Across
- 3. a finite set of instructions to complete a task
- 4. A repetitive portion of an algorithm which repeats a specified number of times or until a given condition is met
- 7. 2 words, research that uses online members of a community to assist to provide computing resources
- 8. 2 words, ____ allows for people to share ideas with everyone while still putting certain limitations on what people can do
- 9. 2 words, To sort incredibly large amounts of data _____ can be used to sort the data faster
- 12. A measure of how many steps it takes to complete an algorithm
- 13. 3 Words,A wireless access point that gives unauthorized access to a secure network
- 16. 3 words, Using ____ multiple people can send encrypted messages to a person with only that person being able to access all of those messages
- 18. If a scammer uses fake websites where you enter information to steal your information the scammer is ____
- 19. 2 words,If scammers use hacked computers to prevent access to a server is called a ____
- 21. Using a ___ is a good way to find the minimum or maximum of list
- 23. 2 words, Any human creation or idea such as art, symbols, or inventions
- 24. 2 words, ____ is often used to compress songs due to parts of the data not being needed as some parts can't be heard
- 25. A simplified representation of something that is more complex
Down
- 1. 2 words, If a program runs above polynomial efficiency it is considered to run in a(n) _____
- 2. 3 words, ___ requires at least 2 login methods out of inherence, knowledge, and possession
- 5. A good example of ___ is libraries
- 6. software that can be downloaded for free online that usually has malware
- 10. the time used to complete a task sequentially divided by the time to complete the task in parallel
- 11. 2 words, in order for a(n) ____ to work the list must be sorted
- 14. 2 words, obtaining information or other resources from members of the online community in order to help a project
- 15. 2 words, Extracting shared features to generalize funtionality
- 17. ____ is an incredibly important problem to lessen to ensure machine learning models work for equally for everyone
- 20. Using ___ people can obtain passwords and private data by recording keystrokes
- 22. For undecidable or unrealistic problems a(n) ____ is required to find a solution
