COMPUTER NETWORKING

12345678910111213141516171819
Across
  1. 3. browser hijacking malware
  2. 5. Transmission Control Protocol/Internet Protocol
  3. 8. allows computers, smartphones, tablets, and other devices to connect to the internet
  4. 10. what is it called when the maximum possible data transfer rate is reached?
  5. 11. Dynamic Host Configuration Protocol?
  6. 14. service set identifier?
  7. 15. open the ___ of chips
  8. 17. used for connecting computers and other network devices in a physical space
  9. 18. network inside of another network
  10. 19. Nintendo ___
Down
  1. 1. a wireless networking technology that uses radio waves to provide wireless high-speed Internet access.
  2. 2. set of rules for networks
  3. 4. network note
  4. 6. what connects your house to the internet?
  5. 7. identifies a device on the internet or a local network.
  6. 9. a unique, 12-character alphanumeric attribute that is used to identify individual electronic devices on a network.
  7. 11. The Domain Name System
  8. 12. delay in network communications
  9. 13. network address translation
  10. 16. virtual private network