Across
- 1. A ____ system is a system which can change in size to meet new demands.
- 5. MOD finds the remainder.
- 6. A method by which an algorithm is able to produce a good solution to a hard problem.
- 7. ____ is the estimation of the amount of computational resources used by an algorithm.
- 9. a binary digit, either 1 or 0.
- 11. Bandwidth describes the ____ amount of data that can be sent over an internet connection.
- 13. Modularity describes a program which is ____ into individual modules which handle aspects of the program's functionality.
- 14. Analog data involves values that change ____ rather than in discrete intervals.
- 16. Distributed computing describes a computational model which uses ____ devices to run different parts of a program.
- 18. MFA is a method of use authentication which requires multiple pieces of ____ in multiple categories.
- 19. When a system is _____ _____, it supports failures, meaning it can continue to function even a part of it breaks (2 words).
- 20. Parallel computing is a computational model which splits a program into multiple tasks, which can sometimes be executed ____.
- 21. a byte is a sequence of ____ bits.
Down
- 2. A license that allows for the free distribution of copyrighted work (2 words).
- 3. ____ encryption uses the same encryption key to encrypt and decrypt the data.
- 4. Metadata is ____ information about data.
- 8. a model in which many online users collaborate to generate ideas or funding.
- 10. ____ start at 1 on the AP exam.
- 12. Speedup is the ___ in the amount of time a parallelized program takes to solve a problem, computed as the amount of time to complete the task sequentially divided by the amount of time to complete the task when run in parallel.
- 15. Redundancy increases the ____ of the internet by including extra components which can be used if the original systems fail.
- 17. A rogue access point gives ____ access to secure networks.
