CSP review puzzle

12345678910111213141516
Across
  1. 6. a byte contains ___ bits
  2. 8. When some countries have less access to tech. This is known as the digital _____
  3. 9. a ___ error will break before it runs
  4. 10. public key encryption uses ___ keys to encrypt and decrypt
  5. 11. analog data changes ____ over time
  6. 14. an online attack that reveals private info often through emails
  7. 16. ___ computing requires multiple computers
Down
  1. 1. This is a problem type that involves finding the best solution
  2. 2. a 2^N algorithm runs in ____ time
  3. 3. giving others rights to your work (2 words)
  4. 4. ___ search goes through a list until it finds the target
  5. 5. In lossy compression data is ____ lost
  6. 7. a ____ solution may not be the most optimal
  7. 12. PII is information that can be used to ___ identify users
  8. 13. ___ is usually measured in bits per second
  9. 15. IP and TCP are both examples of _____