Across
- 6. a byte contains ___ bits
- 8. When some countries have less access to tech. This is known as the digital _____
- 9. a ___ error will break before it runs
- 10. public key encryption uses ___ keys to encrypt and decrypt
- 11. analog data changes ____ over time
- 14. an online attack that reveals private info often through emails
- 16. ___ computing requires multiple computers
Down
- 1. This is a problem type that involves finding the best solution
- 2. a 2^N algorithm runs in ____ time
- 3. giving others rights to your work (2 words)
- 4. ___ search goes through a list until it finds the target
- 5. In lossy compression data is ____ lost
- 7. a ____ solution may not be the most optimal
- 12. PII is information that can be used to ___ identify users
- 13. ___ is usually measured in bits per second
- 15. IP and TCP are both examples of _____
