Chapter 14 Communication Technology

12345678910111213141516171819202122232425
Across
  1. 1. a security solution that allows individuals or organizations to safely access sensitive data from a remote location by preventing interception by hackers.
  2. 5. a network component that joins different LANs together.
  3. 7. A hacking method that involves a program systematically trying every possible combination of characters (passwords, PINs, etc.) until it guesses the correct one.
  4. 8. a unique address given to a device by the manufacturer.
  5. 10. A general term for any malicious software designed to cause damage, gain unauthorized access, or disrupt computer operations.
  6. 13. a network component that connects segregated parts of a LAN.
  7. 15. is one that contains two types of computers, a client and a server.
  8. 16. a network component that uses a computer’s MAC address to send data packets to a destination within a network.
  9. 17. a unique address given to a device, normally by a router.
  10. 20. a network component that is used to boost a signal in data transmission.
  11. 21. Flooding a website or online service with so much traffic from multiple computers that it crashes or becomes unusable.
  12. 23. is a wireless WAN that uses radio to transmit and receive communications from portable devices, such as smartphones.
  13. 25. a relatively small network that is located within a single building or site.
Down
  1. 2. Contains the actual data being transferred.
  2. 3. a network component that joins computers together and forwards data packets to all connected devices.
  3. 4. the data packets sent across the network can take any available path.
  4. 6. Contains control flags and error checking methods (to ensure the data is correct).
  5. 9. two or more computers or devices connected together so they can communicate and share data and resources.
  6. 11. a network component that receives and transmits radio signals to allow wireless (Wi-Fi) connection to a network.
  7. 12. a unit of data in data transmission.
  8. 14. a network component that uses a computer’s IP address to send data packets to a destination outside the current network.
  9. 18. a computer in a network that is a point of control.
  10. 19. Contains metadata like the Source IP (sender's address), Destination IP (receiver's address), and a Sequence Number (to reorder packets).
  11. 22. A network of private computers that have been infected with malware and are controlled remotely by a single attacker.
  12. 24. a relatively large network that is normally two or more LANs that are linked.