Across
- 5. security that examines a fingerprint, a voice pattern, or the iris or retina of the eye.
- 7. computer configuration in which one or more computers on the network acts as a server.
- 9. a server that acts as an intermediary between a user and the Internet.
- 12. link form one computer to another through which data can be transmitted.
- 14. high-end programs designed to provide network control and include special functions for connecting computers and other devices into a network.
- 15. a network configuration that allows selected outside organizations to access internal information systems.
- 16. a computer that uses the service of another program.
- 17. The world's collection of interconnected commercial and government-owned voice-oriented systems.
- 19. computer architecture in which all of the computers on a network are equal and there is no computer designated as the server.
- 20. a junction where information arrives from connected computers or peripheral devices and is then forwarded in one or more directions to other computers and devices.
- 22. an Internet connection technology that provides for the transfer of information to a computer at a high-speed bandwidth over ordinary copper telephone lines.
- 25. computer network that covers a large geographical are. Most WANs are made up of several connected LANs
Down
- 1. a device that uses coaxial cable to send and receive data.
- 2. a type of fiber-optic telephone line that can transmit up to 1.544 megabits per second or can be used to transmit 24 digitized voice channels.
- 3. a device that directs traffic on a network by dividing data into smaller packets that travel by different routes and then are reassembled at their destination.
- 4. An ISP that provides connection speeds more than 30 times faster than dial-up connection-from 384kbps to 2.0Mbps.
- 6. communications hardware device that facilitates the transmission of data.
- 8. a variation of a LAN that uses no physical wires.
- 10. a combination of hardware and software that creates a buffer between an internal network and the Internet to prevent unauthorized access.
- 11. a computer that handles requests for data, e-mail, file transfers, and other network services from other computers (clients).
- 13. a device on the network.
- 18. a series of connected personal computers, workstations, and other devices, such as printers or scanners, within a confined space, such as an office building.
- 20. expert computer user who invades someone else's computer either for personal gain or simply for the satisfaction of being able to do it.
- 21. The largest network used as a communication tool.
- 23. a network designed for the exclusive use of computer users within an organization that cannot be accessed by users outside of the organization.
- 24. a recent wireless technology that can deliver maximum speeds of up to 7Mbps to your cell phone, home computer, or car. Stands for Worldwide Interoperability for Microwave Access.
