Across
- 2. to limit the access to the variables and functions of a class
- 5. An object used to represent a stream of data.
- 8. A subroutine function passed in as an argument to be called at some point in the future.
- 10. Solve the problem of data reading and writing speed mismatch in the system. Between CPU and main memory, or between main memory and disk.
- 14. You can enter, exit, and resume at many different points. They can be implemented using the async def.
- 17. A general-purpose, high-level, interpreted, dynamically typed programming language.
- 18. An associative array in which any key is mapped to the corresponding value.
- 19. A system or set of systems used to enhance network security within an organization
- 21. one of the logical data models
- 24. flaw attack: substitute a different type of message field
- 25. a free and open-source CSS framework directed at responsive, mobile-first front-end web development.
- 28. An informal, English-like structure language used to describe the structure of a module.
- 29. a number represent by 0 and 1
- 30. A function that returns the value of another function, usually using the @Wrapper syntax for function transformations.
- 31. An anonymous inline function consisting of a single expression that is evaluated when called.
- 32. attack: using messages in a different context/for a different purpose than originally intended
Down
- 1. A <--> i <-->B
- 3. An object that tries to find the loader of the module being imported.
- 4. A place to store variables
- 6. Represents a summary of elements such as literals, names, attribute access, operators, or function calls, all of which eventually return a value.
- 7. An implementation of a method that can be used to access a single data property.
- 9. Two or more threads are too busy responding to each other to work.
- 11. reuse parts of previous messages
- 12. A class used to create a class. A class definition contains a class name, a class dictionary, and a list of base classes.
- 13. attack: take advantage of normal protocol responses as encryption and decryption “services”
- 15. attack: send transmitted information back to originator
- 16. A thread cannot gain regular access to a shared resource because another thread often calls the object's methods.
- 20. An organized, shareable, and uniformly managed collection of large amounts of data stored on a computer over a long period of time
- 22. An object that can hold references to other objects.
- 23. Two or more threads are blocked forever, waiting for each other.
- 26. pretend to be another principal
- 27. A set of statements that can return a value to the caller. You can also pass zero or more arguments to it and use them in the body execution of the function.
