cpe103

1234567891011121314151617181920
Across
  1. 3. What instruction is used to change the type of access?
  2. 7. It is a dedicated device that has been transformed into shared devices.
  3. 12. It uses a laser to read/write information recorded on magneto-optical discs.
  4. 13. It is a group of related files that are interconnected at various levers to give flexibility of access.
  5. 15. It is a potential security violation.
  6. 17. It is used to map MAC address to IP address.
  7. 18. Several sites may want to transmit information over a link simultaneously.
  8. 19. A secondary storage that may contain many files called multifile.
  9. 20. It a memory-resident program that copies itself from one system to next without requiring the aid of an infected program file.
Down
  1. 1. What file type that does have an extension name of .rtf?
  2. 2. It is a common distributed file-sharing method.
  3. 4. It is directory structure that has a shared subdirectories and files.
  4. 5. It indicates how the files are organized, stored, and structured.
  5. 6. It is a full duplex communication channel between a user-level process and a data device in UNIX system V and beyond.
  6. 8. A protection method for sensitive data where data is put into secret code.
  7. 9. Assailants fakes IP addresses of an Internet server by changing the address recorded in packets it sends over the Internet.
  8. 10. It is a technique used to save space in files.
  9. 11. It specifies the naming structure of the hosts, as well as name to address resolution.
  10. 14. A set of hardware and/or software designed to protect a system by disguising its IP address from unauthorized users.
  11. 16. It is similar to password but protects a single file.