1 | 14 | ||||||||||||||||||||||||
2 | |||||||||||||||||||||||||
4 | 3 | 17 | |||||||||||||||||||||||
5 | 18 | ||||||||||||||||||||||||
12 | |||||||||||||||||||||||||
13 | 15 | ||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
8 | 16 | ||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
11 | |||||||||||||||||||||||||
1. Reducing the size of a file by sacrificing a portion of its data, leading to a smaller size yet reduced quality.
2. Also known as the Masonic Cipher, it is a substitution cipher used in cryptography that replaces letters with symbols and shapes.
3. Sound represented in a binary format consisting of discrete samples taken at regular intervals.
4. Basic components of digital circuits that perform logical operations
5. A substitution cipher in which the symbol used to replace a letter varies depending on its position in the plaintext.
6. The process of adding two binary numbers to obtain their sum.
7. A unit of data transfer rate equal to one million bits per second.
8. A technique used in cryptanalysis to analyze the frequency of letters or symbols in a ciphertext
9. The way in which a number is expressed.
10. A type of substitution cipher in which each letter in the plaintext is shifted a certain number of places down the alphabet.
11. A prefix used to represent a specific number of bytes in computing, with the base being 2.
12. An additive color model used to represent colors on electronic displays.
13. The process of recovering passwords from data that has been stored or transmitted in an encrypted or hashed form.
14. The practice of securing communication from unauthorized access.
15. A coding system that uses the binary digits 0 and 1 to represent a letter, digit, or other character in a computer or other electronic device.
16. The leftmost bit in a binary number that represents the sign of the number.
17. A set of letters or symbols in a fixed order used to represent the basic sounds of a language.
18. A precomputed table used in password cracking to reverse cryptographic hash functions and quickly determine the original password.