Across
- 2. Information about an individual that can be used to uniquely identify them (directly or indirectly). (word is shortened)
- 7. A rogue access point is a _______ access point that provides an attacker with unauthorized access to the traffic going over the network.
- 8. A full traversal _______ over every item, while a partial traversal ______ over a subset of the items. (one word, same word)
- 11. An approximate latitude and longitude describing their ________ location.
- 14. When elements of complex systems (often in groups)_____ at unexpected times, leading to fault tolerance.
- 15. Heuristic is a technique that guides algorithms to find good choices that no longer needs to _______ search every possible solution.
- 17. A bit is a _____ digit, either 0 or 1.
- 18. Scrambling data according to a secret key.
- 20. A method of user authentication which requires the user to present multiple pieces of evidence in multiple categories (such as knowledge and possession).(word is shortened)
- 21. Creative commons is an alternative ________ that allows people to declare how they want their artistic creations to be shared, remixed.
- 23. A binary search, searches a _____ list for a value by repeatedly splitting the list in half.
Down
- 1. Analog data have values that change smoothly, rather than in ______ intervals, over time.
- 3. The gap between people who have access to affordable internet service and those who lack it. (2 words)
- 4. Bandwidth is the _______ amount of data that can be sent in a fixed period of time over a network connection, usually measured in bits per second.
- 5. An attack that tricks users revealing their private information usually via a deceptive email.
- 6. Iteration is the _______ of steps in an algorithm or program for a certain amount of times or until a certain condition is met.
- 9. The _______ execution of steps in an algorithm or code in a program (like steps in a recipe).
- 10. A small amount of text that tracks information about a user visiting a website.
- 12. ______ contains a chunk of data.
- 13. Recovering the original data from scrambled data using a secret key.
- 16. In order to determine different set of steps to execute based on a boolean expression, algorithms use _____.
- 19. IP, TCP, & UDP are common protocols used on the _________.
- 22. An agreed upon set of rules that specify the behavior of a system.
