Across
- 2. Lossy compression involves _______ losses
- 3. A ______ can make copies of itself
- 5. formula or set of steps for solving a particular problem
- 7. The process of scrambling data to prevent unauthorized access
- 10. A rogue access point a wireless access point that gives _____ access to secure networks
- 11. bytes stored in electronic memory can be called _____
- 12. When some countries has less access to tech, this is called digital _____
- 13. programs that are made available and may be redistributed
- 14. iteration involves any sort of ________
- 15. ______ from the end of an array
- 16. adds to the end of an array
Down
- 1. The opposite of encryption
- 4. usually measured in bits per second
- 6. is a binary digit represented either by 0's or 1's
- 8. Giving others rights to your work (2 Words)
- 9. mining a class of database applications that look for hidden patterns in a group of data that could be used to predict future behavior (2 words)
