Lesson 3 Vocab

123456789101112131415
Across
  1. 3. A security technique designed to prevent access to information by converting it into a scrambled (unreadable) form of text.
  2. 5. A device that allows computers to communicate over a network by modulating and demodulating the cable signal into a stream of data.
  3. 8. A file that contains mappings of IP addresses to host names.
  4. 9. A standard for short-range radio signals that is used to form personal area networks (PANs).
  5. 10. A mobile phone that includes PC-like functionality.
  6. 12. A more compact, Web-oriented version of the standard laptop PC; relies on the cloud computing model in which the Internet is used for remote access to Web applications.
  7. 13. A document published by the IETF that details information about standardized Internet protocols and those in various development stages.
  8. 14. One link between two network devices; the number of hops between two devices is considered a hop count.
  9. 15. The complete domain name of an Internet computer, such as www.CIWcertified.com.
Down
  1. 1. The Internet standard protocol for remote terminal connection service.
  2. 2. The end point of a connection (either side), which usually includes the TCP or UDP port used and the IP address. Used for communication between a client and a server.
  3. 4. A very compact personal computer that relies on a touch screen for input, generally uses a solid-state drive instead of a traditional hard disk, and relies on wireless or mobile networks for connectivity.
  4. 6. A high-speed direct Internet connection that uses all-digital networks.
  5. 7. A software application that enables a PC or mobile device to function as a telephone using VoIP technology.
  6. 11. A person's ability to use technology while "on the go."