Across
- 4. Fingerprint or face as authentication
- 6. Spreadsheet reference with $ signs
- 8. Limited legal use of copyrighted work
- 10. Agreed rules for data exchange
- 13. Backup components to prevent failure
- 15. Maximum data transfer capacity
- 18. Numeric label for network device
- 20. Blocks unauthorized network traffic
- 21. Drive type with no moving parts
- 22. Step-by-step problem-solving procedure
- 25. Image made of pixels
- 26. Licenses for sharing and remixing
- 27. Software embedded in hardware
- 30. Actual data delivered per second
- 38. Core of an operating system
- 39. Trace of your online activity
- 41. Named storage for changing data
- 43. Scrambling data with a key
- 44. Systematic unfairness in automated systems
- 47. Grid software for data and formulas
- 48. Login with password plus second step
- 50. Service that translates names to IPs
- 52. Software that lets OS use hardware
- 54. Software that encodes/decodes media
- 55. Tool to summarize table data
Down
- 1. How easy a system is to use
- 2. Compression without losing information
- 3. Audio/video data per second
- 5. Image made of scalable paths
- 6. Design usable by all people
- 7. Encrypted tunnel over public internet
- 9. One-way function to fingerprint data
- 11. Value exceeds storage limits
- 12. Logic using true/false values
- 14. Finding and fixing code errors
- 16. Repeating steps in a loop
- 17. Data that describes other data
- 19. Plain-language plan for code
- 23. Giving credit to sources used
- 24. Turning ciphertext back to plaintext
- 25. Forwards data between networks
- 28. False info shared without intent to harm
- 29. Fraudulent messages to steal info
- 31. Detail level in images or screens
- 32. Main circuit board in a computer
- 33. External device like keyboard or mouse
- 34. Malware that locks files for payment
- 35. Harmful software umbrella term
- 36. Using others’ work without credit
- 37. Time delay in data transfer
- 40. Rules for writing valid code
- 42. Small, fast memory for quick access
- 45. Small website data stored in browser
- 46. Reducing file size
- 47. Faking identity or address online
- 49. Spreadsheet reference that shifts
- 51. Tracking changes to files/projects
- 52. Human-readable website address
- 53. Temporary connection between client/server
