Across
- 5. A Boolean condition to determine which of two paths are taken in an algorithm or program
- 6. ___ problem is a problem with the goal of finding the "best" solution
- 9. (2 words) issue digital certificates that validate the ownership of encryption keys in secure communications and are based on a trust model
- 10. (acr.) a data transport protocol that includes mechanisms for reliably transmitting packets to a destination
- 12. ___ error is a mistake in an algorithm that causes it to behave unexpectedly or return the incorrect value
- 15. (2 words) an alternative to copyright that allows people to declare how they want their artistic creations to be shared, remixed, and distributed
- 19. (acr.) a lightweight data transport protocol with minimal error checking
- 20. ___ efficiency is used to describe algorithms that run in reasonable time
Down
- 1. data about data, like descriptive information about a file
- 2. ___ encryption is a technique for encrypting data where the same key is used to both encrypt and decrypt data
- 3. a problem that is so logically difficult, we cannot ever create an algorithm to fully solve it
- 4. (2 words) scientific research conducted by individuals who are not scientists, many of whom are not scientists, using their own computing devices
- 7. ___ problem is a problem with a yes or no answer
- 8. (2 words) adjective used to describe systems that can support failures while still continuing to function
- 11. the process of finding a path from a sender to a reciever
- 13. an error checking mechanism built into the metadata of internet packets (part of the udp protocol)
- 14. ___ access point is a wireless access point that gives unauthorized access to secure networks
- 16. ___ technique is a technique for converting analog data into digital data by measuring data points at constant intervals (or samples)
- 17. (acr.) a library of procedures and a description of how to call each procedure
- 18. a small amount of text that tracks information about a user visiting a website
