Across
- 3. the protocol used for transmitting web pages over the Internet
- 5. a variable in a function definition. Used as a placeholder for values that will be passed through the function
- 7. data about data
- 9. a repetitive portion of an algorithm which repeats a specified number of times or until a given condition is met
- 10. a wireless access point that gives unauthorized access to secure networks
- 12. a common method for referencing the elements in a list or string using numbers
- 15. used to return the flow of control to the point where the procedure (also known as a function) was called and to return the value of expression
- 16. A way of representing information using ten options
- 17. an ordered collection of elements
- 18. a process that reverses encryption, taking a secret message and reproducing the original plain text
- 19. software intended to damage a computing system or to take partial control over its operation
- 20. A contraction of "Binary Digit"; the single unit of information in a computer, typically represented as a 0 or 1
- 21. Finding and fixing problems in an algorithm or program
- 23. the process of accessing each item in a list one at a time.
- 24. the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
- 25. a process of encoding messages to keep them secret, so only "authorized" parties can read it
- 26. a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails
- 27. <, >, <=, >=, ==, != indicate a Boolean expression
- 28. protects a computing system against infection
- 29. a system that requires at least two steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access
Down
- 1. 8 bits
- 2. includes a program as an integral part of its function. Can be physical (e.g. self-driving car), non-physical computing software (e.g. picture editing software), or non-physical computing concepts (e.g., e-commerce).
- 4. an individual value in a list that is assigned a unique index
- 6. information about an individual that identifies, links, relates, or describes them
- 8. the system responsible for translating domain names like example.com into IP addresses
- 11. involves one key for both encryption and decryption
- 13. pairs a public key for encryption and a private key for decryption. The sender does not need the receiver’s private key to encrypt a message, but the receiver’s private key is required to decrypt the message
- 14. the value passed to the parameter
- 22. NOT, AND, and OR, which evaluate to a Boolean value
