Across
- 4. Common type of network within a building
- 7. A large network
- 8. Devices that connect one LAN to another in case they use the same protocol
- 11. Allows users to navigate between web pages
- 12. Sending junk mail in large amounts
- 13. This address identifies each device uniquely
- 16. Devices that are connected into the wired network as fixed locations
- 17. Types of LAN network
- 19. Method of communication
- 21. Act of sending an email to a user claiming to be a legitimate enterprise in an attempt to steal personal information
- 22. Electronic way of sending mail
- 24. Switches and hubs are connected to it to make LAN into WLAN
- 25. Special type of server that actS as a buffer between WAN and LAN
- 26. Network in which computers are connected via a central hub or a switch
- 27. Networks are controlled by these
- 30. Pieces of a file sent separately
- 31. Allow users to save and load data
- 32. Devices are connected to it and it is connected to routers (faster than a hub)
- 35. The way the computer systems are connected
- 36. Network in which computers are connected to a common central line
- 37. Devices are connected to it and it is connected to routers
- 38. Used for connecting to the internet and communication via a network
Down
- 1. Malicious software
- 2. No wires or cables (wireless LAN)
- 3. Network based on internet technology that is designed to meet the internal needs for sharing information within a company
- 5. Network in which all computers are connected in a ring
- 6. Addition to the email, can be pictures or text documents
- 9. Binary digit image
- 10. A system where it is possible to connect to a network or a single computer
- 14. Recognition of different computers
- 15. User connects to the internet via an account that has login details
- 18. Short range, easily blocked (APs use it)
- 20. Mathematical calculation used to encode
- 23. Rules that determine the format and transmission of data
- 28. Network that has a central line and connects a series of star networks
- 29. Places where you can access WiFi
- 33. Documents consisting of text and pictures
- 34. Unauthorized users
