Across
- 5. Rogue Access Point is a wireless access point that gives _____ access
- 9. the separation of a program into independent ____s.
- 11. the ability of a system to adjust to meet new demands.
- 12. htt Hypertext Transfer UD User Datagram are all missing what letter and associated word.
- 15. when a system can support failures and still continue to function, it is called ____.
- 16. Symmetric key encryption involves the key for both encryption and decryption
Down
- 1. a problem where we can’t ever create an algorithm that would be able to answer for all inputs.
- 2. citizen science is _____ conducted by people who contribute relevant data to research.
- 3. distributed computing is a computational model which uses ________ devices.
- 4. The iteration over the items in a list
- 6. network connection, typically measured in bits per second.
- 7. an approach to solving problems that will always get an answer.
- 8. an attack where a user is tricked into revealing private information, often via a deceptive email.
- 10. The Checksum is an error checking mechanism built into the metadata of Internet packets. Its in which protocol
- 13. Array's start at what number on cs exam
- 14. ___ source—programs that are made freely available and may be redistributed and modified
