Across
- 4. Crowdsourcing is when multiple online users ____ to fund a project or come up with new ideas.
- 5. This is data about data.
- 8. The heuristic approach does not ensure that the ____ is optimal but is used when finding the best ____ is not practical.
- 10. This is when a user is tricked into giving away private information.
- 11. Information that can be used to uniquely ____ an individual is called personally identifiable information.
- 12. Distributed computing uses multiple ____ to run different parts of a program.
- 13. Creative commons is a public copyright license that allows copyrighted work to be _____ distributed.
- 15. Scientific research is done by individuals, many who are not scientists.
- 16. Multifactor _____ requires the user to show various proofs in multiple categories to determine their ____.
- 17. Scalablity is a program's ability to adjust its scale in order to meet new ____.
Down
- 1. Lossy compression technique takes away the subtle ____ variations that the human eye cannot capture. The ____ that is lost can never be recovered.
- 2. A rogue access point gives unauthorized access to secure networks through a ____ connection.
- 3. To prevent _____ access, an encryption is coded in the data.
- 6. A ____ is used to track information about a user visiting a website.
- 7. User datagram protocol is a minimal error checking protocol that transports _____ data.
- 9. Fault-tolerant is when a system is still able to function while supporting ____.
- 12. Open access allows people to view _____ for analysis purposes.
- 14. Application programing interface is a ____ of procedures with a description of how each procedure is called.
