test BJC Unit 4 review

123456789101112131415161718192021222324252627282930313233
Across
  1. 3. A _________ is a small chunk of any kind of data (text, numbers, lists, etc.) and metadata (information about the data) that is passed through the Internet as a data stream.
  2. 4. ____________ software is a kind of malware that records every key pressed by a user.
  3. 6. ___________ is the process of encoding data to prevent unauthorized access.
  4. 7. A binary sequence (also called a __________ ) is a string of ones and zeros.
  5. 11. The __________ is a computer network that uses open protocols to standardize communication.
  6. 13. ____________ (Transmission Control Protocol) lets your computer pretend it has a reliable connection to the other computer.
  7. 17. switching means that the Internet sends short bursts of information, not long continuous strings.
  8. 19. __________ key encryption uses a pair of keys: a public key for encryption and a private key for decryption. The sender uses the public key to encrypt the message, and receiver uses their private key to decrypt it.
  9. 20. _________ science is scientific research conducted in whole or part by distributed individuals, many of whom may not be scientists, who contribute relevant data to research using their own computing devices.
  10. 24. ______________ is the general term for using the Internet to get a lot of people to help solve a problem. (Citizen science is a type of crowdsourcing.)
  11. 26. A computing __________ can be physical (such as a self-driving car), non-physical software (such as picture editing software), or conceptual (such as the idea of e-commerce), but regardless of the form, they must include a program as an integral part of their function.
  12. 27. IP (Internet _________ ) lets your computer pretend it has a direct connection to another computer. The routers at every connection point on the Internet run IP, which transmits packets from one IP address to another.
  13. 29. ________________ notation uses powers of ten to represent very large or very small values. Floating point is the same idea but with powers of two.
  14. 31. A ______ is a computer that passes information from one network to another.
  15. 33. ____________ (secure sockets layer/transport layer security) is the standard used for cryptographically secured information transfer on the Internet.
Down
  1. 1. ISPs (Internet Service________ ) are the companies who sell Internet access to homes and institutions.
  2. 2. ___________ authorities are organizations that issue digital certificates to verify who owns the encryption keys used for secured communications.
  3. 5. A _____ is eight bits.
  4. 8. A ______ is a single unit of data that can only have one of two values. We usually represent the two values as 0 (off) and 1 (on).
  5. 9. ____________ is the process of decoding the data.
  6. 10. __________ or anti-malware software is software designed to scan your files and Internet transmissions looking for malware.
  7. 12. The word is an abbreviation for binary digit.
  8. 14. ___________ is the maximum amount of data that can be sent in a fixed amount of time (for digital data, it is measured in bits per second).
  9. 15. The World Wide _____ is a system of linked pages, programs, and files that uses the Internet.
  10. 16. __________ is a common security attack in which the victim is tricked into giving up personal information or downloading malware.
  11. 18. _________ is software that was designed to harm or take partial control over your computer.
  12. 21. _________________ Compression algorithms (such as PNG) are reversible (there is no loss in quality); you can reconstruct the original data.
  13. 22. A ________ (Distributed Denial of Service) attack uses a virus to flood a server with many requests from many computers at once so that users of that server are denied service.
  14. 23. ____________ ciphers are examples of symmetric encryption because they use the same key for both encryption and decryption.
  15. 25. The digital ________ refers to unequal access to computers and the Internet based on poverty, racism, sexism, isolation in the countryside, age, and other factors. The digital divide affects both individuals within a country and countries themselves.
  16. 28. Storing data in the _________ means storing it somewhere on the Internet, but you don't know where. The cloud service provider (Google, Dropbox, Amazon, Snap!, etc.) manages the actual storage location.
  17. 30. A ___________ is a security system that controls the kinds of connections that can be made between a computer or network and the outside world.
  18. 32. _______________ Compression algorithms are not fully reversible; you can reconstruct only an approximation of the original data.