APCSP Naliya Montebon Period 2

1234567891011121314151617
Across
  1. 2. What tells you how to arrange the cipher's rules
  2. 7. Helps to verify that original author of the code is what he or she claims to be
  3. 8. The set of rules you are using to encode the information
  4. 9. A computer hosting data for others to access
  5. 10. A multi-step process that involves identifying a problem, isolating the source of the problem, and then either correcting the problem or determining a way to work around it
  6. 13. Zeroes and ones
  7. 16. Small chunks of data
  8. 17. Data compression where you lose data
Down
  1. 1. Analyzing the code and working back from it
  2. 3. An email that appears to be from an official organization, but tricks you into giving your username and password
  3. 4. The hierarchical addressing protocol that is human-readable
  4. 5. Malware that spreads itself over the network to other computers
  5. 6. Data about data
  6. 11. Timely but unreliable message delivery
  7. 12. Used to limit the kinds of connections outsiders can make to your computer
  8. 14. The "connection points" of the Internet
  9. 15. Attack by overloading the server with too many users