary inputs into a set of binary outputs
  8. 17. The probability that a data request will be in the cache
  9. 18. Used to store data for transactional purposes
  10. 20. A type of node that amplifies and forwards a signal
  11. 21. Users who have more privileges than others
  12. 22. The process of measuring an analog signal at set intervals in order to digitize it
  13. 24. Training model to correspond too closely or exactly to a particular set of data
  14. 25. A variable or statement that evaluates to true or false
  15. 26. A single element of a picture
  16. 29. The type of node needed as the center of a star topography
  17. 31. A type of node that can translate signals between different types of networks
  18. 32. Malware that pretends to only do a legitimate task while also breaching security
  19. 33. An unreliable transmission protocol
  20. 35. A type of memory where information disappears without power
  21. 36. A fixed size unit of memory, typically 1 byte
  22. 37. This occurs when a computer tries to represent a number larger than the maximum value it is capable of storing
  23. 40. Applying a mathematical one-way function to create a "signature" of the input
  24. 45. A type of supervised learning with discrete targets
  25. 46. Occurs when two messages are sent at the same time on a shared communication line
Down
  1. 2. A method used to hide unneeded or complex details of a problem or idea
  2. 4. The fastest networking technology for data communication today
  3. 5. There are _____ bits in one byte
  4. 8. Step-by-step instructions for solving a problem
  5. 9. A program for reading and interpreting websites
  6. 10. The base 8 positional numbering system
  7. 12. A type of machine learning based on rewards and punishments
  8. 13. An aspect of a computer that can be used to breach security
  9. 15. The process of verifying that you really are the person who has the right to access a given computer
  10. 19. The program that translates assembly language to machine language
  11. 21. The practice of hiding the very existence of a message
  12. 23. The base 2 numbering system that does not allow for negative numbers
  13. 27. A reliable transmission protocol
  14. 28. The von Nuemann architecture component that includes the ALU and the Control Unit
  15. 30. An example of non-volatile memory
  16. 32. A Boolean expression that is never false
  17. 34. The rate at which information can be sent and received across a network
  18. 38. A malicious security breach
  19. 39. A network of networks
  20. 41. A flexible notation that lies between the two extremes of natural language and real code
  21. 42. The internet protocol layer whose goal is to deliver packages from source port to destination port
  22. 43. One of the 3-V's, the rate at which data changes
  23. 44. A herd of computers controlled to perform a task without the user's knowledge