chapter 24

123456789101112131415161718192021222324
Across
  1. 1. Uses coaxial cable to send and receive data
  2. 3. A recent wireless technology that can deliver maximum speeds of up to 7 Mbps to your cell phone, home computer, or car
  3. 5. High-end program designed to provide network control that includes special functions for connecting computers and other devices into a network
  4. 7. Method of high-level security that examines a fingerprint, voice pattern, or the iris or retina of the eye and matches it with the original entry in the system
  5. 10. A device on a network; generally shares resources such as printers, software, and other hardware
  6. 12. Acts as an intermediary between a user and the Internet to ensure security, administrative control, and caching service
  7. 14. Special hardware and software that protect individual companies' networks from external networks
  8. 15. World's collection of interconnected commercial and government-owned voice-oriented systems
  9. 18. Can include telephone systems, fiber optics, satellites, microwaves, or any combination of these
  10. 19. Worldwide system composed of thousands of smaller networks
  11. 20. Hardware such as a mail server, a database server, an FTP server, an application server, or a Web server
  12. 21. A variation of a LAN that uses no physical wires
  13. 22. Device that enables a computer to transmit voice data over telephone lines
  14. 23. Connects two or more LANS to form a WAN
  15. 24. A type of fiber-optic telephone line that can transmit up to 1.544 megabits per second
Down
  1. 2. Internet connection technology that provides for the transfer of information to a computer at high-speed bandwidth over ordinary copper telephone lines
  2. 3. Provides connection speeds more than 30 times faster than dial-up connections
  3. 4. A software program such as Internet Explorer
  4. 6. Similar to an intranet, but allows specific users outside of the organization to access internal information systems
  5. 8. A network designed for the exclusive use of people within an organization
  6. 9. Person who breaks into computer systems to steal services and information
  7. 11. Connects personal computers, workstations, and other devices such as printers and scanners in a limited geographical area
  8. 13. Software architectural model relationship
  9. 15. A network in which all the computers are equal; no computer is designated as the server
  10. 16. Covers a large geographical area and can contain communication links across metropolitan, regional, or national boundaries
  11. 17. Small, simple, inexpensive device that joins multiple computers together