CSP Vocab Review
Across
- 3. An access point that provides an attacker unauthorized access to secure networks
- 6. A type of computing that splits a program into multiple tasks that can be executed at the same time
- 8. The capacity of a system to change in size and scale to meet new demands
- 10. A type of protocol used for sending via packets
- 12. An algorithm with an exponential efficiency runs in __________ time
- 14. ___ images use lossy compression
Down
- 1. Every algorithm can be constructed using combinations of sequencing, iteration, and __________
- 2. A type of protocol that provides a mechanism to detect corrupt data in packages
- 4. A type of error that occurs when the number of bits isn't enough to represent the number
- 5. The process of encoding data to prevent unauthorized data
- 7. An acronym for the library of procedures and the descriptions of how to call each procedure
- 9. An error checking mechanism that is a part of the UDP protocol
- 11. A type of data that changes smoothly
- 13. A byte is a sequence of ______ bits