xyivqjxuhfkhuulyb
Across
- 6. The decrypted name of this crossword (Tip: Shift 10).
- 7. A rogue access point gives unauthorized access to secure ________.
- 9. An approach to a problem that produces a solution that is not guaranteed to be optimal.
- 11. Algorithms with a _________ complexity or lower are said to run in a reasonable amount of time.
- 15. What about the beginning ?
Down
- 1. A combination of sequencing selection and iterations
- 2. To be defined as a computing ___________ it must be a device/hardware that uses software or the software itself.
- 3. Data about data.
- 4. Data whose values change continuously.
- 5. Digital data must have a ________ set of possible values.
- 8. A cipher key that can decrypt itself is ____.
- 10. A small network often in one building
- 12. How many devices does parallel computing use ?
- 13. A ______ copyright license that enables the free distribution of work.
- 14. What kind of command should I use to add something to the end of an array ?