Across
- 3. To reduce file size
- 4. Naming
- 6. An error where the number of bits is not large enough to handle the math.
- 10. hiding the details of the code
- 11. a wireless access point that gives unauthorized access to secure networks
- 12. Pitch and volume of music, temperature, and the amount of light in the room are all examples of _______ data.
- 13. A tool used as part of the DESIGN phase of the SDLC
Down
- 1. the keyword needed to refer to instance variables or functions within a class
- 2. using one function to combine the features of another.
- 5. A ________ is an agreed-upon set of rules that specify the behavior of a system.
- 7. software that is made freely available and may be redistributed, sold and/or modified .
- 8. _______ is the process of finding a path from sender to receiver.
- 9. The ________ of a computer network is the maximum amount of data that can be sent in a fixed amount of time.
- 14. the study of encryption techniques
