Fall Final Review Guide

1234567891011121314151617181920
Across
  1. 1. A computer’s address
  2. 4. 32 bits long with 8 bits for each part of the address.
  3. 6. Data with values that change continuously, or smoothly, over time.
  4. 7. a cybercrime in which the attacker floods a server with internet traffic to prevent users from accessing connected online services and sites.
  5. 9. invented the World Wide Web (WWW) in 1989
  6. 11. one of the most important protocols used in internet communication
  7. 13. embodies a system designed to carry out one particular job.
  8. 14. Your computer uses the ___ to look up domain names and get the associated IP address, which is used to connect your computer to the destination on the internet
  9. 15. systems that carry on the tasks considered to be human-like.
  10. 19. A process for creating a digital representation of analog data by measuring the analog data at regular intervals called samples.
  11. 20. a networking device that forwards data packets between computer networks.
Down
  1. 2. Data that changes discretely through a finite set of possible values
  2. 3. Actual speed your internet connection is getting.
  3. 5. he maximum amount of data that can be sent in a fixed amount of time, usually measured in bits per second.
  4. 8. Originally developed from telegraphic codes, _____ is now widely used in electronic communication for conveying text.
  5. 10. It’s the amount of delay (or time) it takes to send information from one point to the next.
  6. 12. when a hacker taps into a DNS server and changes it to match a domain name with the wrong IP address. This lets the attackers send people to an imposter website.
  7. 16. a malware designed to deny a user or organization access to files on their computer. By encrypting these files and demanding a ransom payment for the decryption key
  8. 17. uses 128 bits per address and provides over 340 undecillion unique addresses
  9. 18. Rules and regulations we all agree to use