Y11/12 CompSci AS Level Review

12345678910111213141516171819202122232425262728293031323334353637383940414243
Across
  1. 3. Collections of pre-written code that can be used by other programs.
  2. 4. Software whose source code is publicly available and can be modified.
  3. 8. A logical operation that returns true if the inputs are different.
  4. 9. A part of an instruction that specifies the operation to be performed.
  5. 13. A network topology that combines elements of multiple topologies.
  6. 16. Temporary storage areas used to hold data while it is being transferred.
  7. 17. A type of storage medium that uses magnetism to store data.
  8. 19. A unique hardware address used to identify network devices.
  9. 22. A part of the CPU responsible for performing arithmetic and logical operations.
  10. 24. Another term for the decimal number system.
  11. 25. A feature of an IDE where it formats the code or data to make it more readable.
  12. 27. A method for error detection in data transmission using parity bits.
  13. 29. Legal protection granted to the creators of original works.
  14. 30. A network of remote servers used to store and manage data online.
  15. 33. Software designed to help manage and tune computer resources.
  16. 36. Self-replicating malicious software that spreads across networks without user intervention.
  17. 37. A cryptographic method used to verify the authenticity of digital messages.
  18. 41. The practice of dividing a network into smaller, more manageable sub-networks.
  19. 42. Software that is available for use at no cost.
  20. 43. The part of the CPU that directs operations within the computer.
Down
  1. 1. the Vonn Neumann Cycle.
  2. 2. Malicious software disguised as legitimate software to deceive users.
  3. 5. Legal rights to creations of the mind, such as inventions and trademarks.
  4. 6. A type of data compression where some data is lost to reduce size.
  5. 7. A storage technology that uses light to read and write data, such as CDs and DVDs.
  6. 10. A cyber attack where multiple systems overwhelm a target with traffic.
  7. 11. Software that is distributed for free with the option to purchase after a trial period.
  8. 12. The process of ensuring that input data is correct and reasonable.
  9. 14. A communication system where data can flow in both directions simultaneously.
  10. 15. Small, fast storage locations within a CPU used to store data temporarily.
  11. 18. The process of checking that a system or product meets specified requirements.
  12. 20. (Duplicate) Another term for the decimal number system.
  13. 21. The process of tracking the status or performance of a system.
  14. 23. Malicious software that replicates itself and spreads to other computers.
  15. 26. Signals that halt the current process to handle a different task.
  16. 28. A method of addressing memory directly by its exact location.
  17. 31. A storage technology that uses flash memory instead of mechanical parts.
  18. 32. A register that holds the address of the next instruction to be executed.
  19. 34. The most recent version of the Internet Protocol addressing scheme.
  20. 35. A software tool used for writing and testing code.
  21. 38. A company that provides access to the internet.
  22. 39. A protocol and address of your network
  23. 40. A method of addressing memory by adding an index to a base address.