Unit 5

12345678910111213141516
Across
  1. 3. When a problem can be solved in a reasonable amount of time
  2. 6. Code that is paired with a public key to set off encryption and decryption
  3. 7. the principle that enable access to all content and applications regardless of the source
  4. 8. uses online access to customers as a means of funding projects
  5. 10. dense cluster of computers working together to appear as one large computing resource
  6. 14. a platform in which users are able to contribute to a shared knowledge base
  7. 15. a practice used by individuals who pose as banks or businesses to trick customers into revealing their banking information.
  8. 16. expressed as a series of four numbers, each within the range of 0-255, separated by periods
Down
  1. 1. a centralized computer that all individual end users connect to
  2. 2. An algorithm that substitutes each letter of the original message
  3. 4. 32-bit addresses
  4. 5. an abstract or concrete protocol that performs a security-related function
  5. 9. the difference between those who have access to the Internet, and those who do not.
  6. 11. initiates the communication
  7. 12. Anyone can use it to encrypt or decrypt something
  8. 13. 128-bit addresses