ITFP-Chapter6

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758
Across
  1. 1. Helps internet users and network devices discover other devices using a human-readable hostname
  2. 5. Protocol used to send email.
  3. 7. A cable that provides transmission on a network through its inner wire in the form of electrical signals. The wire is made up of four different components: an inner conductor, an insulator made of flexible PVC, a metallic shield, and a plastic jacket coating.
  4. 9. The data being transferred from your computer to the ISP.
  5. 12. A command that tells the server what the user wants to do. The most common methods are POST, GET, PATCH, and DELETE. These methods are used for CRUD operations which stand for Create, Read, Update, and Delete
  6. 15. A host on a network that consumes network services.
  7. 17. A network topology in which devices are not connected to each other but rather to a centralized device called a switch.
  8. 20. A cable that provides connectivity between network devices.
  9. 21. A technology that uses specially encoded tags that respond in a specific way when scanned by a radio frequency reader. Often used by placing a smartphone near a scanner to pay for an item in a store.
  10. 23. A host on a network that provides network services.
  11. 24. Protocol in the internet protocol suite that enables two hosts to establish a connection and exchange data
  12. 27. A network of interconnected LANs across a large geographical location.
  13. 28. Short for modulator/demodulator, a network device that converts digital signals to analog signals that are typically carried by telephone or cable television lines.
  14. 29. A computing model where computer servers supply network and computational services (such as email, file sharing, online gaming, and VoIP) that are consumed by client computers.
  15. 31. A class designation (A through E) that specifies a default subnet mask value which defines the default network address portion of the IP address.
  16. 33. A computer component that provides a port (usually RJ-45) where a network cable can be connected.
  17. 35. A network device that moves traffic within an IP network.
  18. 36. An outdated encryption standard that was originally deployed in 1997. It was designed to provide wireless connections with the same security as wired connections.
  19. 38. A network topology in which all the devices are connected to each other by a single central cable.
  20. 40. The data being transferred from the ISP to your computer.
  21. 43. Encryption standard that replaces both WPE and WPA. It uses the Advanced Encryption Standard (AES) with a 128-bit key and a 48-bit initialization vector for encryption, which is more secure than TKIP
  22. 44. A technology that uses phone lines to establish high-speed connectivity to the internet through an ISP.
  23. 48. A network topology in which each host is connected to two other hosts in a circle.
  24. 49. The principal communications protocol in the internet protocol suite that is used to route information over the internet.
  25. 52. A technology used in the early days of the internet that required a computer to make a phone call to the ISP to establish internet connectivity.
  26. 54. A technology used to create wireless connections between computers and devices.
  27. 55. Dense material (such as steel) or electronic devices (such as cordless phones) that reduce or block Wi-Fi signals.
  28. 56. An application architecture model with three separate tiers where an application presents the user interface on a client workstation, data is processed on an application server, and information is retrieved from a database management system on a database server.
  29. 57. A technology that uses radio signals to connect a device to an access point.
  30. 58. A cable that uses light pulses to transmit data instead of electrical signals.
Down
  1. 2. When an electrical current passes through any kind of copper wire, that creates an electromagnetic field just outside the wire.
  2. 3. A group of networked computers that are physically close together, usually in the same building.
  3. 4. Sometimes called SaaS or on-demand software, software that requires a monthly or annual fee to use the software and receive regular updates.
  4. 6. An address assigned by software and, as such, can be changed. It includes two parts, the network address and the host address.
  5. 8. Protocol used to receive email. With this email is saved on a server after its downloaded
  6. 10. A network device that moves traffic between two different IP networks.
  7. 11. A network that covers a larger geographical area than a LAN, but is usually as large as a WAN.
  8. 13. A network topology where each device on the network has a point-to-point connection to every other device on the network. This topology was previously just theoretical until the rise of smart devices and wireless connecting media which allowed devices to communicate directly to every other device through one network adapter in each device using radio signals and wireless network adapters.
  9. 14. A network management protocol that assigns IP addresses on a network. It is part of the larger set of built-in networking protocols known as TCP/IP.
  10. 16. Organization that provide many services for accessing and using the Internet
  11. 18. Software that can be downloaded, installed, and used without paying a licensing fee. The source code can also be downloaded, modified, and compiled and given to others as long as it is not resold for profit
  12. 19. The unique, burned-into read-only memory address of a network interface. This is also called the media access control address, or MAC address
  13. 22. A characteristic of a radio signal that carries digital information in a wireless network. 802.11 standards specify two frequencies, 2.4 GHz and 5 GHz.
  14. 23. Commonly used to store the user subscription and phone boot information
  15. 25. A cable that transmits data through electrical signals and provides better signals because of its eight unique plastic-coated copper wires that are twisted into four pairs.
  16. 26. A network security device that protects a network by examining the traffic before transferring it to the network.
  17. 30. A device, usually located on a building wall, that provides a port (usually RJ-45) where a network cable can be connected.
  18. 32. A network interface or connection with four pins and a clip to hold the plug into a wall socket.Used to connect to a plain old telephone line.
  19. 34. A feature of radio waves where the signal becomes weaker as the wave travels further from its point of origin. 802.11 standards require that signals are strong enough to cover a specific distance.
  20. 37. Protocol used to receive email. With this emails are deleted from the server.
  21. 39. A tool that allows internet users to create a secure, private network when using a public internet connection.
  22. 41. Encryption standard that was deployed in 2003 to take the place of WEP. It uses a Rivest Cipher with a 128-bit key and a 48-bit initialization vector for encryption.
  23. 42. A technology that uses fiber optic cables that carry light signals to establish high-speed connectivity to the internet through an ISP.
  24. 45. The name of the network.
  25. 46. A small network device with modem, firewall, routing, and switching features that is used in homes and small businesses.
  26. 47. A LAN that only services a home or small business, it is sometimes referred to as a Small Office Home Office, or SOHO.
  27. 50. A network interface or connection with eight pins, that is similar, but wider than RJ-11 connectors. Used to create a wired connection between a computer and a network.
  28. 51. Dividing a network into smaller subnets.
  29. 53. a technology typically used for tacking objects.