CSP Principle Terms

123456789101112131415161718
Across
  1. 2. JPG images use a _____ _____ technique. It removes all the subtle color variations that the human eye can not pick up. Once removed, they can never be brought back
  2. 4. where lists start at
  3. 6. A binary digit, either 0 or 1
  4. 8. A sequence of 8 bits.
  5. 10. When a system can support failures and still continue to function, it is called _____ _______
  6. 15. issue digital certificates that validate the ownership of encryption keys used in secure communications and are based on a trust model
  7. 17. is the process of finding a path from sender to receiver. Routing on the Internet is usually dynamic; it is not specified in advance
  8. 18. The ability of a system to adjust in scale to meet new demands.
Down
  1. 1. a wireless access point that gives unauthorized access to secure networks
  2. 3. Material created on a computer is the ______ _______ of the creator or an organization
  3. 5. In the software development process, the ______ outlines how to accomplish a program's specifications. It may include brainstorming, storyboarding, flowchart and creating other planning diagrams, developing a testing strategy, etc
  4. 6. The maximum amount of data that can be sent in a fixed period of time over a network connection, typically measured in bits per second.
  5. 7. Values that change smoothly, rather than in discrete intervals, over time. For example, the pitch and volume of a live concert.
  6. 9. A small network often in one building. The most common type was ____ which used MAC addresses to send data between computers on the network. Wifi networks also use MAC addresses.
  7. 11. The sequential execution of steps in an algorithm or code in a program (like steps in a recipe).
  8. 12. A technique that helps an algorithm find a good solution in a hard problem (like always walking toward the north star when you are stuck in a forest)
  9. 13. Data about data, like descriptive information about a file or a row in a database.
  10. 14. is the inclusion of extra components that can be used to mitigate failure of a system if other components fail
  11. 16. Error that results when the number of bits is not enough to represent the number with full precision (like using 3 digits to represent πpi as 3.14).