Across
- 1. An asymmetric encryption system where a different key is used for encryption and decryption.
- 3. Information about an individual that identifies, links, relates, or describes them.
- 4. Decision problem for which an algorithm can be written to produce a correct output for all inputs.
- 7. An algorithm that searches a sorted list for a value by repeatedly splitting the list in half until the value is found or all elements have been eliminated.
- 8. A problem for which no algorithm can be constructed that is always capable of providing a correct yes-or-no answer.
- 11. Finite set of instructions that accomplish a specific task.
- 14. Data about data.
- 16. Problem with the goal of finding the "best" solution among many.
- 17. Computer programs that can block, detect, and remove virus and other malware.
- 19. A broad term for datasets so large or complex that traditional data processing applications are inadequate.
- 21. A scheme in which the key to encrypt data is different from the key to decrypt.
- 22. A technique for encrypting data where the same key is used to both encrypt and decrypt data.
- 23. A method of protecting information and communications through the use of codes so that only those for whom the information is intended can read and process it.
- 25. The time used to complete a task sequentially divided by the time to complete a task in parallel.
- 28. Copyrighted software that is given for free by the author or copyright owner.
- 29. An algorithm that iterates through each item in a list until it finds the target value or all elements have been checked.
- 31. A model in which programs are run by multiple devices.
- 33. A process that reverses encryption, taking a secret message and reproducing the original plain text.
- 36. A model in which programs run in order, one command at a time.
- 37. The act of attempting to decode a secret message without knowing all the specifics of the cipher.
- 40. A technique that attempts to trick a user into providing personal information.
- 41. An application of artificial intelligence that provides systems the ability to automatically learn and improve from experience without being explicitly programmed.
- 42. In a worst case scenario, the number of steps of an algorithm has a exponential or factorial efficiency.
- 43. A wireless access point that provides an attacker with unauthorized access to the traffic going over the network.
Down
- 1. General description of a task that can (or cannot) be solved with an algorithm.
- 2. Data that does not accurately reflect the full population or phenomenon being studied.
- 5. A system that requires at least two steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access.
- 6. Application of each step of an algorithm in the order in which the code statements are given.
- 9. A measure of how many steps are needed to complete an algorithm.
- 10. Use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information.
- 12. Software intended to damage a computing system or to take partial control over its operation.
- 13. In a worst case scenario, the number of steps of an algorithm has a polynomial efficiency or lower (constant, linear, square, cube, etc.)
- 15. An innovation that includes a computer or program code as an integral part of its functionality. Examples: self-driving car, picture editing software, e-commerce
- 18. Problem with a yes/no answer.
- 20. A process of encoding messages to keep them secret, so only "authorized" parties can read it.
- 24. Data that can be freely used, re-used and redistributed by anyone.
- 26. A model in which programs are broken into small pieces, some of which are run simultaneously.
- 27. Choosing a smaller subset of a data set to use for analysis, for example by eliminating/keeping only certain rows in a table.
- 30. Scientific research conducted in whole or part by distributed individuals (not always scientists) who contribute relevant data to research using their own computing devices.
- 32. A relationship between two pieces of data.
- 34. The practice of obtaining input or information from a large number of people via the Internet.
- 35. Occurs when an algorithm produces results that are systemically prejudiced due to erroneous assumptions due to its design or use.
- 38. Process that makes the data uniform without changing its meaning.
- 39. A malicious program that can copy itself and gain access to a computer in an unauthorized way.
