Across
- 3. online research output free of any and all restrictions on access and free of many restrictions on use, such as copyright or license restrictions
- 6. hiding a message in plain sight
- 10. The iteration over the items in a list. A full traversal iterates over every item, while a partial traversal iterates over a subset of the items.
- 12. An algorithm that searches a sorted list for a value by repeatedly splitting the list in half.
- 14. _____ key encryption involves one key for both encryption and decryption.
- 15. mixed up letters somehow
- 16. using one function to combine the features of another. For example a writeEssay() function could be a generalization that uses doResearch(), chooseThesis(), writeOutline() etc
Down
- 1. Compressing data in a way that discards some data and makes it impossible to recover the original.
- 2. The separation of a program into independent modules that are each responsible for one aspect of the program's functionality.
- 4. _____ issues digital certificates that validate the ownership of encryption keys used in secure communications and are based on a trust model
- 5. every letter is substituted with another letter
- 7. _____ key encryption pairs a public key for encryption and a private key for decryption.
- 8. When your roblox game code gets leaked to the world it becomes...
- 9. An algorithm that iterates through each item in a list until it finds the target value.
- 11. Algorithms with exponential complexity run in an ____ amount of time.
- 13. Algorithms with a polynomial complexity or lower (constant,linear, square, cube, etc.) are said to run in a _____ amount of time.
