Chapter 4 crossword

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364
Across
  1. 3. A map that maps a domain.
  2. 7. A unique name you use to identify yourself on a network.
  3. 8. something on a computer that activates a function when clicked
  4. 9. wireless personal area network a small wireless network to use in a small area
  5. 10. The most effective way to secure data: a special key is needed in order to read it.
  6. 11. The process of establishing validity.
  7. 13. broadband is wide bandwidth data transmission with an ability to simultaneously transport multiple signals and traffic types
  8. 17. a network that covers a broad area
  9. 19. the actual time during which a process or event occurs
  10. 20. Contains many web pages and is on the internet.
  11. 22. The way the computer systems are connected.
  12. 25. every computer is connected to every computer
  13. 27. An icon that represents options from which only one can be selected at a time.
  14. 28. To search (the internet).
  15. 32. a device that forwards data packets to the appropriate parts of a computer
  16. 33. pages A page that contains data and is on the internet.
  17. 37. wireless communication where the frequency is deliberately varied to make the signal cover a large area
  18. 40. A server is a running instance of an application capable of accepting requests from the client and giving responses accordingly
  19. 43. a computer and storage device dedicated to storing files
  20. 44. A large network.
  21. 45. a device that allows wireless devices to connect to a wired network using wifi.
  22. 47. The process of determining whether someone is who they say they are.
  23. 50. A set of rules for the exchange of data.
  24. 54. wireless way to connect to the internet
  25. 55. a computer network that interconnects computers within a limited area
  26. 56. Allows you to search the internet.
  27. 58. Internet through a phone line.
  28. 61. a device that modulates signals to encode digital information and demodulates signals to decode the transmitted information
  29. 62. Internet Service Provider.
  30. 63. phishing is the attempt to acquire sensitive information like passwords from a website
  31. 64. network from one computer to another, using straight lines
Down
  1. 1. Sending an email that is printed out automatically.
  2. 2. a piece of code that is destructive
  3. 4. Needs direct line of sight in order to work (remote control)
  4. 5. software designed to harm a computer
  5. 6. diagrammatic representation of something e.g. Network types
  6. 11. Communication through video.
  7. 12. The address each computer has when connected to an internal or external network.
  8. 14. to send a message randomly to a large amount of people
  9. 15. The individual address of every computer.
  10. 16. A link that takes you directly to a webpage when clicked.
  11. 18. A device that allows faster data transmission.
  12. 21. Added files that are too big to be in the body of the email.
  13. 23. Someone that can make changes to the network.
  14. 24. World Wide Web
  15. 26. network which forms a circle and token goes around it
  16. 29. connection point for every device on the network
  17. 30. Added security, creates a layer between the network and the internet.
  18. 31. Data that is split into packets for faster transport.
  19. 34. a series of protocols for wireless connections
  20. 35. The name that you use to enter onto a network.
  21. 36. Taking a file and saving it.
  22. 38. A code that allows you to enter.
  23. 39. Putting a file on the internet.
  24. 40. A device that sends data to the appropriate part of a network.
  25. 41. Allows voice over communication through the internet.
  26. 42. Convert into coded form.
  27. 45. A set of rules that have to be followed in order to solve a problem.
  28. 46. To log on to something.
  29. 48. A connection point for LANs.
  30. 49. A webpage that remains the same on any device it is viewed (BBC).
  31. 51. Transfers data without needing a direct line of sight.
  32. 52. stealing someone’s wireless signal illegally
  33. 53. a combination of two or more star networks
  34. 57. It connects two same type of LANs.
  35. 59. Permission to perform an action.
  36. 60. Connects two same LANs.