Across
- 3. A mistake in an algorithm or program that causes it to behave unexpectedly or return the _____ value.
- 5. A computational model which splits a program into multiple tasks, some of which can be executed simultaneously.(_____ Computing)
- 6. symmetric ____ion: A technique for ____ing data where the same key is used to both _____ and de___ data.(One Word)
- 8. The maximum amount of data that can be sent in a fixed period of time over a network connection
- 10. some people use this to catch fish others use it as an attack where a user is tricked into revealing private information, often via a deceptive email.
- 14. The iteration over the items in a list. A full _____ iterates over every item, while a partial _____ iterates over a subset of the items.
- 15. UDP is a lightweight data transport _____ with minimal error checking.
- 16. a rogue access point is a wireless access point that provides an attacker with _______ access to the traffic going over the network.
- 17. a small round food with chocolate chips. Also a small amount of text that tracks information about a user visiting a website.
- 18. Personally identifiable information is Information about an individual that can be used to uniquely _____ them.
- 20. An example of this 3 letter acronym is two-step verification
- 21. A computational model which uses multiple devices to run different parts of a program.(______ Computing)
Down
- 1. An algorithm that iterates through each item in a list until it finds the target value.(____ Search)
- 2. A physical device that can run a program(____ Device)
- 4. A sequence of 8 bits.
- 7. Crowdsourcing for science!(______ Science)
- 9. A data transport protocol that includes mechanisms for reliably transmitting packets to a destination.(Hint: An Acronym)
- 11. A group of interconnected computing devices capable of sending or receiving data.(Computer ______)
- 12. A virus is a type of computer ______ that can make copies of itself
- 13. A library is a collection of ______ that are useful in creating programs
- 19. lossy means to compress _____ in a way that discards some data and makes it impossible to recover the original.
