CS principles
Across
- 1. an unreasonable run time increases ___________
- 4. the volume of a person talking is an example of this type of data
- 5. multi factor authentication needs _____ pieces of information
- 9. is an example of asymmetric encryption (three words)
- 10. when the number of bits is not enough to represent a number a _____ error occurs
- 11. ______ computing uses multiple devices
- 12. _____ increases reliability and helps scalability
- 13. symmetric encryption uses the ____ encryption key
- 14. Bits per second
- 16. allows people access to documents
Down
- 2. This computational model splits a program into multiple tasks
- 3. a _______ traversal does not iterate over every item
- 6. a rogue access point gives ______ access
- 7. scalability allows for _____ (two words)
- 8. a list has to be _____ to use binary search
- 15. JPG images use ____ compression