xyivqjxuhfkhuulyb

123456789101112131415
Across
  1. 6. The decrypted name of this crossword (Tip: Shift 10).
  2. 7. A rogue access point gives unauthorized access to secure ________.
  3. 9. An approach to a problem that produces a solution that is not guaranteed to be optimal.
  4. 11. Algorithms with a _________ complexity or lower are said to run in a reasonable amount of time.
  5. 15. What about the beginning ?
Down
  1. 1. A combination of sequencing selection and iterations
  2. 2. To be defined as a computing ___________ it must be a device/hardware that uses software or the software itself.
  3. 3. Data about data.
  4. 4. Data whose values change continuously.
  5. 5. Digital data must have a ________ set of possible values.
  6. 8. A cipher key that can decrypt itself is ____.
  7. 10. A small network often in one building
  8. 12. How many devices does parallel computing use ?
  9. 13. A ______ copyright license that enables the free distribution of work.
  10. 14. What kind of command should I use to add something to the end of an array ?