Across
- 3. What instruction is used to change the type of access?
- 7. It is a dedicated device that has been transformed into shared devices.
- 12. It uses a laser to read/write information recorded on magneto-optical discs.
- 13. It is a group of related files that are interconnected at various levers to give flexibility of access.
- 15. It is a potential security violation.
- 17. It is used to map MAC address to IP address.
- 18. Several sites may want to transmit information over a link simultaneously.
- 19. A secondary storage that may contain many files called multifile.
- 20. It a memory-resident program that copies itself from one system to next without requiring the aid of an infected program file.
Down
- 1. What file type that does have an extension name of .rtf?
- 2. It is a common distributed file-sharing method.
- 4. It is directory structure that has a shared subdirectories and files.
- 5. It indicates how the files are organized, stored, and structured.
- 6. It is a full duplex communication channel between a user-level process and a data device in UNIX system V and beyond.
- 8. A protection method for sensitive data where data is put into secret code.
- 9. Assailants fakes IP addresses of an Internet server by changing the address recorded in packets it sends over the Internet.
- 10. It is a technique used to save space in files.
- 11. It specifies the naming structure of the hosts, as well as name to address resolution.
- 14. A set of hardware and/or software designed to protect a system by disguising its IP address from unauthorized users.
- 16. It is similar to password but protects a single file.
