Unit 8 Crossword + Other units

1234567891011121314151617181920212223242526272829
Across
  1. 3. the protocol used for transmitting web pages over the Internet
  2. 5. a variable in a function definition. Used as a placeholder for values that will be passed through the function
  3. 7. data about data
  4. 9. a repetitive portion of an algorithm which repeats a specified number of times or until a given condition is met
  5. 10. a wireless access point that gives unauthorized access to secure networks
  6. 12. a common method for referencing the elements in a list or string using numbers
  7. 15. used to return the flow of control to the point where the procedure (also known as a function) was called and to return the value of expression
  8. 16. A way of representing information using ten options
  9. 17. an ordered collection of elements
  10. 18. a process that reverses encryption, taking a secret message and reproducing the original plain text
  11. 19. software intended to damage a computing system or to take partial control over its operation
  12. 20. A contraction of "Binary Digit"; the single unit of information in a computer, typically represented as a 0 or 1
  13. 21. Finding and fixing problems in an algorithm or program
  14. 23. the process of accessing each item in a list one at a time.
  15. 24. the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
  16. 25. a process of encoding messages to keep them secret, so only "authorized" parties can read it
  17. 26. a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails
  18. 27. <, >, <=, >=, ==, != indicate a Boolean expression
  19. 28. protects a computing system against infection
  20. 29. a system that requires at least two steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access
Down
  1. 1. 8 bits
  2. 2. includes a program as an integral part of its function. Can be physical (e.g. self-driving car), non-physical computing software (e.g. picture editing software), or non-physical computing concepts (e.g., e-commerce).
  3. 4. an individual value in a list that is assigned a unique index
  4. 6. information about an individual that identifies, links, relates, or describes them
  5. 8. the system responsible for translating domain names like example.com into IP addresses
  6. 11. involves one key for both encryption and decryption
  7. 13. pairs a public key for encryption and a private key for decryption. The sender does not need the receiver’s private key to encrypt a message, but the receiver’s private key is required to decrypt the message
  8. 14. the value passed to the parameter
  9. 22. NOT, AND, and OR, which evaluate to a Boolean value