Hlengiwe

1234567891011121314151617181920
Across
  1. 5. the application layer includes protocols that implement or facilitate end-to-end distributed applications over the network
  2. 7. transport protocols establish end-to-end communication between end system over the network defined by layer 3 protocols.
  3. 9. a device for making and breaking the connection in an electric circuit
  4. 13. direct memory access, a method allowing a peripheral device to transfer data to or from the memory of a computer system using operations not under the control of the central processor
  5. 14. a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
  6. 15. this layer enables and manages sessions for complete data exchange between end nodes
  7. 17. these protocols employ methods for bit transmission over physical media
  8. 19. systems that switch data among stacks at the network layer
  9. 20. systems that switch data among stacks at the DLC layer
Down
  1. 1. its protocols establish point to point communication over physical or logical link
  2. 2. this layer is responsible for presentation of exchanged data in formats that can be consumed by the application layer
  3. 3. systems that switch data among stacks at the transport layer
  4. 4. facts and statistics collected together for reference or analysis
  5. 6. these protocols deliver data units over a network composed of the links established through the DLC protocols of layer2.
  6. 8. the unauthorized use or reproduction of another's work.
  7. 10. a person who uses computers to gain unauthorized access to data
  8. 11. a computer or computer program which manages access to a centralized resource or service in a network
  9. 12. a folder or box for holding loose papers together and in order for easy reference
  10. 16. a concealed miniature microphone, used for secret eavesdropping or recording
  11. 18. an intranet that can be partially accessed by authorized outside users, enabling businesses to exchange information over the Internet in a secure way