Lesson 24

1234567891011121314151617181920212223242526
Across
  1. 4. Small, simple, inexpensive device that joins multiple computers together.
  2. 6. A recent wireless technology that can deliver maximum speeds of up to 7 Mbps to your cell phone, home computer, or car.
  3. 9. High-end program designed to provide network control that includes special functions for connecting computers and other devices into a network.
  4. 10. Connects two or more LANS to form a WAN.
  5. 11. A variation of a LAN that uses no physical wires.
  6. 12. Acts as an intermediary between a user and the Internet to ensure security, administrative control, and caching service.
  7. 14. Worldwide system composed of thousands of smaller networks.
  8. 16. Provides connection speeds more than 30 times faster than dial-up connections.
  9. 17. Person who breaks into computer systems to steal services and information.
  10. 18. A software program such as Internet Explorer.
  11. 20. Can include telephone systems, fiber optics, satellites, microwaves, or any combination of these.
  12. 21. Device that enables a computer to transmit voice data over telephone lines.
  13. 22. A network in which all the computers are equal; no computer is designated as the server.
  14. 23. Hardware such as a mail server, a database server, an FTP server, an application server, or a Web server.
  15. 25. Software architectural model relationship.
Down
  1. 1. World's collection of interconnected commercial and government-owned voice-oriented systems.
  2. 2. Uses coaxial cable to send and receive data.
  3. 3. Internet connection technology that provides for the transfer of information to a computer at high-speed bandwidth over ordinary copper telephone lines.
  4. 5. Covers a large geographical area and can contain communication links across metropolitan, regional, or national boundaries.
  5. 7. Special hardware and software that protect individual companies' networks from external networks.
  6. 8. Similar to an intranet, but allows specific users outside of the organization to access internal information systems.
  7. 13. Method of high-level security that examines a fingerprint, voice pattern, or the iris or retina of the eye and matches it with the original entry in the system.
  8. 15. Connects personal computers, workstations, and other devices such as printers and scanners in a limited geographical area.
  9. 19. A device on a network; generally shares resources such as printers, software, and other hardware.
  10. 24. A network designed for the exclusive use of people within an organization.
  11. 26. A type of fiber-optic telephone line that can transmit up to 1.544 megabits per second.