CS Principles Review Puzzle

12345678910111213141516
Across
  1. 2. Lossy compression involves _______ losses
  2. 3. A ______ can make copies of itself
  3. 5. formula or set of steps for solving a particular problem
  4. 7. The process of scrambling data to prevent unauthorized access
  5. 10. A rogue access point a wireless access point that gives _____ access to secure networks
  6. 11. bytes stored in electronic memory can be called _____
  7. 12. When some countries has less access to tech, this is called digital _____
  8. 13. programs that are made available and may be redistributed
  9. 14. iteration involves any sort of ________
  10. 15. ______ from the end of an array
  11. 16. adds to the end of an array
Down
  1. 1. The opposite of encryption
  2. 4. usually measured in bits per second
  3. 6. is a binary digit represented either by 0's or 1's
  4. 8. Giving others rights to your work (2 Words)
  5. 9. mining a class of database applications that look for hidden patterns in a group of data that could be used to predict future behavior (2 words)