CS20- Theory Review

123456789101112131415
Across
  1. 2. Locates overflow errors.
  2. 5. Encrypts & decrypts keys.
  3. 6. Everyone can use it.
  4. 9. Asymmetric keys.
  5. 12. Opcode's reason to exist.
  6. 13. A part of a register.
  7. 14. At least one input has to have 1, otherwise it would be false
  8. 15. NFTs are used to guarantee this about a pieces of art.
Down
  1. 1. Symmetric keys.
  2. 3. Key length.
  3. 4. Ethereum is cryptocurrency tract this software.
  4. 7. Does the decision making.
  5. 8. All inputs have to be 1, otherwise it would not work.
  6. 10. CPUs job.
  7. 11. Inputs work opposite from each other.