Networks
Across
- 2. an malicious software that is designed to attack and scramble your device
- 4. the most common form of authentication
- 7. a type of network where computers or devices are geographically far from each other
- 9. the one who assigns an IP address
- 10. ____________token is software installed on a device
- 13. a method of storing data on remote servers
- 14. a type of network that wirelessly connects devices over short distances
- 15. used to connect one LAN to another
- 16. used to connect devices to form a LAN
- 17. a device used to connect a LAN to the internet
- 19. _____________ token is an authentication method in the form of an object
Down
- 1. a type of conferencing that is a substitute for face-to-face conferencing
- 3. something used to move data around a network
- 5. a type of wireless technology that uses radio waves to provide high speed internet access
- 6. a more intelligent version of a hub
- 8. a component that enables the computer to connect to the network
- 11. a type of network that connects devices that are geographically near each other
- 12. an address given to a computer when it connects to the internet
- 15. a type of wireless communication used when devices are close by
- 18. a number which identifies an address