CSP Vocab Review

1234567891011121314
Across
  1. 3. An access point that provides an attacker unauthorized access to secure networks
  2. 6. A type of computing that splits a program into multiple tasks that can be executed at the same time
  3. 8. The capacity of a system to change in size and scale to meet new demands
  4. 10. A type of protocol used for sending via packets
  5. 12. An algorithm with an exponential efficiency runs in __________ time
  6. 14. ___ images use lossy compression
Down
  1. 1. Every algorithm can be constructed using combinations of sequencing, iteration, and __________
  2. 2. A type of protocol that provides a mechanism to detect corrupt data in packages
  3. 4. A type of error that occurs when the number of bits isn't enough to represent the number
  4. 5. The process of encoding data to prevent unauthorized data
  5. 7. An acronym for the library of procedures and the descriptions of how to call each procedure
  6. 9. An error checking mechanism that is a part of the UDP protocol
  7. 11. A type of data that changes smoothly
  8. 13. A byte is a sequence of ______ bits