Comp Sci

12345678910111213
Across
  1. 3. malicious software aimed at harming a computer/user
  2. 6. allows messages to be sent on the network even if some network devices or connections have failed
  3. 8. using fraudulent e-mails in order to trick a user into voluntarily providing sensitive information
  4. 9. software/hardware device which tracks key clicks and screens
  5. 11. compression that uses an algorithm to shrink the image without losing any important data
  6. 13. any function based on the operations AND, OR, and NOT
Down
  1. 1. data that describes other data
  2. 2. value that is passed into a function
  3. 4. securing information so that it is inaccessible to third parties
  4. 5. a numeric system of base 2 that only uses combinations of the digits zero and one
  5. 7. a network of interconnected networks
  6. 10. compression in which data in a file is removed and not restored to its original form after decompression
  7. 12. execution of each step/action of an algorithm in the precise order in which the statements are given