March Review Crossword

12345678910111213141516171819202122232425
Across
  1. 4. A process for reducing the number of bits needed to represent something in which some information is lost or thrown away. This process is not reversible.
  2. 6. Data about data.
  3. 9. Protects a computing system against infection.
  4. 12. used to return the flow of control to the point where the procedure (also known as a function) was called and to return the value of expression.
  5. 15. A technique for encryption that shifts the alphabet by some number of characters.
  6. 18. A group of interconnected computing devices capable of sending or receiving data.
  7. 19. A process of encoding messages to keep them secret, so only "authorized" parties can read it.
  8. 21. Any data that are sent from a program to a device. Can come in a variety of forms, such as tactile interaction, audio, visuals, or text.
  9. 22. A written description of how a command or piece of code works or was developed.
  10. 23. A process that reverses encryption, taking a secret message and reproducing the original plain text.
  11. 24. A wireless access point that gives unauthorized access to secure networks.
  12. 25. A technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails.
Down
  1. 1. Pairs a public key for encryption and a private key for decryption. The sender does not need the receiver’s private key to encrypt a message, but the receiver’s private key is required to decrypt the message.
  2. 2. A method of computer access in which a user has to successfully provide evidence in at least two of the following categories: knowledge (something they know), possession (something they have), and inherence (something they are). Each step provides a new layer of security.
  3. 3. The system responsible for translating domain names like example.com into IP addresses
  4. 5. Software intended to damage a computing system or to take partial control over its operation
  5. 7. The generic term for a technique (or algorithm) that performs encryption
  6. 8. The single unit of information in a computer, typically represented as a 0 or 1
  7. 10. Information about an individual that identifies, links, relates, or describes them.
  8. 11. Involves one key for both encryption and decryption.
  9. 13. A variable in a function definition. Used as a placeholder for values that will be passed through the function.
  10. 14. The use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
  11. 16. A group of computing devices and programs working together for a common purpose
  12. 17. A protocol for computers to request and share the pages that make up the world wide web on the Internet
  13. 20. When you attempt to decode a secret message without knowing all the specifics of the cipher, you are trying to crack the encryption.