Modules 1-3 terms

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273
Across
  1. 3. causes the shell or program to terminate
  2. 5. it offers the consumer much more interaction and control, through use of the Internet.
  3. 6. graphical equivalent to the network command-line interface
  4. 8. combines a private cloud with one or more public cloud services
  5. 13. organization that provides a myriad of services for accessing, using, or participating in the Internet
  6. 15. where communication begins or ends on a physical device or unit of equipment.
  7. 17. used to start the printers or classes whereas the disable command is used to stop the printers or classes
  8. 18. point of interconnection between a computer and a private or public network
  9. 20. To display the startup configuration
  10. 22. piece of computer hardware or software that provides functionality for other programs or devices
  11. 24. technology that sits between wired and wireless
  12. 25. Small office
  13. 27. terminates a process on another port, or the current port if a port number is not specified
  14. 29. piece of computer hardware or software that accesses a service made available by a server
  15. 31. on-demand availability of computer system resources
  16. 35. refers to the provision of telephone, video and data communication services within a single network
  17. 40. erase the startup configuration in the persistent memory when information is corrupted or otherwise unusable
  18. 43. user-friendly interface
  19. 47. start a program over again, usually because it has crashed or because it has begun to display aberrant behavior.
  20. 48. message presented to a user who is using the Cisco switch
  21. 49. can be used to view a summary of the router interfaces
  22. 50. wide
  23. 52. independent items, or variables, that contain data or codes
  24. 54. you can go into router configuration using the router {protocol} command
  25. 55. computer program at the core of a computer's operating system that has complete control over everything in the system
  26. 58. combination of a monitor and keyboard
  27. 60. interconnect end devices. These devices provide connectivity and work behind the scenes to ensure that data flows across the network
  28. 63. level allows you to access only basic monitoring commands
  29. 65. computer network diagnostic commands for displaying possible routes and measuring transit delays of packets across an Internet Protocol network
  30. 66. depict all of the physical aspects of the network, they will likely include: ports, cables, racks, servers, specific models, and so on
  31. 68. network Provides services for 200 to 1,000 devices
  32. 69. computer network for sharing information, collaboration tools, operational systems, and other computing services within an organization
  33. 71. entered when you specify a line to configure
  34. 72. type of computer communications network that groups and sends data in the form of small packets
  35. 73. is a computer program that emulates a video terminal within some other display architecture
Down
  1. 1. Virtual Terminal lines of the router, used solely to control inbound Telnet connections.
  2. 2. a type of network where the communications between end devices (nodes) must be set up before they can communicate
  3. 3. Computers ,laptops, file servers, web servers
  4. 4. network management protocol used on Internet Protocol local area networks
  5. 7. vast network that connects computers all over the world
  6. 9. words or phrases that describe content
  7. 10. relating to, using, or being a network by which computers operated by individuals can share information
  8. 11. computer network administration software utility used to test the reachability of a host on an Internet Protocol (IP) network
  9. 12. network consisting of a variety of entities (e.g. organizations and people) that are largely autonomous, geographically distributed, and heterogeneous in terms of their operating environment, culture, social capital and goals
  10. 14. command to display the contents of the running configuration.
  11. 16. topology: subnets (such as: IP addresses, VLAN IDs, and subnet masks,) network objects (routers and firewalls)
  12. 19. Internet service provider with a network based on wireless networking.
  13. 21. s the delivery of computing services
  14. 23. routed interface in IOS representing the IP addressing space for particular VLAN connected to this interface
  15. 26. Bring your own BLANK (BYOD)
  16. 28. is the maximum rate of data transfer across a given path
  17. 30. resides in a device's RAM, so if a device loses power, all configured commands will be lost
  18. 32. Local
  19. 33. label that is assigned to a device connected to a computer network and that is used to identify the device in various forms of electronic communication, such as the World Wide Web
  20. 34. application protocol used on the Internet or local area network to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection
  21. 36. controlled private network that allows access to partners, vendors and suppliers or an authorized set of customers – normally to a subset of the information accessible from an organization's intranet
  22. 37. physical facility that organizations use to house their critical applications and data
  23. 38. Quality of BLANK
  24. 39. design of a computer network
  25. 41. computer program which exposes an operating system's services to a human user or other program
  26. 42. capability of a computer system, electronic system or network to deliver uninterrupted service, despite one or more of its components failing
  27. 44. Release the IP address for the specified adapter.
  28. 45. evel can be password protected to allow only authorized users the ability to configure or manage the router
  29. 46. enables a password and password encryption that based on the md5 hashing algorithm
  30. 51. refers to the rules in which the command must be run in order for a piece of software to understand it
  31. 53. enter the interface configuration command
  32. 56. on-demand configurable pool of shared resources
  33. 57. system software that manages computer hardware
  34. 59. "grow a network" or "increase the size of a network
  35. 61. a key or a combination of keys providing quick access to a particular function within a program.
  36. 62. type of computing in which a service provider makes resources available to the public via the internet
  37. 64. physical parts or components of a computer
  38. 67. cryptographic network protocol for operating network services securely over an unsecured network
  39. 70. allows both wired and wireless communications