Across
- 5. Information about an individual that can be used to uniquely identify them (directly or indirectly)
- 8. Algorithms with ____ complexity run in an unreasonable amount of time
- 10. The iteration over the items in a list. A full traversal iterates over every item, while a partial traversal iterates over a subset of the items
- 12. Data about data, like descriptive information about a file or a row in a database.
- 13. ___ computing is a computational model which splits a program into multiple tasks, some of which can be executed simultaneously
- 14. Error that results when the number of bits is not enough to represent the number with full precision
- 15. ___ Access point is a wireless access point that gives unauthorized access to secure networks
Down
- 1. A ___ is an approach to a problem that produces a solution that is not guaranteed to be optimal but may be used when techniques that are guaranteed to always find an optimal solution are impractical such as when the problem is too complex.
- 2. The maximum amount of data that can be sent in a fixed period of time over a network connection, typically measured in bits per second.
- 3. Example of ___ data are pitch and volume of music, temperature, and the amount of light in the room
- 4. The repetition of steps in an algorithm or program for a certain amount of times or until a certain condition is met
- 6. ___ authentication is a method of user authentication which requires the user to present multiple pieces of evidence in multiple categories (such as knowledge and possession)
- 7. ___ key is the encryption and decryption use the same key (function, formula, etc) but in opposite directions. Easy to hack.
- 9. The iteration over the items in a list. A full traversal iterates over every item, while a partial traversal iterates over a subset of the items.
- 11. Compressing data in a way that discards some data and makes it impossible to recover the original
- 16. protocal that provides a mechanism to detect corrupt data in packets
