Across
- 2. rogue access point: A wireless access point that provides an attacker with ____ access to the traffic going over the network
- 5. JPG images use a ___ compression technique
- 8. a solution that is good enough
- 9. data about data
- 10. The process of finding a path from sender to receiver.
- 13. A library is a collection of ___ that are useful for creating programs
- 16. Analog data is data that changes ___
- 18. Digital divide is the idea that some communities have less ___ to computing than others
- 19. Parallel computing ___ a program
- 20. The redundancy of routing options between two points increases the ___ of the internet
Down
- 1. (2 words)algorithms with a polynomial efficiency or lower.
- 3. bandwidth is measured in __ per second
- 4. (2 words) An algorithm that searches a sorted list for a value by repeatedly splitting the list in half.
- 6. (2 words)a program that is made freely available and may be redistributed and modified.
- 7. A sequence of 8 bits
- 11. (Abbreviation)A data transfer protocol which includes mechanisms to reliably transmit packets
- 12. Huffman Compression is a ___ compression technique
- 14. A problem that is so logically difficult, we can’t ever create an algorithm that would be able to answer "yes or "no" for all inputs
- 15. A small amount of text that tracks information about a user visiting a website
- 17. PII is information that can be used to ___ someone.
