Across
- 2. digital data must have a ______ set of values
- 9. a loop
- 10. sample data used to test code
- 11. The OSI model has _____ layers
- 14. A small amount of text that tracks information about a user visiting a website and it is very yummy with milk
- 16. An attack where a user is tricked into revealing private information, often via a deceptive email
Down
- 1. the best CS teacher in scona
- 3. an algorithim that reduces the size of file
- 4. Application Programming __________
- 5. citizen science is scientific research conducted in whole or part by ________ individuals
- 6. Rogue Access Point - a _______ access point that gives unauthorized access to secure networks
- 7. a type of data that fluctuates continuously over a period of time
- 8. a method of user authentication that requires multiple pieces of evidence
- 12. the process of encoding data to prevent unauthorized access
- 13. _____ area network
- 15. _____ search repeatedly splits the list in half
