Across
- 2. Metadata stores _____ concerning larger data to increase convenience.
- 3. JPG Images use this type of compression.
- 8. Rogue Access points allow for ________ access into secure networks.
- 10. All protocols used in the Internet are _____.
- 13. Algorithms with _______ efficiency are said to run in reasonable time.
- 14. A system that is able to handle failure and still function is called fault-________.
- 16. Open _____ programs can be redistributed and modified freely.
- 18. Some data types include lists, ______, strings, and numbers.
Down
- 1. The bandwidth of a computer is the ________ amount of data that can be sent in a fixed amount of time.
- 4. This type of problem has the goal of finding the best solution.
- 5. Every algorithm can be broken down into three parts: sequencing, ________, and iteration.
- 6. This type of routing allows for the scalability of the internet:
- 7. Analog data is used to store values that have ______ changes.
- 9. If you put 5 cans of beans into a box designed to hold 4 cans of beans, that is an example of a(n) _________ error.
- 11. A heuristic approach produces a solution that is not guaranteed to be _______ but is "good enough" for the situation.
- 12. This type of key encryption uses one key for both encryption and decryption.
- 15. Dividing by zero is an example of this type of error.
- 17. This protocol is more popular for video calls and streams.
- 18. Bandwidth is measured in ______ per second.
