Across
- 2. A combination of sequencing, selection, and iteration
- 3. Changing the r value of a pixel to hide a message, say
- 4. ____ cipher. A method of encryption which scrambles the positions of characters
- 6. Compression algorithm that permanently loses data
- 9. A 12-digit hexadecimal number assigned to each device connected to the network
- 12. A data type storing a list of discrete information
- 13. Networking technology to plug a computer to a local area network
- 15. Material created on a computer is the ____ property of its creator/organization
- 17. Digital _____. When some countries have less access to tech
Down
- 1. An algorithm used to reduce the size of a file
- 5. Algorithms with polynomial complexity run in ___ time
- 7. ___ access points are used to give unauthorized access to secure networks
- 8. Cryptography that employs different keys for encryption and deciphering
- 10. Computing done by multiple processors on a single computer
- 11. Data about data
- 14. Protocol for sending packets over the internet
- 16. Giving others rights to use your work (2)
