CS Principles Review

12345678910111213141516171819
Across
  1. 2. A ZIP folder uses ______ compression.
  2. 4. Information about an individual that can be used to uniquely identify them (directly or indirectly).
  3. 5. The most common type was Ethernet which used MAC addresses to _______ data between computers on the network.
  4. 6. A small network often in one building
  5. 8. The technique used to "solve" NP problems
  6. 10. Basically the use of loops in an algorithm
  7. 12. is data about data
  8. 14. the use of "the other type" of code
  9. 18. The uncringe version of copyright
  10. 19. Quick and light protocol for transfering data
Down
  1. 1. ________ Computing; the use of multiple computers to run different parts of a program
  2. 3. Symmetric key encryption involves ___ key for both encryption and decryption
  3. 5. Basically the use of if statements in an algorithm
  4. 7. Analog data has a range of values that change smoothly, rather than in _______ intervals, over time.
  5. 9. a piece of software or a device that uses software(2 words)
  6. 11. An attack where a user is tricked into revealing private information, often via a deceptive email.
  7. 13. Common form of wired connection to the internet
  8. 15. a wireless access point that gives unauthorized access to secure networks
  9. 16. Certificate authorities issue digital certificates that validate the _______ of encryption keys used in secure communications and are based on a trust model
  10. 17. _____ Address; IP but for network