Module Terms and Command Crossword Puzzle

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778
Across
  1. 2. refers to how well a network can handle sudden changes in workload brought about by sudden spikes or drops in the volume of data it processes
  2. 4. is any networking device positioned between a Remote Access Service (RAS) server and a RAS client
  3. 6. used on almost all IOS Cisco networking devices (routers, switches etc) to restart (or reboot) the appliance.
  4. 10. computing or networking is a distributed application architecture that partitions tasks
  5. 14. a capability of a computer system, electronic system or network to deliver uninterrupted service, despite one or more of its components failing
  6. 15. Intended for a specific organization or entity such as the government.
  7. 17. work with others over the network on joint projects
  8. 18. a growing trend that allows technology to be integrated into every-day appliances which allows them to interconnect with other devices.
  9. 19. in the persistent memory when information is corrupted or otherwise unusable.
  10. 20. level allows you to access only basic monitoring commands
  11. 22. refers to the physical channel through which data is sent and received.
  12. 24. Can be private or public
  13. 26. are words or phrases that describe content.
  14. 27. level can be password protected to allow only authorized users the ability to configure or manage the router.
  15. 30. command enters Global mode
  16. 34. is how they are actually interconnected with wires and cables
  17. 37. a telecommunications network that extends over a large geographic area for the primary purpose of computer networking.
  18. 39. a computer program at the core of a computer's operating system that has complete control over everything in the system.
  19. 40. an organization that provides a myriad of services for accessing
  20. 41. is an Internet service provider with a network based on wireless networking
  21. 47. that it is some type of device
  22. 51. represents a logical Layer 3 interface on a switch.
  23. 54. a form of user interface that allows users to interact with electronic devices through graphical icons and audio indicator such as primary notation, instead of text-based user interfaces, typed command labels or text navigation
  24. 55. are computer network diagnostic commands for displaying possible routes and measuring transit delays of packets across an Internet Protocol network
  25. 56. a hardware component without which a computer cannot be connected over a network
  26. 57. that it is able to send a request to other computer
  27. 59. a computer network that interconnects computers within a limited area such as a residence, school, laboratory, university campus or office building.
  28. 61. Made up of two or more Cloud types – for example, part custom and part public
  29. 62. used solely to control inbound Telnet connections
  30. 63. to stop editing the networking
  31. 65. system software that manages computer hardware, software resources, and provides common services for computer programs.
  32. 67. Command programming language that executes commands read from a terminal or a file
  33. 68. for setting, viewing,
  34. 69. an exchange of diverging or opposite views
  35. 71. a computer network for sharing information, collaboration tools, operational systems, and other computing services within an organization, usually to the exclusion of access by outsiders.
  36. 72. what kind of message you want to show when logging in
  37. 74. that it is a last resort password
  38. 75. is the distribution and sharing of digital media.
  39. 77. commands allow you to configure the virtual terminal line settings.
  40. 78. is where communication begins or ends
Down
  1. 1. is stored in the nonvolatile memory of a device
  2. 3. to be able to go in to edit the computer
  3. 5. a piece of computer hardware or software that accesses a service made available by a server.
  4. 7. allows voice calls to take advantage of toll bypass
  5. 8. a group of buildings used to house computer systems and associated components, such as telecommunications and storage systems
  6. 9. an application protocol used on the Internet or local area network to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection
  7. 11. the description or measurement of the overall performance of a service, such as a telephony or computer network or a cloud computing service, particularly the performance seen by the users of the network.
  8. 12. command to display the contents of the running configuration.
  9. 13. Available to the general public through a pay-per-use model or for free
  10. 16. an allow devices to connect to a LAN where data network cables or wireless communications are not a viable option.
  11. 21. when it tells you something is wrong
  12. 23. network
  13. 25. is a computer program that emulates a video terminal within some other display architecture.
  14. 28. commonly used as an Out-of-Band Management Solution, ensures that on-site infrastructure is accessible, even during system or network outages.
  15. 29. are either the source or destination of data transmitted over the network
  16. 30. the on-demand availability of computer system resources, especially data storage and computing power, without direct active management by the user.
  17. 31. are electronic devices which are required for communication and interaction between devices on a compute
  18. 32. enables computers within a home or remote office to connect to a corporate network.
  19. 33. a type of computer communications network that groups and sends data in the form of small packets
  20. 35. when you don't know the commoned
  21. 36. a network server that automatically provides and assigns IP addresses, default gateways and other network parameters to client devices
  22. 38. many locations with hundreds or thousands of interconnected computers.
  23. 42. a cryptographic network protocol for operating network services securely over an unsecured network.
  24. 43. allows users to use their own devices giving them more opportunities and greater flexibility.
  25. 44. command can be used to view a summary of the router interfaces.
  26. 45. is the design of a computer network. It is a framework for the specification of a network's physical components and their functional organization and configuration, its operational principles and procedures, as well as communication protocols used.
  27. 46. a type of network where the communications between end devices (nodes) must be set up before they can communicate.
  28. 48. the maximum rate of data transfer across a given path.
  29. 49. a controlled private network that allows access to partners, vendors, and suppliers or an authorized set of customers – normally to a subset of the information accessible from an organization's intranet.
  30. 50. depicts how information in the network flows
  31. 52. is the design of a computer network
  32. 53. a piece of computer hardware or software that provides functionality for other programs or devices.
  33. 58. file where router stores the configuration changes when the router is up
  34. 60. are combinations of keys that when pressed at the same time let you quickly access/open menus using only your keyboard.
  35. 64. the name of the device
  36. 66. is the point of interconnection between a computer and a private or public network.
  37. 70. a console application program of some computer operating systems that displays all current TCP/IP network configuration values and refreshes Dynamic Host Configuration Protocol and Domain name System settings
  38. 73. a command line program that accepts text input to execute operating system functions.
  39. 76. to go back one interface