Across
- 1. A multi-step process that involves identifying a problem, isolating the source of the problem, and then either correcting the problem or determining a way to work around it. The final step of ______________ is to test the correction or workaround and make sure it works.
- 4. This address is big enough to support 2^32 computers. That's about four billion (4 ยท 109), but there are more than seven billion people on Earth, so there aren't enough IP addresses to go around. Each of the four numbers in a typical IP address today is an eight-bit byte with a value between 0 and 255
- 6. error that results when the number of bits is not enough to hold the number, like a car's odometer "rolling over"
- 7. The hierarchical addressing protocol that is human-readable
- 8. Guarantees reliable transmission by breaking messages into packets, keeping track of which packets have been received successfully, resending any that have been lost, and specifying the order for reassembling the data on the other end.
- 9. Works by converting information or data into a language that cannot be understood in one glance. Usually, the information is sent to a person who can decrypt it using a key only they have access, keeping the information's privacy intact.
- 11. Compressing data in a way that preserves all data away and allows full recovery of the original, good compression -- like PNG images
Down
- 1. The idea that some communities / populations have less access to computing than others
- 2. The long-term solution is to increase the length of an IP address. The new IP addresses are 128 bits wide, which is enough to support 2^128 (about 1038) computers.
- 3. using a looping control structure, like while, for, foreach, repeat, repeat-until, etc.
- 4. A network of independent but connected devices all over the world.
- 5. Compressing data in a way that throws some data away and makes it almost impossible to recover the original, great compression, like JPEG images
- 10. An attacker sends you an email that appears to be from some official organization (such as your bank) and tricks you into giving information to the attackers (such as your bank password).
