Across
- 2. to grab someone's IP address
- 5. The availability of routing options allows for the internet to be _____
- 6. A linear search ___ through every item in the list until it finds it target value
- 9. Selection is when a boolean condition is used to determine what path should be taken in a algorithm or program
- 11. Multi-factor authentication's common forms include knowledge, ____ and inherence
- 14. Search A search which requires the list to be sorted
- 15. When a algorithm loops until a a specified condition is met
- 16. A library is a collection of _____ that are useful in creating programs
- 17. A program which can ____ well is able to adjust to greater demands
- 19. Bandwidth is the maximum amount of ____ that can per second
- 20. Symmetric encryption is when the ____ key is used to encrypt and decrypt data
Down
- 1. ____ can be created using sequencing, selection and iteration
- 3. When you separate a program into independent _______ which are responsible for different aspects of the programs functionality
- 4. Crowdfunding for science
- 7. this data transport protocol is able to detect if packets are lost
- 8. Analog data changes ____ over time
- 10. Protocols are an agreed upon set of rules that specify the ____ of a system
- 12. like steps in a recipe
- 13. Runs with polynomial efficiency
- 18. This is a type of digital attack that disrupts a service by sending too many requests
