Across
- 3. A security technique designed to prevent access to information by converting it into a scrambled (unreadable) form of text.
- 5. A device that allows computers to communicate over a network by modulating and demodulating the cable signal into a stream of data.
- 8. A file that contains mappings of IP addresses to host names.
- 9. A standard for short-range radio signals that is used to form personal area networks (PANs).
- 10. A mobile phone that includes PC-like functionality.
- 12. A more compact, Web-oriented version of the standard laptop PC; relies on the cloud computing model in which the Internet is used for remote access to Web applications.
- 13. A document published by the IETF that details information about standardized Internet protocols and those in various development stages.
- 14. One link between two network devices; the number of hops between two devices is considered a hop count.
- 15. The complete domain name of an Internet computer, such as www.CIWcertified.com.
Down
- 1. The Internet standard protocol for remote terminal connection service.
- 2. The end point of a connection (either side), which usually includes the TCP or UDP port used and the IP address. Used for communication between a client and a server.
- 4. A very compact personal computer that relies on a touch screen for input, generally uses a solid-state drive instead of a traditional hard disk, and relies on wireless or mobile networks for connectivity.
- 6. A high-speed direct Internet connection that uses all-digital networks.
- 7. A software application that enables a PC or mobile device to function as a telephone using VoIP technology.
- 11. A person's ability to use technology while "on the go."