CS principles

12345678910111213141516
Across
  1. 1. an unreasonable run time increases ___________
  2. 4. the volume of a person talking is an example of this type of data
  3. 5. multi factor authentication needs _____ pieces of information
  4. 9. is an example of asymmetric encryption (three words)
  5. 10. when the number of bits is not enough to represent a number a _____ error occurs
  6. 11. ______ computing uses multiple devices
  7. 12. _____ increases reliability and helps scalability
  8. 13. symmetric encryption uses the ____ encryption key
  9. 14. Bits per second
  10. 16. allows people access to documents
Down
  1. 2. This computational model splits a program into multiple tasks
  2. 3. a _______ traversal does not iterate over every item
  3. 6. a rogue access point gives ______ access
  4. 7. scalability allows for _____ (two words)
  5. 8. a list has to be _____ to use binary search
  6. 15. JPG images use ____ compression