Across
- 3. A map that maps a domain.
- 7. A unique name you use to identify yourself on a network.
- 8. something on a computer that activates a function when clicked
- 9. wireless personal area network a small wireless network to use in a small area
- 10. The most effective way to secure data: a special key is needed in order to read it.
- 11. The process of establishing validity.
- 13. broadband is wide bandwidth data transmission with an ability to simultaneously transport multiple signals and traffic types
- 17. a network that covers a broad area
- 19. the actual time during which a process or event occurs
- 20. Contains many web pages and is on the internet.
- 22. The way the computer systems are connected.
- 25. every computer is connected to every computer
- 27. An icon that represents options from which only one can be selected at a time.
- 28. To search (the internet).
- 32. a device that forwards data packets to the appropriate parts of a computer
- 33. pages A page that contains data and is on the internet.
- 37. wireless communication where the frequency is deliberately varied to make the signal cover a large area
- 40. A server is a running instance of an application capable of accepting requests from the client and giving responses accordingly
- 43. a computer and storage device dedicated to storing files
- 44. A large network.
- 45. a device that allows wireless devices to connect to a wired network using wifi.
- 47. The process of determining whether someone is who they say they are.
- 50. A set of rules for the exchange of data.
- 54. wireless way to connect to the internet
- 55. a computer network that interconnects computers within a limited area
- 56. Allows you to search the internet.
- 58. Internet through a phone line.
- 61. a device that modulates signals to encode digital information and demodulates signals to decode the transmitted information
- 62. Internet Service Provider.
- 63. phishing is the attempt to acquire sensitive information like passwords from a website
- 64. network from one computer to another, using straight lines
Down
- 1. Sending an email that is printed out automatically.
- 2. a piece of code that is destructive
- 4. Needs direct line of sight in order to work (remote control)
- 5. software designed to harm a computer
- 6. diagrammatic representation of something e.g. Network types
- 11. Communication through video.
- 12. The address each computer has when connected to an internal or external network.
- 14. to send a message randomly to a large amount of people
- 15. The individual address of every computer.
- 16. A link that takes you directly to a webpage when clicked.
- 18. A device that allows faster data transmission.
- 21. Added files that are too big to be in the body of the email.
- 23. Someone that can make changes to the network.
- 24. World Wide Web
- 26. network which forms a circle and token goes around it
- 29. connection point for every device on the network
- 30. Added security, creates a layer between the network and the internet.
- 31. Data that is split into packets for faster transport.
- 34. a series of protocols for wireless connections
- 35. The name that you use to enter onto a network.
- 36. Taking a file and saving it.
- 38. A code that allows you to enter.
- 39. Putting a file on the internet.
- 40. A device that sends data to the appropriate part of a network.
- 41. Allows voice over communication through the internet.
- 42. Convert into coded form.
- 45. A set of rules that have to be followed in order to solve a problem.
- 46. To log on to something.
- 48. A connection point for LANs.
- 49. A webpage that remains the same on any device it is viewed (BBC).
- 51. Transfers data without needing a direct line of sight.
- 52. stealing someone’s wireless signal illegally
- 53. a combination of two or more star networks
- 57. It connects two same type of LANs.
- 59. Permission to perform an action.
- 60. Connects two same LANs.
