Across
- 2. A ZIP folder uses ______ compression.
- 4. Information about an individual that can be used to uniquely identify them (directly or indirectly).
- 5. The most common type was Ethernet which used MAC addresses to _______ data between computers on the network.
- 6. A small network often in one building
- 8. The technique used to "solve" NP problems
- 10. Basically the use of loops in an algorithm
- 12. is data about data
- 14. the use of "the other type" of code
- 18. The uncringe version of copyright
- 19. Quick and light protocol for transfering data
Down
- 1. ________ Computing; the use of multiple computers to run different parts of a program
- 3. Symmetric key encryption involves ___ key for both encryption and decryption
- 5. Basically the use of if statements in an algorithm
- 7. Analog data has a range of values that change smoothly, rather than in _______ intervals, over time.
- 9. a piece of software or a device that uses software(2 words)
- 11. An attack where a user is tricked into revealing private information, often via a deceptive email.
- 13. Common form of wired connection to the internet
- 15. a wireless access point that gives unauthorized access to secure networks
- 16. Certificate authorities issue digital certificates that validate the _______ of encryption keys used in secure communications and are based on a trust model
- 17. _____ Address; IP but for network
